Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecurityUpdate.exe

Overview

General Information

Sample Name:SecurityUpdate.exe
Analysis ID:811690
MD5:a9c54f10533b8aa29389220dd3c73103
SHA1:4c08870c93f41468b5b0cd73193a396ccea984e0
SHA256:7a1a70bab33d6ee8bae6de2160ae3084c50243f659a2b5fb4c7b966b664c1447
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Queries the volume information (name, serial number etc) of a device
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Found evasive API chain checking for process token information
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • SecurityUpdate.exe (PID: 1148 cmdline: C:\Users\user\Desktop\SecurityUpdate.exe MD5: A9C54F10533B8AA29389220DD3C73103)
    • SecurityUpdate.exe (PID: 824 cmdline: C:\Users\user\Desktop\SecurityUpdate.exe MD5: A9C54F10533B8AA29389220DD3C73103)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecurityUpdate.exeVirustotal: Detection: 8%Perma Link
Source: SecurityUpdate.exeJoe Sandbox ML: detected
Source: SecurityUpdate.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\A\34\b\bin\amd64\_tkinter.pdb source: _tkinter.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\pyexpat.pdb source: pyexpat.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdbMM source: _lzma.pyd.1.dr
Source: Binary string: challengeNETSCAPE_SPKACspkacsig_algorNETSCAPE_SPKIcrypto\bn\bn_exp.ccrypto\x509v3\v3_conf.c,section=critical,DER:ASN1:crypto\x509v3\v3_lib.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1k 25 Mar 2021built on: Thu Mar 25 16:35:58 2021 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not availablecrypto\ocsp\ocsp_cl.c0123456789ABCDEFcrypto\bn\bn_print.c0%llu%019llu-crypto\o_fips.ccrypto\evp\pbe_scrypt.ccrypto\pem\pem_pk8.c source: _openssl.pyd.1.dr
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: VCRUNTIME140.dll.1.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: _openssl.pyd.1.dr
Source: Binary string: C:\A\6\b\libssl-1_1.pdb?? source: libssl-1_1.dll.1.dr
Source: Binary string: C:\A\6\b\libssl-1_1.pdb source: libssl-1_1.dll.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\unicodedata.pdb source: unicodedata.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdb source: _lzma.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_decimal.pdb source: _decimal.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_asyncio.pdb source: _asyncio.pyd.1.dr
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F069BE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,1_2_000000013F069BE4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F069BE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,2_2_000000013F069BE4
Source: tk86t.dll.1.drString found in binary or memory: http://aia.startssl.com/certs/ca.crt0
Source: tk86t.dll.1.drString found in binary or memory: http://aia.startssl.com/certs/sca.code3.crt06
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SecurityUpdate.exe, 00000001.00000003.981250746.0000000000497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://creativecommons.org/licenses/by-sa/3.0/)
Source: tk86t.dll.1.drString found in binary or memory: http://crl.startssl.com/sca-code3.crl0#
Source: tk86t.dll.1.drString found in binary or memory: http://crl.startssl.com/sfsca.crl0f
Source: tk86t.dll.1.dr, libffi-7.dll.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SecurityUpdate.exe, 00000001.00000003.986329497.0000000000497000.00000004.00000020.00020000.00000000.sdmp, SecurityUpdate.exe, 00000001.00000003.982614969.000000000049E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://linuxreviews.org/howtos/xfree/mouse/
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0N
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: tk86t.dll.1.drString found in binary or memory: http://ocsp.startssl.com00
Source: tk86t.dll.1.drString found in binary or memory: http://ocsp.startssl.com07
Source: tk86t.dll.1.dr, libffi-7.dll.1.drString found in binary or memory: http://ocsp.thawte.com0
Source: SecurityUpdate.exe, 00000001.00000003.986464880.000000000049E000.00000004.00000020.00020000.00000000.sdmp, SecurityUpdate.exe, 00000001.00000003.986492171.0000000000497000.00000004.00000020.00020000.00000000.sdmp, tk.tcl.1.drString found in binary or memory: http://support.apple.com/kb/HT1343
Source: SecurityUpdate.exe, 00000001.00000003.981250746.0000000000497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tango.freedesktop.org/Tango_Desktop_Project
Source: tk86t.dll.1.dr, libffi-7.dll.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: tk86t.dll.1.dr, libffi-7.dll.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: tk86t.dll.1.dr, libffi-7.dll.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: tk86t.dll.1.drString found in binary or memory: http://www.startssl.com/0P
Source: tk86t.dll.1.drString found in binary or memory: http://www.startssl.com/policy0
Source: _cffi_backend.cp39-win_amd64.pyd.1.drString found in binary or memory: https://cffi.readthedocs.io/en/latest/using.html#callbacks
Source: _cffi_backend.cp39-win_amd64.pyd.1.drString found in binary or memory: https://cffi.readthedocs.io/en/latest/using.html#callbacksO
Source: unicodedata.pyd.1.dr, _tkinter.pyd.1.dr, pyexpat.pyd.1.dr, libssl-1_1.dll.1.dr, _asyncio.pyd.1.dr, _lzma.pyd.1.dr, libffi-7.dll.1.dr, _decimal.pyd.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: libssl-1_1.dll.1.drString found in binary or memory: https://www.openssl.org/H
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0542801_2_000000013F054280
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06DA941_2_000000013F06DA94
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05592D1_2_000000013F05592D
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0562F81_2_000000013F0562F8
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0623081_2_000000013F062308
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F068C601_2_000000013F068C60
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0577801_2_000000013F057780
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05CB981_2_000000013F05CB98
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06E3B01_2_000000013F06E3B0
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F064BDC1_2_000000013F064BDC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0712881_2_000000013F071288
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F055AC41_2_000000013F055AC4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06BD101_2_000000013F06BD10
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05C9301_2_000000013F05C930
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06C13C1_2_000000013F06C13C
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0675441_2_000000013F067544
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05E9501_2_000000013F05E950
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F069BE41_2_000000013F069BE4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F055FEC1_2_000000013F055FEC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F060C301_2_000000013F060C30
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F068C601_2_000000013F068C60
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0580801_2_000000013F058080
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F066CAC1_2_000000013F066CAC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0562F82_2_000000013F0562F8
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0623082_2_000000013F062308
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F068C602_2_000000013F068C60
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0577802_2_000000013F057780
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05CB982_2_000000013F05CB98
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F06E3B02_2_000000013F06E3B0
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F064BDC2_2_000000013F064BDC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0542802_2_000000013F054280
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0712882_2_000000013F071288
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F06DA942_2_000000013F06DA94
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F055AC42_2_000000013F055AC4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F06BD102_2_000000013F06BD10
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05592D2_2_000000013F05592D
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05C9302_2_000000013F05C930
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F06C13C2_2_000000013F06C13C
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0675442_2_000000013F067544
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05E9502_2_000000013F05E950
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F069BE42_2_000000013F069BE4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F055FEC2_2_000000013F055FEC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F060C302_2_000000013F060C30
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F068C602_2_000000013F068C60
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0580802_2_000000013F058080
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F066CAC2_2_000000013F066CAC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: String function: 000000013F051DD0 appears 70 times
Source: SecurityUpdate.exeVirustotal: Detection: 8%
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile read: C:\Users\user\Desktop\SecurityUpdate.exeJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F055030 GetLastError,FormatMessageW,WideCharToMultiByte,1_2_000000013F055030
Source: SecurityUpdate.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecurityUpdate.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecurityUpdate.exe C:\Users\user\Desktop\SecurityUpdate.exe
Source: C:\Users\user\Desktop\SecurityUpdate.exeProcess created: C:\Users\user\Desktop\SecurityUpdate.exe C:\Users\user\Desktop\SecurityUpdate.exe
Source: C:\Users\user\Desktop\SecurityUpdate.exeProcess created: C:\Users\user\Desktop\SecurityUpdate.exe C:\Users\user\Desktop\SecurityUpdate.exeJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482Jump to behavior
Source: classification engineClassification label: mal52.winEXE@3/992@0/0
Source: SecurityUpdate.exeStatic file information: File size 13265674 > 1048576
Source: SecurityUpdate.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecurityUpdate.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecurityUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\A\34\b\bin\amd64\_tkinter.pdb source: _tkinter.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\pyexpat.pdb source: pyexpat.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdbMM source: _lzma.pyd.1.dr
Source: Binary string: challengeNETSCAPE_SPKACspkacsig_algorNETSCAPE_SPKIcrypto\bn\bn_exp.ccrypto\x509v3\v3_conf.c,section=critical,DER:ASN1:crypto\x509v3\v3_lib.ccompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1k 25 Mar 2021built on: Thu Mar 25 16:35:58 2021 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not availablecrypto\ocsp\ocsp_cl.c0123456789ABCDEFcrypto\bn\bn_print.c0%llu%019llu-crypto\o_fips.ccrypto\evp\pbe_scrypt.ccrypto\pem\pem_pk8.c source: _openssl.pyd.1.dr
Source: Binary string: D:\a01\_work\26\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: VCRUNTIME140.dll.1.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: _openssl.pyd.1.dr
Source: Binary string: C:\A\6\b\libssl-1_1.pdb?? source: libssl-1_1.dll.1.dr
Source: Binary string: C:\A\6\b\libssl-1_1.pdb source: libssl-1_1.dll.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\unicodedata.pdb source: unicodedata.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_lzma.pdb source: _lzma.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_decimal.pdb source: _decimal.pyd.1.dr
Source: Binary string: C:\A\34\b\bin\amd64\_asyncio.pdb source: _asyncio.pyd.1.dr
Source: SecurityUpdate.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecurityUpdate.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecurityUpdate.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecurityUpdate.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecurityUpdate.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecurityUpdate.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F054EA0 MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,GetProcAddress,1_2_000000013F054EA0
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\PublicKey\_ec_ws.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cast.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Math\_modexp.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\pyexpat.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA224.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_ghash_clmul.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_BLAKE2s.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\select.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_BLAKE2b.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_des.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\libssl-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD4.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_uuid.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_aesni.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_blowfish.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_asyncio.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_eksblowfish.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ofb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_aes.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_chacha20.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cfb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_overlapped.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat\bindings\_padding.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ocb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl86t.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_ghash_portable.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\libffi-7.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_ARC4.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\tk86t.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA1.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_arc2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_multiprocessing.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_keccak.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\python39.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_poly1305.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA512.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ctr.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_des3.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Protocol\_scrypt.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ecb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_RIPEMD160.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cbc.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD5.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA256.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Util\_strxor.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Util\_cpuid_c.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat\bindings\_openssl.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA384.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\_cffi_backend.cp39-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_Salsa20.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F052F70 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_000000013F052F70
Source: C:\Users\user\Desktop\SecurityUpdate.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-14733
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\PublicKey\_ec_ws.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cast.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Math\_modexp.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\pyexpat.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA224.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_ghash_clmul.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_BLAKE2s.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\select.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_BLAKE2b.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_des.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\libssl-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD4.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_uuid.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_aesni.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_blowfish.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_asyncio.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_eksblowfish.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ofb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_aes.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_chacha20.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cfb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_overlapped.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat\bindings\_padding.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ocb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl86t.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_ghash_portable.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_tkinter.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\libffi-7.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_ARC4.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\tk86t.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA1.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_arc2.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_multiprocessing.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_keccak.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_poly1305.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA512.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ctr.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_des3.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Protocol\_scrypt.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_ecb.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_RIPEMD160.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_MD5.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_raw_cbc.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA256.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Util\_strxor.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Util\_cpuid_c.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat\bindings\_openssl.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash\_SHA384.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\_cffi_backend.cp39-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher\_Salsa20.pydJump to dropped file
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F069BE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,1_2_000000013F069BE4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05FDFC _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,2_2_000000013F05FDFC
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F069BE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,2_2_000000013F069BE4
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F058F14 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000013F058F14
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F054EA0 MultiByteToWideChar,MultiByteToWideChar,LoadLibraryA,GetProcAddress,GetProcAddress,1_2_000000013F054EA0
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06B6F0 GetProcessHeap,1_2_000000013F06B6F0
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F05876C SetUnhandledExceptionFilter,_invalid_parameter_noinfo,1_2_000000013F05876C
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F058F14 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000013F058F14
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0590F8 SetUnhandledExceptionFilter,1_2_000000013F0590F8
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F058910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_000000013F058910
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F063404 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000013F063404
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F05876C SetUnhandledExceptionFilter,_invalid_parameter_noinfo,2_2_000000013F05876C
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F058F14 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000013F058F14
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F0590F8 SetUnhandledExceptionFilter,2_2_000000013F0590F8
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F058910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_000000013F058910
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 2_2_000000013F063404 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000013F063404
Source: C:\Users\user\Desktop\SecurityUpdate.exeProcess created: C:\Users\user\Desktop\SecurityUpdate.exe C:\Users\user\Desktop\SecurityUpdate.exeJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Cipher VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Hash VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\Cryptodome\Util VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography\hazmat\bindings VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\cryptography-3.4.7-py3.9.egg-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl8 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl8\8.4 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl8\8.5 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\encoding VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\http1.0 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\msgs VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\opt0.4 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata\Africa VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata\America VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata\America\Argentina VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata\America\Indiana VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI11482\tcl\tzdata\America\Kentucky VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F0710D0 cpuid 1_2_000000013F0710D0
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F06DA94 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,1_2_000000013F06DA94
Source: C:\Users\user\Desktop\SecurityUpdate.exeCode function: 1_2_000000013F058DFC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_000000013F058DFC
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts2
Native API
Path Interception11
Process Injection
11
Process Injection
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecurityUpdate.exe8%ReversingLabsWin64.Trojan.Generic
SecurityUpdate.exe8%VirustotalBrowse
SecurityUpdate.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://aia.startssl.com/certs/sca.code3.crt060%URL Reputationsafe
http://aia.startssl.com/certs/sca.code3.crt060%URL Reputationsafe
http://crl.startssl.com/sfsca.crl0f0%URL Reputationsafe
http://aia.startssl.com/certs/ca.crt00%URL Reputationsafe
http://crl.startssl.com/sca-code3.crl0#0%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://www.startssl.com/0P0%URL Reputationsafe
http://www.startssl.com/0P0%URL Reputationsafe
http://ocsp.startssl.com070%URL Reputationsafe
http://ocsp.startssl.com070%URL Reputationsafe
http://www.startssl.com/policy00%URL Reputationsafe
http://ocsp.startssl.com000%URL Reputationsafe
http://linuxreviews.org/howtos/xfree/mouse/0%VirustotalBrowse
http://linuxreviews.org/howtos/xfree/mouse/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://tango.freedesktop.org/Tango_Desktop_ProjectSecurityUpdate.exe, 00000001.00000003.981250746.0000000000497000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://aia.startssl.com/certs/sca.code3.crt06tk86t.dll.1.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://crl.startssl.com/sfsca.crl0ftk86t.dll.1.drfalse
    • URL Reputation: safe
    unknown
    http://crl.thawte.com/ThawteTimestampingCA.crl0tk86t.dll.1.dr, libffi-7.dll.1.drfalse
      high
      http://aia.startssl.com/certs/ca.crt0tk86t.dll.1.drfalse
      • URL Reputation: safe
      unknown
      http://crl.startssl.com/sca-code3.crl0#tk86t.dll.1.drfalse
      • URL Reputation: safe
      unknown
      https://cffi.readthedocs.io/en/latest/using.html#callbacks_cffi_backend.cp39-win_amd64.pyd.1.drfalse
        high
        http://ocsp.thawte.com0tk86t.dll.1.dr, libffi-7.dll.1.drfalse
        • URL Reputation: safe
        unknown
        http://www.startssl.com/0Ptk86t.dll.1.drfalse
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        https://www.openssl.org/Hlibssl-1_1.dll.1.drfalse
          high
          http://ocsp.startssl.com07tk86t.dll.1.drfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.startssl.com/policy0tk86t.dll.1.drfalse
          • URL Reputation: safe
          unknown
          http://ocsp.startssl.com00tk86t.dll.1.drfalse
          • URL Reputation: safe
          unknown
          http://linuxreviews.org/howtos/xfree/mouse/SecurityUpdate.exe, 00000001.00000003.986329497.0000000000497000.00000004.00000020.00020000.00000000.sdmp, SecurityUpdate.exe, 00000001.00000003.982614969.000000000049E000.00000004.00000020.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://creativecommons.org/licenses/by-sa/3.0/)SecurityUpdate.exe, 00000001.00000003.981250746.0000000000497000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://cffi.readthedocs.io/en/latest/using.html#callbacksO_cffi_backend.cp39-win_amd64.pyd.1.drfalse
              high
              No contacted IP infos
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:811690
              Start date and time:2023-02-19 18:33:04 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 9s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:SecurityUpdate.exe
              Detection:MAL
              Classification:mal52.winEXE@3/992@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 100% (good quality ratio 91%)
              • Quality average: 67.7%
              • Quality standard deviation: 31.6%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 104
              • Number of non-executed functions: 95
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.
              • Report size getting too big, too many NtWriteFile calls found.
              TimeTypeDescription
              18:33:18API Interceptor353x Sleep call for process: SecurityUpdate.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11264
              Entropy (8bit):4.634028407547307
              Encrypted:false
              SSDEEP:96:z8MwxTCa5Xv7BelL7u1R/r8qJ7pfpsPG6QEYHGBp5WCmNniHisDJ9UFv4:zTwxTltlelL7urFfUQa5NmYjDLU
              MD5:BA43C9C79B726F52CD3187231E3A780F
              SHA1:EC0538F8F32F3C58CB7430E82C416B44C0B03D12
              SHA-256:7B5E1F955E198278A39B94F6AC18D49CEE21B99C8A951DE722FF99A153162A0B
              SHA-512:A74056F9D853B2F020800D9DB0C1C50AD704E5DBD6B9A0A169E1BCC6299AB02E5D1F6A9C0A4FEBE9E14D8FE3264D836E67ADCD1AD2F1C380FED4A98A48E3F3E3
              Malicious:false
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................@......................@.......@.......@.......f.......f.......f.......f.......Rich............................PE..d...a."`.........." ................T........................................p............`.........................................`'.......(..d....P.......@...............`..$....!...............................!..8............ ...............................text............................... ..`.rdata..*.... ......................@..@.data...H....0......."..............@....pdata.......@.......$..............@..@.rsrc........P.......(..............@..@.reloc..$....`.......*..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.010720322611065
              Encrypted:false
              SSDEEP:192:EUBpDmr37utd9PHv2DznuRGMeS4JUHNDLUYd:mDit6DCVn4WZUW
              MD5:991AA4813AF0ADF95B0DF3F59879E21C
              SHA1:E44DB4901FFBBB9E8001B5B3602E59F6D2CCC9C8
              SHA-256:5B86D84DA033128000D8BC00A237AB07D5FF75078216654C224854BEC0CD6641
              SHA-512:C6A9DB8338330AB45A8522FBEF5B59374176AC4BF2C0BAE6471AA6FA4710B7EFE20E9331BA542FA274D32DE623A0B578A1A048765F000F74B1608FFA05E5C550
              Malicious:false
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................K........................&.......................................'............Rich....................PE..d...b."`.........." ................T.....................................................`.........................................@8.......9..d....`.......P..L............p..$....1...............................1..8............0...............................text...x........................... ..`.rdata..2....0......................@..@.data...H....@.......,..............@....pdata..L....P......................@..@.rsrc........`.......2..............@..@.reloc..$....p.......4..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13312
              Entropy (8bit):5.030943993303202
              Encrypted:false
              SSDEEP:192:fhgUBpDmr37utd9PVv2Jnl0Ne3erKr5okiy0Y23RAr2Z9lkNCqDLU/:sDitwJooNiyX2hUA9f0U/
              MD5:43C8516BE2AE73FB625E8496FD181F1C
              SHA1:6D38E8EE6D38759FDBA6558848DA62BB3FB51EC8
              SHA-256:3A1ACFA87110ACE2F8B8F60B03E264F22E2B7E76B53AD98C3B260686B1C27C57
              SHA-512:B8DCD4875EF7759DA1F8B96FC85DAC8910720C8168F09AC52DAF85C637955274093530406BE2A58EF237BFAB8CCDF4F06F96EBA7ADFC4F413CBF0E5A7D447774
              Malicious:false
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................K........................&.......................................'............Rich....................PE..d...b."`.........." ................T.....................................................`..........................................7.......8..d....`.......P..d............p..$....1...............................1..8............0...............................text...(........................... ..`.rdata.......0......................@..@.data...H....@.......*..............@....pdata..d....P.......,..............@..@.rsrc........`.......0..............@..@.reloc..$....p.......2..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):35840
              Entropy (8bit):6.5985845002689825
              Encrypted:false
              SSDEEP:384:ZOISQpPUUllvxL/7v/iKBt5ByU0xGitqzSEkxGG7+tpKHb/LZ7fr52E0H680xz4e:nLh7JbH1G4sS4j990th9VQFI
              MD5:DACF0299F0ACD196C0B0C35440C9CF78
              SHA1:CFFD37FE04854D60E87058B33CA313F532879BF7
              SHA-256:1199152F31FC5179FD39733B6B7D60B7F4A7269FE28CBC434F87FA53810B305D
              SHA-512:7FFA5A8979F4258968E37540348E62FD22C795981F4AA9A6962DDEC17CEC8265EC7A7FF7EE4A2EBADF4DA35062972E4C7ADF7C8D4031B60AE218872807E092D9
              Malicious:false
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................@......................@.......@.......@.......f.......f.......f.......f.......Rich............................PE..d...]."`.........." .....H...F......T.....................................................`.........................................0...........d...............................0......................................8............`...............................text....G.......H.................. ..`.rdata...5...`...6...L..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..0...........................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15360
              Entropy (8bit):5.181873142782463
              Encrypted:false
              SSDEEP:192:9Ee15je/I3TuvPfB1LeLi2jcXdq2QdeJgDZETDRcYcaKAADLU5YUod:992Y6/B1KL4XdQdggDZ8EU5YUm
              MD5:5D1CAEEDC9595EC0A30507C049F215D7
              SHA1:B963E17679A0CB1EFDC388B8218BE7373DE8E6CC
              SHA-256:A5C4143DDFA6C10216E9467A22B792541096E222EFE71C930A5056B917E531A0
              SHA-512:BE8471BE53AFA1EDCAA742B7D1D4222D15D4682BA8E1F8376FC65C46CCC5FE0890D24BBAFB6616F625D5D37A087762317EBAA4AE6518443E644FA01EBC4496E5
              Malicious:false
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................[........................*.......................................7............Rich....................PE..d...]."`.........." ......... ......T.....................................................`.........................................p9.......:..d....`.......P...............p..$....1...............................1..8............0.. ............................text............................... ..`.rdata.......0......."..............@..@.data...8....@.......2..............@....pdata.......P.......4..............@..@.rsrc........`.......8..............@..@.reloc..$....p.......:..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):5.400580637932519
              Encrypted:false
              SSDEEP:192:rEJe0rPeLTuUt4/wgroOCouz7ucc9dJ7oAAokDLU45Gc:3mUGr9n6769laU45
              MD5:4795B16B5E63AEE698E8B601C011F6E6
              SHA1:4AA74966B5737A818B168DA991472380FE63AD3E
              SHA-256:78DB7D57C23AC96F5D56E90CFB0FBB2E10DE7C6AF48088354AA374709F1A1087
              SHA-512:73716040ECF217E41A34FADEA6046D802982F2B01D0133BFD5C215499C84CB6D386AF81235CA21592722F57EA31543D35B859BE2AF1972F347C93A72131C06C2
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...]."`.........." ....."... ......T.....................................................`.........................................@I.......I..d....p.......`..................$....B...............................B..8............@...............................text...8 .......".................. ..`.rdata.......@.......&..............@..@.data...H....P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..$............>..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):20480
              Entropy (8bit):6.159203027693185
              Encrypted:false
              SSDEEP:192:iUpJ7Grjup/vx81AguKUiZA3OkJYkO8d3KobfoHJAyZJg8D0KThxA+rAQE+tnJi8:I2XKAs3ZArTvHbgpJgLa0Mp83xhUoz
              MD5:9F33973B19B84A288DF7918346CEC5E4
              SHA1:A646146337225D3FA064DE4B15BF7D5C35CE5338
              SHA-256:DC86A67CFF9CB3CC763AAAB2D357EC6DBC0616A5DFC16EBE214E8E2C04242737
              SHA-512:D7FFA4A640EBD2C9121DBD1BA107B5D76C0385524C4F53DE6FDA1BB0EC16541CEF1981F7E1DAA84F289D4A7D566B0620690AF97AF47F528BBF5B2CD6E49FE90C
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...^."`.........." .....$..........T.....................................................`..........................................X.......Y..d............p..................0....Q...............................R..8............@...............................text...H#.......$.................. ..`.rdata.......@.......(..............@..@.data...H....`.......F..............@....pdata.......p.......H..............@..@.rsrc................L..............@..@.reloc..0............N..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):24576
              Entropy (8bit):6.493034619151615
              Encrypted:false
              SSDEEP:384:pksGDsFSQkHUleKaZXmrfXA+UA10ol31tuXOQkUdT:kTK0K4XmrXA+NNxW+Ud
              MD5:89D4B1FC3A62B4A739571855F22E0C18
              SHA1:F0F6A893A263EEEB00408F5F87DC9ABB3D3259A6
              SHA-256:3832F95FE55D1B4DA223DF5438414F03F18D5EF4AAFD285357A81E4ED5AD5DA1
              SHA-512:20C713564C0658FD7A26F56BF629B80FCB4E7F785E66A00163933D57C8E5A344F6B0476F7395A6D8A526D78A60C85884CEFF6B3F812A8EE07E224C9E91F878C1
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................K........................&.......................................'............Rich....................PE..d...^."`.........." .....$...>............................................................`.........................................@h.......h..d...............................0....a...............................a..8............@...............................text...x".......$.................. ..`.rdata...,...@.......(..............@..@.data...H....p.......V..............@....pdata...............X..............@..@.rsrc................\..............@..@.reloc..0............^..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12288
              Entropy (8bit):4.700268562557766
              Encrypted:false
              SSDEEP:192:zh05p7mr3Tutd9PUv2anKfI1ve86rYDLUa:tD6t/GKfevTTUa
              MD5:73DD025BFA3CFB38E5DAAD0ED9914679
              SHA1:65D141331E8629293146D3398A2F76C52301D682
              SHA-256:C89F3C0B89CFEE35583D6C470D378DA0AF455EBD9549BE341B4179D342353641
              SHA-512:20569F672F3F2E6439AFD714F179A590328A1F9C40C6BC0DC6FCAD7581BC620A877282BAF7EC7F16AAA79724BA2165F71D79AA5919C8D23214BBD39611C23AED
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...`."`.........." ................T.....................................................`..........................................7.......8..d....`.......P..X............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......&..............@....pdata..X....P.......(..............@..@.rsrc........`.......,..............@..@.reloc..$....p......................@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13312
              Entropy (8bit):4.99372428436515
              Encrypted:false
              SSDEEP:192:Dardk3qQb3GukBPZCLfSQl+x5DLUzbgd6:dNzFkHCLKUzbO
              MD5:E87AAC7F2A9BF57D6796E5302626EE2F
              SHA1:4B633501E76E96C8859436445F38240F877FC6C6
              SHA-256:97BF9E392D6AD9E1EC94237407887EA3D1DEC2D23978891A8174C03AF606FD34
              SHA-512:108663F0700D9E30E259A62C1AE35B23F5F2ABD0EFF00523AAE171D1DB803DA99488C7395AFD3AD54A242F0CB2C66A60E6904D3E3F75BB1193621FD65DF4AD5C
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................@....................@......@......@......f......f......f.~.....f......Rich....................PE..d...`."`.........." ................T.....................................................`..........................................8......H9..d....`.......P..d............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......*..............@....pdata..d....P.......,..............@..@.rsrc........`.......0..............@..@.reloc..$....p.......2..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):14848
              Entropy (8bit):5.274628449067808
              Encrypted:false
              SSDEEP:192:ktVGzeoI3DuzPpcAdXdO57EEE/quBiFElcUNIDLUnF6+ud:nNYqFcAdXdDqurIUnUp
              MD5:F3F30D72D6D7F4BA94B3C1A9364F1831
              SHA1:46705C3A35C84BF15CF434E2607BDDD18991E138
              SHA-256:7820395C44EAB26DE0312DFC5D08A9A27398F0CAA80D8F9A88DEE804880996FF
              SHA-512:01C5EA300A7458EFE1B209C56A826DF0BF3D6FF4DD512F169D6AEE9D540600510C3249866BFB991975CA5E41C77107123E480EDA4D55ECCB88ED22399EE57912
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o....................@......................@.......@.......@.......f.......f.......f.......f.......Rich............................PE..d...a."`.........." ......... ......T.....................................................`.........................................P9.......:..d....`.......P...............p..$....1...............................1..8............0.. ............................text............................... ..`.rdata.......0....... ..............@..@.data........@.......0..............@....pdata.......P.......2..............@..@.rsrc........`.......6..............@..@.reloc..$....p.......8..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):56832
              Entropy (8bit):4.23001088085281
              Encrypted:false
              SSDEEP:384:m3gj0/sz71dv/ZHkVnYcZiGKdZHDLIK4vnKAnKorZOzUbq+K9:7jssHZHTr4vZHb69
              MD5:020A1E1673A56AF5B93C16B0D312EF50
              SHA1:F69C1BB224D30F54E4555F71EA8CAD4ACB5D39BC
              SHA-256:290B3ED6151B7BF8B7B227EF76879838294F7FF138AF68E083C2FDDC0A50E4FC
              SHA-512:71B5ED33B51F112896BB59D39B02010B3ABC02B3032BD17E2AA084807492DA71BDE8F12ADEF72C6CC0A5A52D783CD7595EEC906C394A21327ADAB2927E853B1F
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Sj..2...2...2...J...2..LC...2...Y...2...2...2..LC...2..LC...2..LC...2..j@...2..j@...2..j@...2..j@...2..Rich.2..........................PE..d..._."`.........." .....6...................................................0............`.....................................................d...............l............ ..0... ...............................@...8............P...............................text....5.......6.................. ..`.rdata..T....P.......:..............@..@.data...H...........................@....pdata..l...........................@..@.rsrc...............................@..@.reloc..0.... ......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):57344
              Entropy (8bit):4.2510443883540265
              Encrypted:false
              SSDEEP:384:wVgj0/sKzNweVC/ZHkNnYcZiGKdZHDLaK0vnKAnKLrZVwUbqeo:njsskKZHLR0vZmbx
              MD5:EC55478B5DD99BBE1EBA9D6AD8BDE079
              SHA1:EC730D05FEEC83B1D72784C2265DC2E2CF67C963
              SHA-256:1AF46CBE209E3F1D30CCC0BA9F7E5A455554CAF8B1E3E42F9A93A097D9F435AC
              SHA-512:55FE28E839117A19DF31165FEA3DED3F9DFC0DDA16B437CF274174E9AE476C0E5B869FFB8B2CF1880189BFAC3917E8D7078FA44FC96CFF18DC6EAC7AFA7A8F48
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Sj..2...2...2...J...2..LC...2...Y...2...2...2..LC...2..LC...2..LC...2..j@...2..j@...2..j@...2..j@...2..Rich.2..........................PE..d..._."`.........." .....8...................................................0............`.................................................`...d............................ ..0... ...............................@...8............P...............................text...h7.......8.................. ..`.rdata.......P.......<..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..0.... ......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10240
              Entropy (8bit):4.689882120894326
              Encrypted:false
              SSDEEP:96:5D8MdJTCaDAH37Belrzu1x/r8qJ7pfJsPG6QxmFWymc3doBKumsLVsDJ9UKvL:lTdJTlDmNelrzuLFf0Qg4yxlumQCDLU
              MD5:93DA52E6CE73E0C1FC14F7B24DCF4B45
              SHA1:0961CFB91BBCEE3462954996C422E1A9302A690B
              SHA-256:DDD427C76F29EDD559425B31EEE54EB5B1BDD567219BA5023254EFDE6591FAA0
              SHA-512:49202A13D260473D3281BF7CA375AC1766189B6936C4AA03F524081CC573EE98D236AA9C736BA674ADE876B7E29AE9891AF50F1A72C49850BB21186F84A3C3AB
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mr..............t......,}.......g..............,}......,}......,}.......~.......~.......~.......~......Rich............................PE..d...`."`.........." ................T........................................p............`..........................................&.......'..P....P.......@...............`..$....!...............................!..8............ ...............................text............................... ..`.rdata..p.... ......................@..@.data...H....0....... ..............@....pdata.......@......."..............@..@.rsrc........P.......$..............@..@.reloc..$....`.......&..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):21504
              Entropy (8bit):6.2360102418962855
              Encrypted:false
              SSDEEP:384:42XHEtPwbdvIbwKBBEHYpJgLa0Mp8u9sLgU:jHMobBiB+HqgLa1Kx
              MD5:3D34E2789682844E8B5A06BE3B1C81BF
              SHA1:0141D82B4B604E08E620E63B8257FB6A1E210CAF
              SHA-256:40B1A6F1318C565E985AFFB8DF304991E908AB1C36C8E960E7AC177E3002FCA0
              SHA-512:886780D6CE3F2955C8FAC38F75DC3A2E017F68ED8FCC75BAA6D74A5E4018CFBF2B99F59D0DBFA5D2728EB1AD7F3F8FE54F0AD3F29D74AFC43E2CDC1A21F889C4
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...^."`.........." .....(..........T.....................................................`..........................................X.......Y..d............p..................0....Q...............................R..8............@...............................text....'.......(.................. ..`.rdata.......@.......,..............@..@.data...H....`.......J..............@....pdata.......p.......L..............@..@.rsrc................P..............@..@.reloc..0............R..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):17920
              Entropy (8bit):5.285518610964193
              Encrypted:false
              SSDEEP:384:txQrFBe/i+/puqeXOv3oTezczeO9p9iYDWYLJzUn:Q5B8txuqeXOfoTezcSO9pUY1JY
              MD5:194D1F38FAB24A3847A0B22A120D635B
              SHA1:A96A9DF4794CDA21E845AAFE2D5ACD5A40A9C865
              SHA-256:FCC68F211C6D2604E8F93E28A3065F6E40F1E044C34D33CC8349EB3873559A0C
              SHA-512:07324B03B7DD804090B00BC62C41162FD1788AE3C8450BCA25D63BF254009D04A7ACDF7ACFAF473A3D1BE1FA58B0007FA35D8E486F90C9B48384C035C83B0CCF
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...a."`.........." .....(... ......T.....................................................`.........................................@I......<J..d....p.......`..................$....A...............................A..8............@...............................text....'.......(.................. ..`.rdata.......@.......,..............@..@.data........P.......<..............@....pdata.......`.......>..............@..@.rsrc........p.......B..............@..@.reloc..$............D..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12288
              Entropy (8bit):4.696064367032408
              Encrypted:false
              SSDEEP:192:V05p7mr3Tutd9PUv22NeLfPI5k3bo7tDLUan:tD6t/N4a3bEZUan
              MD5:0628DC6D83F4A9DDDB0552BD0CC9B54C
              SHA1:C73F990B84A126A05F1D32D509B6361DCA80BC93
              SHA-256:F136B963B5CEB60B0F58127A925D68F04C1C8A946970E10C4ABC3C45A1942BC7
              SHA-512:78D005A2FEC5D1C67FC2B64936161026F9A0B1756862BAF51EAF14EDEE7739F915D059814C8D6F66797F84A28071C46B567F3392DAF4FF7FCDFA94220C965C1A
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...`."`.........." ................T.....................................................`..........................................7.......8..d....`.......P..X............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......&..............@....pdata..X....P.......(..............@..@.rsrc........`.......,..............@..@.reloc..$....p......................@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):14336
              Entropy (8bit):5.219784380683583
              Encrypted:false
              SSDEEP:192:305p7mr3Tutd9Pwv2e42bF7i+V2rQnjt1wmg9jN+mp23XDLUk:rD6tTephi+AojO9jbQHUk
              MD5:59F65C1AD53526840893980B52CD0497
              SHA1:E675A09577C75D877CB1305E60EB3D03A4051B73
              SHA-256:2DF02E84CFD77E91D73B3551BDDA868277F8AE38B262FA44528E87208D0B50FC
              SHA-512:5E9782793A8BB6437D718A36862C13CDE5E7E3780E6F3E82C01F7B2F83EBBDB63F66B3C988FA8DEF36077F17FA1F6C2C77A82FABBD7C17D1568E7CEA19E7EDD6
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...[."`.........." ................T.....................................................`..........................................8......|9..d....`.......P..@............p..$....2...............................2..8............0...............................text............................... ..`.rdata.......0....... ..............@..@.data...H....@......................@....pdata..@....P.......0..............@..@.rsrc........`.......4..............@..@.reloc..$....p.......6..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.171175600505211
              Encrypted:false
              SSDEEP:192:O05p7mr3Tutd9Pwv2aKbxdcgatX1WmkaA09L9kDLUhX:MD6tTZgtX15kanYU
              MD5:4D8230D64493CE217853B4D3B6768674
              SHA1:C845366E7C02A2402BA00B9B6735E1FAD3F2F1EF
              SHA-256:06885DC99A7621BA3BE3B28CB4BCF972549E23ACF62A710F6D6C580AABA1F25A
              SHA-512:C32D5987A0B1DED7211545CB7D3D7482657CA7D74A9083D37A33F65BBE2E7E075CB52EFAEEA00F1840AB8F0BAF7DF1466A4F4E880ABF9650A709814BCEE2F945
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...\."`.........." ................T.....................................................`..........................................8.......9..d....`.......P..@............p..$....2...............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......,..............@....pdata..@....P......................@..@.rsrc........`.......2..............@..@.reloc..$....p.......4..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.171087190344686
              Encrypted:false
              SSDEEP:384:ajJzPAI2p3C2p+EhKnLg9yH8puzoFaPERIQAVqYU:GITp3pp+EhmLg9yH8puzoFaPERIQp
              MD5:4B4831FCFCA23CEBEC872CCCCE8C3CE1
              SHA1:9CA26A95C31E679B0D4CFEDEACEA38334B29B3F3
              SHA-256:75250C7B7EE9F7F944D9C23161D61FE80D59572180A30629C97D1867ECF32093
              SHA-512:7218D67A78EBC76D1AA23AEDDF7B7D209A9E65D4A50FD57F07680953BDF40E42B33D3D6388119B54E3948DA433D0F895BCC0F98E6D1AF4B9821AEFE2300C7EA0
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...V."`.........." ................T.....................................................`..........................................9.......9..d....`.......P..(............p..$....2...............................2..8............0...............................text...h........................... ..`.rdata.......0......................@..@.data...x....@.......,..............@....pdata..(....P......................@..@.rsrc........`.......2..............@..@.reloc..$....p.......4..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.0894476079532565
              Encrypted:false
              SSDEEP:192:ZE4+jfKIb3gudUPpwVp1sAD7I/9hAkeTOre5QDLU+db:CjJzPQwVp1sAD7KvpUv5uUob
              MD5:642B9CCEA6E2D6F610D209DC3AACF281
              SHA1:8F816AA1D94F085E2FE30A14B4247410910DA8F9
              SHA-256:E5DFB0A60E0E372AE1FF4D0E3F01B22E56408F0F9B04C610ECEF2A5847D6D879
              SHA-512:A728E2F6264A805CE208FEB24600D23EC04C7D17481A39B01F90E47D82CF6C369D6151BB4170D993BE98CEFE8E6BDF2044CF0DC623BAE662C5584812875FC3B8
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...V."`.........." ................T.....................................................`..........................................8.......8..d....`.......P..(............p..$....1...............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........@.......,..............@....pdata..(....P......................@..@.rsrc........`.......2..............@..@.reloc..$....p.......4..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15360
              Entropy (8bit):5.432796797907171
              Encrypted:false
              SSDEEP:192:N9FZ/KFjb3OuTPU84At56BTBvzcuiDSjeoGIQUPTrLFDLUEPLdN:/wztA8Tt5OwuiDSyoGPmXdUEPB
              MD5:180017650B62058058CB81B53540A9BF
              SHA1:696EECA75621B75BC07E2982EB66D61A1DFECDB6
              SHA-256:8146110D92B2F50B3EB02557BE6EE4586EEC1A2AD7204B48A4F28B8859FE6E29
              SHA-512:9AD447F0B15639C1FA3300E80EC5B175589930CB9166CF108FAFA74093CE791E1FF55CF6686ABF090A8B44BA6B743FEEBA270F378ED405F15418406AB8D01E9B
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...W."`.........." ..... ..........T.....................................................`.........................................P8...... 9..d....`.......P..X............p..$....1...............................1..8............0...............................text............ .................. ..`.rdata..p....0.......$..............@..@.data........@.......2..............@....pdata..X....P.......4..............@..@.rsrc........`.......8..............@..@.reloc..$....p.......:..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.099895592918567
              Encrypted:false
              SSDEEP:192:s05p7mr3Tutd9Pgv239k9UgPKsVQJukk7+rDLU8:OD6tD3G9tPKsVQJuUDU
              MD5:11F184E124E91BE3EBDF5EAF92FDE408
              SHA1:5B0440A1A2FBD1B21D5AF7D454098A2B7C404864
              SHA-256:F9220CA8A1948734EC753B1ADA5E655DAF138AF76F01A79C14660B2B144C2FAE
              SHA-512:37B3916A5A4E6D7052DDB72D34347F46077BDF1BA1DCF20928B827B3D2C411C612B4E145DFE70F315EA15E8F7F00946D26E4728F339EDDF08C72B4E493C56BC3
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................{........................'....................................................Rich............PE..d...Z."`.........." ......... ......T.....................................................`.........................................p9......H:..d....`.......P...............p..$...@3..............................`3..8............0...............................text...X........................... ..`.rdata.......0......................@..@.data...H....@.......,..............@....pdata.......P......................@..@.rsrc........`.......2..............@..@.reloc..$....p.......4..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):17920
              Entropy (8bit):5.65813713656815
              Encrypted:false
              SSDEEP:192:Bj51JwTx7uuj/krY1ZLhGZo2R1J+0eDPSgkNZuOdlptvTLLB5b+vDLUE+Ea:sxQr89hTOJ+0QPSfu6rlZ+/UE+
              MD5:51A01A11848322AC53B07D4D24F97652
              SHA1:141097D0F0F1C5432B1F1A571310BD4266E56A6D
              SHA-256:E549A4FE85759CBFC733ECF190478514B46ECA34EDA2370F523328F6DC976F30
              SHA-512:23281BE77496AF3A6507B610191AF5AA005C974F27129073FD70D51E82A5D3E55FB8C7FF28CF1886B55E264B736AB506EE0D97210E764EB1618C74DE2B44E64A
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...W."`.........." .....*..........T.....................................................`.........................................PH......(I..d....p.......`..X...............$....A...............................A..8............@...............................text....).......*.................. ..`.rdata..x....@......................@..@.data........P.......<..............@....pdata..X....`.......>..............@..@.rsrc........p.......B..............@..@.reloc..$............D..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):21504
              Entropy (8bit):5.882538742896355
              Encrypted:false
              SSDEEP:384:lRlEGHXgKXqHGcvYHp5RYcARQOj4MSTjqgPmEO2vUk:NdHXgP/YtswvdUk
              MD5:B20D629142A1354BA94033CAC15D7D8C
              SHA1:CD600F33D5BC5FA3E70BDF346A8D0FB935166468
              SHA-256:147CE6747635B374570D3A1D9FCAB5B195F67E99E34C0F59018A3686A07A3917
              SHA-512:72EFD1C653732FB620787B26D0CA44086405A070EC3CD4BBA5445854C5D7DDE6D669060845D093A1FC2593ED6E48630344FA6F0AF685186FB554D8BB9BC97AA0
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...Y."`.........." .....6... ......T.....................................................`..........................................Z.......Z..d............p..................$....R...............................R..8............P...............................text....5.......6.................. ..`.rdata..8....P.......:..............@..@.data...(....`.......J..............@....pdata.......p.......L..............@..@.rsrc................P..............@..@.reloc..$............R..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):21504
              Entropy (8bit):5.88515673373227
              Encrypted:false
              SSDEEP:384:ARlEGHXiKXqHGcvYHp5RYcARQOj4MSTjqgPmEm9Uk:SdHXiP/YtswvdVk
              MD5:6FF2518A93F7279E8FDAC0CE8DE4BF3F
              SHA1:77F4713D4F287E2950C06A0EF2F8C7C8D53BABDD
              SHA-256:27B4DB005685D8E31E37BD632767D5FFC81818D24B622E3D25B8F08F43E29B57
              SHA-512:26A8448D34F70AF62D702851B8353708FB3A1B984CBDC1D2EABE582CAAD8D56B0A835A4C914EB7824DADCF62E83B84D3A669C06ACAF0E1001EB66F85BC5D0377
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...X."`.........." .....6... ......T.....................................................`..........................................Z.......Z..d............p..................$....R...............................R..8............P...............................text....5.......6.................. ..`.rdata..8....P.......:..............@..@.data...(....`.......J..............@....pdata.......p.......L..............@..@.rsrc................P..............@..@.reloc..$............R..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):26624
              Entropy (8bit):5.843159039658928
              Encrypted:false
              SSDEEP:768:2HJh9k54Stui0gel9soFdkO66MlPGXmXcCkyk:2H6Ju/FZ6nPxM6k
              MD5:8B59C61BB3A3ADFBB7B8C39F11B8084B
              SHA1:49595C3F830422FEF88D8FBAF003F32EF25501CE
              SHA-256:FBD9CDD873EAFAD3C03C05FFEB0D67F779C2D191389351FE2D835E7D8ECA534F
              SHA-512:6FEDCC8631723B63D3D8CAD6D57953EB356C53814FD6F1ECA6299E2A5272F67C58090D339B5E6BB1DA15F7BEB451FCC9A41129AB7F578155A17BBE0C1D385AA6
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...Y."`.........." .....H..."......T.....................................................`..........................................k......hl..d...............................$...pd...............................d..8............`...............................text....F.......H.................. ..`.rdata.......`.......L..............@..@.data...(............^..............@....pdata...............`..............@..@.rsrc................d..............@..@.reloc..$............f..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):26624
              Entropy (8bit):5.896939915107
              Encrypted:false
              SSDEEP:768:VxpB9/i4z5tui0gel9soFdkO66MlPGXmXcPtOJkw:Vx11u/FZ6nPxM8k
              MD5:6A84B1C402DB7FE29E991FCA86C3CECF
              SHA1:FC62477E770F4267C58853C92584969B2F0FEBE2
              SHA-256:CF8FD7B6BBC38FE3570B2C610E9C946CD56BE5D193387B9146F09D9B5745F4BC
              SHA-512:B9D1195429E674778A90262E0A438B72224B113B7222535DAA361222DEE049C9929481D6E1138117655EAE9B2735D51638209A6EF07963F5249AD74F0BFD75C6
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...Z."`.........." .....H..."......T.....................................................`..........................................l.......l..d...............................$....d...............................e..8............`...............................text...xG.......H.................. ..`.rdata..H....`.......L..............@..@.data...(............^..............@....pdata...............`..............@..@.rsrc................d..............@..@.reloc..$............f..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12800
              Entropy (8bit):4.957384431518367
              Encrypted:false
              SSDEEP:192:PUBpDmr37utd9PHv2O3sER2fi2s4DLUgdLl:zDit6O3sa4XUO
              MD5:1D49E6E34FE84C972484B6293CC2F297
              SHA1:3A799DB7102912DA344112712FD2236A099C7F5E
              SHA-256:B2FD9F57815B3F7FFC3365D02510B88DBE74AB1EFF8BE9099DC902412057244D
              SHA-512:CAD8FCC78006D643590C3D784C2DF051B8C448DE457B41507F031C9D7891036AD3F8E00B695D92F5138C250B2426A57C16F7293237054A245FF08B26AD86CF25
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................@......................@.......@.......@.......f.......f.......f.......f.......Rich............................PE..d...\."`.........." ................T.....................................................`..........................................8.......8..d....`.......P...............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......(..............@....pdata.......P.......*..............@..@.rsrc........`......................@..@.reloc..$....p.......0..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13312
              Entropy (8bit):5.014628606839607
              Encrypted:false
              SSDEEP:192:lUBpDmr37utd9PVv27c0qKzLF4DHxXUcDLU/:9DitwzvV4DREiU/
              MD5:CDD1A63E9F508D01EEBEE7646A278805
              SHA1:3CB34B17B63F2F61C2FA1B1338D0B94CF9EE67AF
              SHA-256:AB96945D26FEF23EF4B12E1BD5B1841CFECB8B06AB490B436E3F1A977A7F5E8B
              SHA-512:5F136D8EBFE6AC43846C4820FF8A3C81D991FCACC219C23DDD0674E75B930A1A948D02925BCC7BD807F5A68F01F65B35037B8A193143EB552D224E1DD906C158
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F................K........................&.......................................'............Rich....................PE..d...\."`.........." ................T.....................................................`..........................................7.......8..d....`.......P..X............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......................@..@.data...H....@.......*..............@....pdata..X....P.......,..............@..@.rsrc........`.......0..............@..@.reloc..$....p.......2..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15360
              Entropy (8bit):5.243633265407984
              Encrypted:false
              SSDEEP:192:QUN0iKNb3NuUPyxfFNhoCoK7e+TcBXJ2kMQ75i6nElDLUH:dYz8JpF39oK6+QBXJ2k775NKU
              MD5:57A49AC595084A19516C64079EE1A4C7
              SHA1:4B188D0E9965AB0DA8D9363FC7FEEE737DF81F74
              SHA-256:D7DA3DC02AC4685D3722E5AF63CA1A8857D53454D59CF64C784625D649897D72
              SHA-512:693989D01070835DC9D487C904F012EE5BE72219E1EEAEC56EE3BC35659192714D8F538BEA30F4849B3A3D4BCF24705EDFE84AD2742F6C8562F6C6215F7917BE
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...[."`.........." ..... ..........T.....................................................`..........................................8.......9..d....`.......P..d............p..$...p2...............................2..8............0...............................text............ .................. ..`.rdata.......0.......$..............@..@.data........@.......2..............@....pdata..d....P.......4..............@..@.rsrc........`.......8..............@..@.reloc..$....p.......:..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):14848
              Entropy (8bit):5.253962925838046
              Encrypted:false
              SSDEEP:192:t39lJPKBb3+ujPH/41fPnVSEsV3+ldpCArU8vOjpDLUFDdA:V9wzdz/afPCV3YdjdvMUFpA
              MD5:C19895CE6ABC5D85F63572308BD2D403
              SHA1:6B444E59112792B59D3BA4F304A30B62EEBD77FA
              SHA-256:1BCA3479A4CC033E8BC3B4DD8DCC531F38E7B7FE650A7DA09120CCAC100D70A4
              SHA-512:D8D493D51DE052F2A0BB18C4CD6F5E15AB5D5CCB3276D38DDA44382746656618560878359D6C95A76B223CBD4B2CD39C817EC7FC3108EED5D541CF4BD95AAA14
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F.f.......................................$....................................................Rich....................PE..d...\."`.........." ................T.....................................................`..........................................8......h9..d....`.......P..|............p..$....1...............................1..8............0...............................text............................... ..`.rdata.......0......."..............@..@.data........@.......0..............@....pdata..|....P.......2..............@..@.rsrc........`.......6..............@..@.reloc..$....p.......8..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):5.913715253597897
              Encrypted:false
              SSDEEP:384:4ea6OoLEx/fpMgEXNSNk/IppSQDLw16UADNIz7Izy+3O3nCpDN+cGJVtV81UpSu8:44OoMpMgqSpz41ht7EOeYcUV4ipwr
              MD5:150F31A18FDCCB30695E8A11B844CB9A
              SHA1:85A333C8A866AAFBF6B3766CED0B7079A2358C42
              SHA-256:D26D543EFC9A6C3D5BA52FFC55965A2C3DBB7E634776EF6C1789E5DF8E4DF3E5
              SHA-512:DDFE93CBE315E060A8F0B3863A1675D8F156BF84F157CD7BCBD7EC57F88C72DD21E6C2A5077A142D828DAD0C40149EE4064C34E6EE26787A8B32D4AC9A18E1CA
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........P.R.>.R.>.R.>.[...V.>..?.P.>.F.?.Q.>.R.?.{.>..;.Y.>..:.Z.>..=.Q.>..6.V.>..>.S.>....S.>..<.S.>.RichR.>.........PE..d...i."`.........." .....V...,............................................................`..........................................~..d.......d...............T...............$....q...............................q..8............p..(............................text...(U.......V.................. ..`.rdata.......p.......Z..............@..@.data...H............n..............@....pdata..T............t..............@..@.rsrc................|..............@..@.reloc..$............~..............@..B........................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12288
              Entropy (8bit):4.725087774300977
              Encrypted:false
              SSDEEP:192:N942/KIb3bu95Pp2abc64uVNn4DLUOVdB:FJzCxl464aGUOf
              MD5:66052F3B3D4C48E95377B1B827B959BB
              SHA1:CF3F0F82B87E67D75B42EAAB144AE7677E0C882E
              SHA-256:C9A6A7D7CE0238A8D03BCC1E43FD419C46FAEA3E89053355199DEDF56DADAFA4
              SHA-512:9A7F45CE151890032574ED1EF8F45640E489987DC3AF716E5D7F31127BA3675E1F4C775229184C52D9A3792DF9CB2B3D0D3BE079192C40E900BA0CC69E8E3EE5
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........./...A...A...A.......A.@.@...A...@...A...@..A.@.D...A.@.E...A.@.B...A.f.I...A.f.A...A.f....A.f.C...A.Rich..A.........................PE..d...b."`.........." ................T.....................................................`.........................................P8..d....8..d....`.......P..4............p..$....1...............................1..8............0...............................text...X........................... ..`.rdata.......0......................@..@.data........@.......&..............@....pdata..4....P.......(..............@..@.rsrc........`.......,..............@..@.reloc..$....p......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):748032
              Entropy (8bit):7.627003962799197
              Encrypted:false
              SSDEEP:12288:b3HtKHoxJ8gf1266y8IXhJvCKAmqVLzcrZgYIMGv1iLD9yQvG6h:b3NKHoxJFf1p34hcrn5Go9yQO6
              MD5:B96D4854F02D932D9D84DB7CE254C85A
              SHA1:61F8F284EEB65B21A5373DA85270802B9E0ABBF4
              SHA-256:E73BC5D362A1439FD87BF3901D5B2D4534B50E3B935C841F25D3C49BF3D4D7EE
              SHA-512:1FDE226034F48B29143E1B3042FB42C91BE8DE5DDC53B2F2FA3DAB1CCA99FB34AF3A8FB57B0CB5B152943BE156B4521DAE04FB80B08EC04A3F371E30D137297A
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........j.2...a...a...a.sba...alz.`...a.`.`...a...a...alz.`...alz.`...alz.`...aJy.`...aJy.`...aJy.a...aJy.`...aRich...a........................PE..d...g."`.........." .....V................................................................`.........................................p_.......a..d...............H...............0....H...............................I..8............p..(............................text....T.......V.................. ..`.rdata.......p.......Z..............@..@.data...X....p.......P..............@....pdata..H............X..............@..@.rsrc................f..............@..@.reloc..0............h..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10240
              Entropy (8bit):4.662736103035243
              Encrypted:false
              SSDEEP:96:5y8MdJTCaDAH37Belrzu1x/r8qJ7pfJsPG6Q9qHaGi0oYAsDJ9UqvA:0TdJTlDmNelrzuLFf0Qd03DLU
              MD5:E17F1BA35CF28FA1DDA7B1EC29573E0E
              SHA1:6EB63305E38BD75931E3325E0C3F58F7CB3F2AD0
              SHA-256:D37CCB530F177F3E39C05B0CA0A70661B2541CCAF56818DAD4FCF336EEED3321
              SHA-512:8E7AF8712592084178E3B93FE54E60AC32A774D151896AFEE937CDB3BB9F629F4B597F85AF9B56A1C14612121357FC0DDAA45E71D91B13C36E88292D3050A1B9
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mr..............t......,}.......g..............,}......,}......,}.......~.......~.......~.......~......Rich............................PE..d...`."`.........." ................T........................................p............`..........................................'..|...|'..P....P.......@...............`..$....!...............................!..8............ ...............................text............................... ..`.rdata..H.... ......................@..@.data...H....0....... ..............@....pdata.......@......."..............@..@.rsrc........P.......$..............@..@.reloc..$....`.......&..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10240
              Entropy (8bit):4.620728904455609
              Encrypted:false
              SSDEEP:96:5Z8MdJTCaDAH37Belrzu1x/r8qJ7pfJsPG6QgcfPPYdsDJ9UKvb:nTdJTlDmNelrzuLFf0Q5P3DLU
              MD5:3369F9BB8B0EE93E5AD5B201956DC60F
              SHA1:A5B75CBD6CE905A179E49888E798CD6AE9E9194D
              SHA-256:5940E97E687A854E446DC859284A90C64CF6D87912C37172B8823A8C3A7B73DF
              SHA-512:C4E71D683BE64A8E6AB533FA4C1C3040B96D0BE812EA74C99D2D2B5D52470C24B45D55366A7ACB9D8CDA759A618CBAF0D0A7ECFEF4C0954DF89FDB768D9893E2
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mr..............t......,}.......g..............,}......,}......,}.......~.......~.......~.......~......Rich............................PE..d...b."`.........." ................T........................................p............`..........................................&..t...d'..P....P.......@...............`..$....!...............................!..8............ ...............................text...x........................... ..`.rdata..0.... ......................@..@.data...H....0....... ..............@....pdata.......@......."..............@..@.rsrc........P.......$..............@..@.reloc..$....`.......&..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1502
              Entropy (8bit):5.277134836446237
              Encrypted:false
              SSDEEP:24:2dt4+iNTgOMPgi0iiNK+bkgxIme7cb3jgMkb4+GE:cSFTgOSEK+bkgxImeMcn3GE
              MD5:44A3254A6BA533D9162B7E32333DB92C
              SHA1:6577E6D4E32C671600106948F593F5C1A21DA4F9
              SHA-256:597B5B81D54CF5FCC062CA5A1268F5148B7DECE111A19C5D8398B59E419A0EFF
              SHA-512:22B5764A60DA07C6AE6E2053EC05B5BE26C2AB24BD5E4298F5093CCF17249C3FB4E3C0CE54325057E1057D752A133C66911D5DA41BF5EFC05EDAF974F0A5EC46
              Malicious:true
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <assemblyIdentity type="win32" name="SecurityUpdate" processorArchitecture="amd64" version="1.0.0.0"/>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level="asInvoker" uiAccess="false"/>.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" language="*" processorArchitecture="*" version="6.0.0.0" publicKeyToken="6595b64144ccf1df"/>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"/>.. </dependentAssembly>.. </dependency>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">.. <application>.. <supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>.. <supportedOS Id="{35138b9a-5d96-4fb
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):96120
              Entropy (8bit):6.440691568981583
              Encrypted:false
              SSDEEP:1536:dkb0wrlWxdV4tyfa/PUFSAM/HQUucN2f0MFOqH+F3fecbTUEuvw:dWD4eUp+HQpcNg0MFnH+F3fecbTUED
              MD5:4A365FFDBDE27954E768358F4A4CE82E
              SHA1:A1B31102EEE1D2A4ED1290DA2038B7B9F6A104A3
              SHA-256:6A0850419432735A98E56857D5CFCE97E9D58A947A9863CA6AFADD1C7BCAB27C
              SHA-512:54E4B6287C4D5A165509047262873085F50953AF63CA0DCB7649C22ABA5B439AB117A7E0D6E7F0A3E51A23E28A255FFD1CA1DDCE4B2EA7F87BCA1C9B0DBE2722
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~.[...[...[.......Y...R...P...[...w.......V.......K.......D.......Z......Z.......Z...Rich[...................PE..d....R^`.........." .........^......`.....................................................`A.........................................A..4....I...............`..L....T..x#..........H,..T............................,..8............................................text............................... ..`.rdata...?.......@..................@..@.data...@....P.......<..............@....pdata..L....`.......@..............@..@_RDATA.......p.......L..............@..@.rsrc................N..............@..@.reloc...............R..............@..B........................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):65200
              Entropy (8bit):5.9323786300662364
              Encrypted:false
              SSDEEP:768:AKHUoSSSKuyDjnU8qHM60BWqJszOjzBa36SWlSQHRIyYnqRTqDG4y3dhU:As3SnKJXY+k6SWlJHRIyYnaTuy3M
              MD5:86C1FA7F84E05043885F0E510508D409
              SHA1:397806FDB6DBF7C513C18B0E56032E0EDDF4A250
              SHA-256:69A7E18B4284AEE2D796320CB81079ED4419D643DC58F342E2BEE83EEF1F215B
              SHA-512:9BE67AF77324ADD7641D1D8717A8037ABC7D71573310B2DF593B6D502193CE07F7A17496ED6B01546D3B9428EAC1D043F8DECF25BE663F14D20C1402B162C76A
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........%e.ZD..ZD..ZD..S<..XD..60..XD..60..QD..60..RD..60..YD..0..YD...,..XD..ZD...D..0..[D..0..[D..0..[D..0..[D..RichZD..................PE..d...%3.`.........." .....`................................................... ......u~....`............................................P...@...d...................................@v..T............................v..8............p..0............................text....^.......`.................. ..`.rdata..0J...p...L...d..............@..@.data.... ..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):86704
              Entropy (8bit):6.416293565012624
              Encrypted:false
              SSDEEP:1536:5XZb8z78wjtQYeO9vDTwE0UaDnV8AQ6HiI37mZIyMVm/yH:5pAzjXeovDsE0UaDnaAQ6HiI3SZIyMVT
              MD5:E91B4F8E1592DA26BACACEB542A220A8
              SHA1:5459D4C2147FA6DB75211C3EC6166B869738BD38
              SHA-256:20895FA331712701EBFDBB9AB87E394309E910F1D782929FD65B59ED76D9C90F
              SHA-512:CB797FA758C65358E5B0FEF739181F6B39E0629758A6F8D5C4BD7DC6422001769A19DF0C746724FB2567A58708B18BBD098327BFBDF3378426049B113EB848E9
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[..>...m...m...m...m...ms..l...my.cm...ms..l...ms..l...ms..l...m..l...mD..l...m...m...m..l...m..l...m.am...m..l...mRich...m........PE..d...=3.`.........." .........f.......................................................^....`.........................................`&..H....&.......`.......P..4....6.......p...... ...T...............................8...............@............................text............................... ..`.rdata...B.......D..................@..@.data........@......................@....pdata..4....P....... ..............@..@.rsrc........`.......*..............@..@.reloc.......p.......4..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182784
              Entropy (8bit):6.123947589239671
              Encrypted:false
              SSDEEP:3072:KJcN7azt7descS8vxkLt1kIvpUf3jntNoSTL9KL9hCG/43PDisnpc:K+N45axmDkIyjn3oSTL8LnCo4/2snp
              MD5:8FAD23C4023A62718AB512B31A58BAA0
              SHA1:3539B76E7CEC9B73492F5C588FC80C424918EB82
              SHA-256:5DBADAE6FFF1FBFCAC1937D3F0D38A75FE61CE2968240193F3EBD35D00E41EA9
              SHA-512:D02BFDDF9B21E474EB1B43D338FF14E573F6639A67C4F9D8CA5D2B53EDF13317107F42E660C3596D91650DBBFF6863E12EE17C459C26AA4A0DA708D6A80DAB53
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7.ds..7s..7s..7z.~7...7!..6q..7.,*7w..7!..6x..7!..6{..7!..6p..7...6w..7...6p..7s..7...7...6w..7z.x7r..7...6r..7...7r..7...6r..7Richs..7........PE..d...(q%`.........." .........Z......d........................................@............`.............................................h...h........ .......................0......`................................................................................text............................... ..`.rdata...t.......v..................@..@.data........0......................@....pdata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):127152
              Entropy (8bit):5.9089192759969915
              Encrypted:false
              SSDEEP:3072:IK4a96ls/T8YMsxV2Y88BonwW6frZ90wVGG1IyBP0n1:v76lswYrE8BHfrZJcGI1
              MD5:6FE3827E6704443E588C2701568B5F89
              SHA1:AC9325FD29DEAD82CCD30BE3EE7EE91C3AAEB967
              SHA-256:73ACF2E0E28040CD696255ABD53CAAA811470B17A07C7B4D5A94F346B7474391
              SHA-512:BE2502C006A615DF30E61BEA138BD1AFCA30640F39522D18DB94DF293C71DF0A86C88DF5FD5D8407DAF1CCEA6FAC012D086212A3B80B8C32EDE33B937881533A
              Malicious:false
              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........t6...X...X...X..m...X..aY...X..a]...X..a\...X..a[...X..aY...X..}\...X..}Y...X.@|Y...X...Y.2.X..aU...X..aX...X..a....X..aZ...X.Rich..X.........................PE..d...63.`.........." ................._....................................... ............`.........................................pt.......t.......................................,..T........................... -..8............ ...............................text...5........................... ..`.rdata..rp... ...r..................@..@.data...D?.......:...x..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):271024
              Entropy (8bit):6.526193734528701
              Encrypted:false
              SSDEEP:6144:1y+R2gXaCSVl9yYWDKsSaHlbVTimGDIrfp/AQx9qWMa3pLW1Aqe36bMNrCb:fXaCSr9kDjv//0OnDrCb
              MD5:65287FD87A64BC756867A1AFDDEC9E29
              SHA1:CDA1DB353F81DF7A4A818ADD8F87BCA9AC840455
              SHA-256:DF19C2E6EC3145166FA8D206C11DB78BC1979A027105C4F21D40410B5082BA34
              SHA-512:3E3F19CF965B260FFC68E45D5101234E8A957411C076A0D487D307DCFA714A9801CB501224FE7621937AEBDF90275F655C8A70DD6675BCFB5374404FDA53236F
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q..H0.H0.H0.AH@.F0.$D.J0.$D.D0.$D.@0.$D.L0..D.K0..X.J0.H0..0..D.I0..D.G0..D.I0..D,.I0..D.I0.RichH0.........................PE..d...+3.`.........." .........H...............................................@............`.........................................p...P............ ..........X,...........0..`...p...T...............................8...............(............................text............................... ..`.rdata..............................@..@.data...X*.......$..................@....pdata..X,..........................@..@.rsrc........ ......................@..@.reloc..`....0......................@..B........................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):66224
              Entropy (8bit):6.0452398780318815
              Encrypted:false
              SSDEEP:768:Pyz+AYBOBSFlUx/tF5IzZL0fpde9E9GD2Fe7POoJp3RIyYIeqDG4yvOhz:QfBSbyFy1kumGM4Oo/RIyYIeuyvy
              MD5:7C69CB3CB3182A97E3E9A30D2241EBED
              SHA1:1B8754FF57A14C32BCADC330D4880382C7FFFC93
              SHA-256:12A84BACB071B1948A9F751AC8D0653BA71A8F6B217A69FE062608E532065C20
              SHA-512:96DBABBC6B98D473CBE06DCD296F6C6004C485E57AC5BA10560A377393875192B22DF8A7103FE4A22795B8D81B8B0AE14CE7646262F87CB609B9E2590A93169E
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?...^..^..^..&e.^...*..^...*..^...*..^...*..^..S*..^...6..^../7..^..^...^..S*..^..S*..^..S*..^..S*..^..Rich.^..........PE..d...>3.`.........." .....d..........XC.......................................0.......T....`.............................................P.................................... ..........T...........................P...8............................................text....b.......d.................. ..`.rdata..8R.......T...h..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):162992
              Entropy (8bit):6.767227461585096
              Encrypted:false
              SSDEEP:3072:ajV4pA1vcDRI45a4I9ihQsDPGAznfo9mNo6ndir1NZIyD1UsVM:ajV4pA10Dj5azDePlwYO6cr1NFVM
              MD5:493C33DDF375B394B648C4283B326481
              SHA1:59C87EE582BA550F064429CB26AD79622C594F08
              SHA-256:6384DED31408788D35A89DC3F7705EA2928F6BBDEB8B627F0D1B2D7B1EA13E16
              SHA-512:A4A83F04C7FC321796CE6A932D572DCA1AD6ECEFD31002320AEAA2453701ED49EF9F0D9BA91C969737565A6512B94FBB0311AEE53D355345A03E98F43E6F98B2
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Q...0.C.0.C.0.C.HMC.0.C.D.B.0.C.D.B.0.C.D.B.0.C.D.B.0.C>D.B.0.C.X.B.0.C.0.C.0.C>D.B.0.C>D.B.0.C>D!C.0.C>D.B.0.CRich.0.C........PE..d...F3.`.........." .....|...........2....................................................`..........................................6..L....7..x............`.......`..........4...x...T..............................8...............8............................text...}z.......|.................. ..`.rdata..............................@..@.data........P.......4..............@....pdata.......`.......<..............@..@.rsrc................T..............@..@.reloc..4............^..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):29872
              Entropy (8bit):6.102055590747654
              Encrypted:false
              SSDEEP:768:JKDJ9dDNuE/erqCp7ThIyAtOfDG4yxN334eh5:JU3vCp7ThIyAtO5yD334m
              MD5:9DBDAD4F13B8E097D6AF69085C2DC3B1
              SHA1:7DA46E5C06818FEA1F548786F06CB5E461966164
              SHA-256:A1FECBDA3B6C6FBD6B231E259F556E9543C9B87F1E976F3BE13032475B328E3E
              SHA-512:4412D67F056FD20E76D69652BB4F6621E93C60CDB6BCE3AB278D27F52521AE92F02FD0ED4B02D2672D4D2BE70020961CFD24700F8B638B12772D766CD184AA75
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........-...C...C...C.......C..B...C..F...C..G...C..@...C.e.B...C..B...C...B...C.e.N...C.e.C...C.e.....C.e.A...C.Rich..C.................PE..d...)3.`.........." ....."...8......X................................................f....`.........................................0Q..`....Q..x............p.......X...............C..T............................C..8............@...............................text...s .......".................. ..`.rdata.......@.......&..............@..@.data...x....`.......B..............@....pdata.......p.......H..............@..@.rsrc................L..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):46256
              Entropy (8bit):6.1059949669261995
              Encrypted:false
              SSDEEP:768:F1zGldYi+3B7U3Nw6GCUoYWEnaxPRhXjxbwG0NIyttkTDG4y4uhEH:TqlqMw6XRhXjxUHNIyttkFy4F
              MD5:0D41B13272BDF3655470F280009A67E5
              SHA1:47285CA0A012FA747EC0F441266C88792847842B
              SHA-256:8CD7E2C9892146816357C3E045AB7571959F6355F17A2CC6D8E72C184D67BE2D
              SHA-512:2DB7D0F2210798BBA2FD416876EE2F212C1D153D839F38660E7D0C6E2B5E51D96C7D400B3A477DA02AA5027A3701DA4341BF96A393997851C79A2AE9FB686945
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P-q..L...L...L...4...L..x8...L..x8...L..x8...L..x8...L...8...L..O$...L..O$...L...L..gL...8...L...8...L...8...L...8...L..Rich.L..................PE..d...)3.`.........." .....B...X......X...............................................$i....`.............................................X.......................................... g..T............................g..8............`...............................text....A.......B.................. ..`.rdata...5...`...6...F..............@..@.data...p............|..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):29360
              Entropy (8bit):6.094957437173975
              Encrypted:false
              SSDEEP:384:sm9U+03+lESFJvU2S66m6rEO3ay3njs+cEp1IymU/XDG4y8fvRhn:sbOES/v76rEO3XA01IymU/XDG4yyhn
              MD5:103A38F7FBF0DA48B8611AF309188011
              SHA1:1DB9E2CB2A92243DA12EFDCA617499EB93DDCBF8
              SHA-256:3BC50AC551635B9CE6FBCDDEA5D3D621C1216E49E9958FA24546AB8F6F2D111A
              SHA-512:2E6C4B9786034CBF6A6D94761ED31807657EE10EDD679147C838A2E6E97A0C13ACD6E59BC6E69EDF1CA725F12E0F972A0DE0AE4B331DA46DCCD687C59096A250
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........%y.ZD..ZD..ZD..S<..XD..60..XD..60..QD..60..RD..60..YD..0..YD...,..XD..ZD...D..0..[D..0..[D..0..[D..0..[D..RichZD..................PE..d...)3.`.........." .........:......................................................eZ....`.........................................`C..L....C..d....p.......`..0....V..............03..T............................3..8............0..@............................text............................... ..`.rdata..h....0......."..............@..@.data... ....P.......@..............@....pdata..0....`.......F..............@..@.rsrc........p.......J..............@..@.reloc...............T..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):80048
              Entropy (8bit):6.145505737856069
              Encrypted:false
              SSDEEP:1536:AeG2cHel7zjv5Qe9AM9/s+m+p7ncSrpZjxk1IyBwayyq:3IyzjeMAM9/sb+p4Srbji1IyBwD
              MD5:FD1CFE0F0023C5780247F11D8D2802C9
              SHA1:5B29A3B4C6EDB6FA176077E1F1432E3B0178F2BC
              SHA-256:258A5F0B4D362B2FED80B24EEABCB3CDD1602E32FF79D87225DA6D15106B17A6
              SHA-512:B304A2E56829A557EC401C6FDDA78D6D05B7495A610C1ED793D6B25FC5AF891CB2A1581ADDB27AB5E2A6CB0BE24D9678F67B97828015161BC875DF9B7B5055AE
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......j...........'.p.(..B..,..B.."..B..&..B..-.....,..u..)........../...../....../...../..Rich...................PE..d...;3.`.........." .....z...........(.......................................`.......=....`.........................................p...P............@.......0...............P..........T...........................P...8............................................text...ny.......z.................. ..`.rdata...y.......z...~..............@..@.data...(...........................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):155312
              Entropy (8bit):5.918851042776296
              Encrypted:false
              SSDEEP:3072:l+W5d6jjX0XH4OAskKCiiII27uUh+9xFq7SwH70NmHh4kwooSLteSdN1qZIyM7s:lx6jjX0XYzskKPVTh+9K7SKDthN1qf
              MD5:34B1D4DB44FC3B29E8A85DD01432535F
              SHA1:3189C207370622C97C7C049C97262D59C6487983
              SHA-256:E4AA33B312CEC5AA5A0B064557576844879E0DCCC40047C9D0A769A1D03F03F6
              SHA-512:F5F3DCD48D01AA56BD0A11EEE02C21546440A59791CED2F85CDAC81DA1848EF367A93EF4F10FA52331EE2EDEA93CBCC95A0F94C0CCEFA5D19E04AE5013563AEE
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......te{.0...0...0...9|..6...\p..2...\p..<...\p..8...\p..3....p..2....m..4...kl..7...0...H....p..2....p..1....p.1....p..1...Rich0...........PE..d...?3.`.........." .........................................................p.......]....`.............................................d...d........P.......@.......B.......`..........T...............................8............................................text............................... ..`.rdata..............................@..@.data... n.......h..................@....pdata.......@....... ..............@..@.rsrc........P.......*..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):65200
              Entropy (8bit):6.1078700126055905
              Encrypted:false
              SSDEEP:1536:Xt4SobA0t0FFdm6hcB0Dy8ahRIyYSOyKk50:Xt4So+FFdmFeDy8ahRIyYSM
              MD5:0B6EC42276CBBF7AAFCDE5B0F72211F4
              SHA1:2F9D09AB988A269C44DF080224851DD880371D78
              SHA-256:AC4262AAA4689A0E08F6F03AF3928491D023C8B65FCFBF6A030DD884F3900150
              SHA-512:265317961130C9CBEE5EE6982D21446BC3ED3FD2A57BD6F60909E082C39F26B44B8A974430B4F841CDFABA4217A559568A009B996308BA4173D7FBE1C3FE8C15
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........T.|GT.|GT.|G]..GR.|G8.}FV.|G8.yFX.|G8.xF\.|G8..FW.|G..}FV.|G..}FV.|G8.}FQ.|GT.}G..|G..qFV.|G..|FU.|G...GU.|G..~FU.|GRichT.|G........................PE..d...>3.`.........." .....z...j............................................... .......k....`.............................................P...................................... ......T...........................0...8............................................text....x.......z.................. ..`.rdata...C.......D...~..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc.. ...........................@..B........................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):23216
              Entropy (8bit):6.183096205405836
              Encrypted:false
              SSDEEP:384:itQgc54ikl76mV5+cEMj9ZIyDw0DG4y8yFho:iLFlbV5T5ZIyDw0DG4yrho
              MD5:71AB50EF5E336B855E6289B0AC3E712D
              SHA1:E06C3B0D482623393D2E2179DE0FF56EB99C4240
              SHA-256:6F1CC2D6A770F1B441DC6371DECAE414EA1BD509B0E37B423FAA33FC98A28B7E
              SHA-512:345B4D664F3BC29CFB743A95F78898651F8D3D1AC1365B89690068888202EE58F59F341466F26BB94BD568B67F2D3FCF2E5F022C9C25F2CA25D5BAF0AA514682
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........p...................................................3.......................3.......3.......3.......3.......Rich............PE..d...-3.`.........." .........(......x................................................l....`..........................................9..L....9..x....`.......P..|....>.......p..8...L2..T............................2..8............0..p............................text............................... ..`.rdata.......0......................@..@.data........@.......,..............@....pdata..|....P......................@..@.rsrc........`.......2..............@..@.reloc..8....p.......<..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):781411
              Entropy (8bit):5.4731555046863525
              Encrypted:false
              SSDEEP:12288:KShiaAQIA3DyEfpgVpQcosQNRs54PK4ItijrVwHLfVEhOJ7iStE0c:7hiafOlQcosQNRs54PK4ItyVwHLfVEhP
              MD5:DC1B529C08922E4812F714899D15B570
              SHA1:4AAE3300CB3556033E22CDB47B65D1518C4DD888
              SHA-256:FACA55BA76983313BC00E8044BE99332C13B58398C377C09108999D6BF339A6A
              SHA-512:2AED265D4723A8E97AC2FBED6BAE1475605631F67F7987CA464B7C582B45D4CABB82AE0928396C0F756257E2C09C9B583B08BF36622F7A7694EA856101FB825C
              Malicious:false
              Preview:PK..........!...#............_bootlocale.pyca.......C.O.o..v.....................@....x...d.Z.d.d.l.Z.d.d.l.Z.e.j...d...r,d.d.d...Z.nHz.e.j...W.n2..e.yh......e.e.d...rZd.d.d...Z.n.d.d.d...Z.Y.n.0.d.d.d...Z.d.S.)...A minimal subset of the locale module used at interpreter startup.(imported by the _io module), in order to reduce startup time...Don't import directly from third-party code; use the `locale` module instead!......N..winTc....................C........t.j.j.r.d.S.t.....d...S.).N..UTF-8.........sys..flags..utf8_mode.._locale.._getdefaultlocale....do_setlocale..r......_bootlocale.py..getpreferredencoding...............r......getandroidapilevelc....................C........d.S.).Nr....r....r....r....r....r....r...............c....................C........t.j.j.r.d.S.d.d.l.}.|...|...S.).Nr....r......r....r....r......localer......r....r....r....r....r....r.....................c....................C....6...|.r.J...t.j.j.r.d.S.t...t.j...}.|.s2t.j.d.k.r2d.}.|.S.).Nr......darwin..r....
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4
              Entropy (8bit):1.5
              Encrypted:false
              SSDEEP:3:Mn:M
              MD5:365C9BFEB7D89244F2CE01C1DE44CB85
              SHA1:D7A03141D5D6B1E88B6B59EF08B6681DF212C599
              SHA-256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508
              SHA-512:D220D322A4053D84130567D626A9F7BB2FB8F0B854DA1621F001826DC61B0ED6D3F91793627E6F0AC2AC27AEA2B986B6A7A63427F05FE004D8A2ADFBDADC13C1
              Malicious:false
              Preview:pip.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):323
              Entropy (8bit):4.554768229532207
              Encrypted:false
              SSDEEP:6:h9Co8FyQjkDYc5tWreLBF/pn2mHr2DASvUSBT5+FL8tjivzn:h9aVM/mrGzRsvUSBT5+J8li7n
              MD5:BF405A8056A6647E7D077B0E7BC36ABA
              SHA1:36C43938EFD5C62DDEC283557007E4BDFB4E0797
              SHA-256:43DAD2CC752AB721CD9A9F36ECE70FB53AB7713551F2D3D8694D8E8C5A06D6E2
              SHA-512:16590110B2F659D9C131B2093E05D30919A67368154305DCFE8D54FB88525F49F9F9F385A77BA5BCBEA8092061011D72B1BCC65CDC784BCFDDE10CE4DCE5586F
              Malicious:false
              Preview:This software is made available under the terms of *either* of the licenses.found in LICENSE.APACHE or LICENSE.BSD. Contributions to cryptography are made.under the terms of *both* these licenses...The code used in the OS random engine is derived from CPython, and is licensed.under the terms of the PSF License Agreement..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11360
              Entropy (8bit):4.426756947907149
              Encrypted:false
              SSDEEP:192:nUDG5KXSD9VYUKhu1JVF9hFGvV/QiGkS594drFjuHYx5dvTrLh3kTSEnQHbHR:UIvlKM1zJlFvmNz5VrlkTS0QHt
              MD5:4E168CCE331E5C827D4C2B68A6200E1B
              SHA1:DE33EAD2BEE64352544CE0AA9E410C0C44FDF7D9
              SHA-256:AAC73B3148F6D1D7111DBCA32099F68D26C644C6813AE1E4F05F6579AA2663FE
              SHA-512:F451048E81A49FBFA11B49DE16FF46C52A8E3042D1BCC3A50AAF7712B097BED9AE9AED9149C21476C2A1E12F1583D4810A6D36569E993FE1AD3879942E5B0D52
              Malicious:false
              Preview:. Apache License. Version 2.0, January 2004. https://www.apache.org/licenses/.. TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. 1. Definitions... "License" shall mean the terms and conditions for use, reproduction,. and distribution as defined by Sections 1 through 9 of this document... "Licensor" shall mean the copyright owner or entity authorized by. the copyright owner that is granting the License... "Legal Entity" shall mean the union of the acting entity and all. other entities that control, are controlled by, or are under common. control with that entity. For the purposes of this definition,. "control" means (i) the power, direct or indirect, to cause the. direction or management of such entity, whether by contract or. otherwise, or (ii) ownership of fifty percent (50%) or more of the. outstanding shares, or (iii) beneficial ow
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1532
              Entropy (8bit):5.058591167088024
              Encrypted:false
              SSDEEP:24:MjUnoorbOFFTJJyRrYFTjzMbmqEvBTP4m96432s4EOkUTKQROJ32s3yxsITf+3tY:MkOFJSrYJsaN5P406432svv32s3EsIqm
              MD5:5AE30BA4123BC4F2FA49AA0B0DCE887B
              SHA1:EA5B412C09F3B29BA1D81A61B878C5C16FFE69D8
              SHA-256:602C4C7482DE6479DD2E9793CDA275E5E63D773DACD1ECA689232AB7008FB4FB
              SHA-512:DDBB20C80ADBC8F4118C10D3E116A5CD6536F72077C5916D87258E155BE561B89EB45C6341A1E856EC308B49A4CB4DBA1408EABD6A781FBE18D6C71C32B72C41
              Malicious:false
              Preview:Copyright (c) Individual contributors..All rights reserved...Redistribution and use in source and binary forms, with or without.modification, are permitted provided that the following conditions are met:.. 1. Redistributions of source code must retain the above copyright notice,. this list of conditions and the following disclaimer... 2. Redistributions in binary form must reproduce the above copyright. notice, this list of conditions and the following disclaimer in the. documentation and/or other materials provided with the distribution... 3. Neither the name of PyCA Cryptography nor the names of its contributors. may be used to endorse or promote products derived from this software. without specific prior written permission...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2415
              Entropy (8bit):5.015031803022437
              Encrypted:false
              SSDEEP:48:xUXyp7TEJzIXFCPXB/XF/gwHsV3XF2iDaGkiCXF1u0A2s/8AMUiioTqNyPhIXF+v:KXG3EJ0EPX9rsV3ZdkZ8oAShTkyZIYAw
              MD5:43C37D21E1DBAD10CDDCD150BA2C0595
              SHA1:ACF6B1628B04FE43A99071223CDBD7B66691C264
              SHA-256:693EC0A662B39F995A4F252B03A6222945470C1B6F12CA02918E4EFE0DF64B9F
              SHA-512:96D7C63AD24F7543599F0FED919948E486B35D01694BE02D980A8BA3D2A8B5A0E42341D940841D3528F56F09A582D32B3E81DED44BB3AAD1874C92650CB08129
              Malicious:false
              Preview:1. This LICENSE AGREEMENT is between the Python Software Foundation ("PSF"), and. the Individual or Organization ("Licensee") accessing and otherwise using Python. 2.7.12 software in source or binary form and its associated documentation...2. Subject to the terms and conditions of this License Agreement, PSF hereby. grants Licensee a nonexclusive, royalty-free, world-wide license to reproduce,. analyze, test, perform and/or display publicly, prepare derivative works,. distribute, and otherwise use Python 2.7.12 alone or in any derivative. version, provided, however, that PSF's License Agreement and PSF's notice of. copyright, i.e., "Copyright . 2001-2016 Python Software Foundation; All Rights. Reserved" are retained in Python 2.7.12 alone or in any derivative version. prepared by Licensee...3. In the event Licensee prepares a derivative work that is based on or. incorporates Python 2.7.12 or any part thereof, and wants to make the. derivative work available to ot
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5068
              Entropy (8bit):5.0767027743711175
              Encrypted:false
              SSDEEP:96:DDBVZ4WQIUQIhQIKQILbQIRIaMmPktxsx/1A0ivAEYaCjF04rpklE2jQech5mjvj:tacPuPXs/u0ivAEYaCjF04rpklE2jE03
              MD5:F89EE8FFEF0A28D582AF8DA07F10F449
              SHA1:A7E540951AEC2B3DEF08BF02971DA0C68A8EE473
              SHA-256:D891175FF4148ED895B44B48CEA2777FFED33366D6D44323F2DF877375E56FCF
              SHA-512:AF2E1CBBA38758245E41C12A95C359A623CB9010595037097EF1C22ED4417BEDB760DA59A4DF0B01A58958BF5120CC52E3F1BA5DA93980EA333F4B63B444DECA
              Malicious:false
              Preview:Metadata-Version: 2.1.Name: cryptography.Version: 3.4.7.Summary: cryptography is a package which provides cryptographic recipes and primitives to Python developers..Home-page: https://github.com/pyca/cryptography.Author: The Python Cryptographic Authority and individual contributors.Author-email: cryptography-dev@python.org.License: BSD or Apache License, Version 2.0.Platform: UNKNOWN.Classifier: Development Status :: 5 - Production/Stable.Classifier: Intended Audience :: Developers.Classifier: License :: OSI Approved :: Apache Software License.Classifier: License :: OSI Approved :: BSD License.Classifier: Natural Language :: English.Classifier: Operating System :: MacOS :: MacOS X.Classifier: Operating System :: POSIX.Classifier: Operating System :: POSIX :: BSD.Classifier: Operating System :: POSIX :: Linux.Classifier: Operating System :: Microsoft :: Windows.Classifier: Programming Language :: Python.Classifier: Programming Language :: Python :: 3.Classifier: Programming Language ::
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):16213
              Entropy (8bit):5.520129217250054
              Encrypted:false
              SSDEEP:384:VXcPglOZWGDOwfMd8dN0lz8R7dpCNOvUeoMBN:VonPkbeN
              MD5:4E6AF12DAA7C3C3AB9E0B079AF4A26C4
              SHA1:13B0D3057E62A848D4D34D3D3FD1E63FFFB426A2
              SHA-256:91EACC10C535004D2DC303C2B8436B30798333F1DCF00E8243542EFBF7D8C7AE
              SHA-512:153FB1D0BE146542AFC583C79C5210C15ED6298D0CEF672B924FE9390AC9C89D575CF52C34CC8E3CF843109EC282FFEE8DCE7F36FC573DC88079E81D25E178CD
              Malicious:false
              Preview:cryptography-3.4.7.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4..cryptography-3.4.7.dist-info/LICENSE,sha256=Q9rSzHUqtyHNmp827OcPtTq3cTVR8tPYaU2OjFoG1uI,323..cryptography-3.4.7.dist-info/LICENSE.APACHE,sha256=qsc7MUj20dcRHbyjIJn2jSbGRMaBOuHk8F9leaomY_4,11360..cryptography-3.4.7.dist-info/LICENSE.BSD,sha256=YCxMdILeZHndLpeTzaJ15eY9dz2s0eymiSMqtwCPtPs,1532..cryptography-3.4.7.dist-info/LICENSE.PSF,sha256=aT7ApmKzn5laTyUrA6YiKUVHDBtvEsoCkY5O_g32S58,2415..cryptography-3.4.7.dist-info/METADATA,sha256=2JEXX_QUjtiVtEtIzqJ3f_7TM2bW1EMj8t-Hc3Xlb88,5068..cryptography-3.4.7.dist-info/RECORD,,..cryptography-3.4.7.dist-info/REQUESTED,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0..cryptography-3.4.7.dist-info/WHEEL,sha256=JPKSD7xGWsxAONUKQHSxETBJiRc79CNcZN6uTQD0kbc,100..cryptography-3.4.7.dist-info/top_level.txt,sha256=rR2wh6A6juD02TBZNJqqonh8x9UP9Sa5Z9Hl1pCPCiM,31..cryptography/__about__.py,sha256=qu_NKv71xggkNazDGdBaYST79u_xvuqrnNA3Pm2eH9Q,805..cryptography/__ini
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):100
              Entropy (8bit):4.992787665793268
              Encrypted:false
              SSDEEP:3:RtEeX7MWcSlViHoKKjP+tkKc5vKQLn:RtBMwlViQWK/SQLn
              MD5:1F51F8DE060499863E7D043C14E4DDDC
              SHA1:B4A2A54D8066BF13E2C9FA87157E81DCC2496189
              SHA-256:24F2920FBC465ACC4038D50A4074B111304989173BF4235C64DEAE4D00F491B7
              SHA-512:2B82A71D3BEF962A3E0D86FBB0F90CFF2D81BE90820E2908D0FB680A800C2139E67F57146878D511E30EEFB55A93DBBAAF38A2BA9443E6E37A4FB889429D683E
              Malicious:false
              Preview:Wheel-Version: 1.0.Generator: bdist_wheel (0.36.2).Root-Is-Purelib: false.Tag: cp36-abi3-win_amd64..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):31
              Entropy (8bit):3.962103165155795
              Encrypted:false
              SSDEEP:3:DA1JjBHvAYuOv:DUOev
              MD5:62246E29EB9A005B743A15C18FE944DD
              SHA1:10A5E354DAA692FF714D3C49BED348ABD8A485C7
              SHA-256:AD1DB087A03A8EE0F4D93059349AAAA2787CC7D50FF526B967D1E5D6908F0A23
              SHA-512:F16FDA3B0A05A1B5F7D8F63E8A223B27CA4689F559D4A00357E129ECB24AD3E8B4519A70D59919DE8D93ADC8AD3B0EAF05192E3D18CE876D7DCA13ED498A0FCC
              Malicious:false
              Preview:_openssl._padding.cryptography.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3116544
              Entropy (8bit):6.665811356408746
              Encrypted:false
              SSDEEP:49152:gyVwASOiGtlq1EIU6iRgLj1MKxwzoZ7r0qPDCtur29mmPDp6X/EId7X:EL+Aj91s86dmcp6X/EId7X
              MD5:3F55712682AC3CC3C01131D946FE1F8D
              SHA1:1339E820FB7765D57BE51A7020D2BCE54FEEFA7A
              SHA-256:40F5647C2F6183520ADEA109B6B5E17795065C5B9601E379F7B8259BCAA35767
              SHA-512:D2533207376D153C7F861D1E9B62F00CBD193DDFC51BBDA182C20726AD116B8C6CB31C2B85EFC13C41A581C1E6A5F803BBCB6814031EE77F64B2F41CD99FCF89
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........H..GH..GH..GA.zGZ..G$..FJ..G$..FD..G$..F@..G$..FL..G...FJ..G\..FE..GH..G...GH..GT..G...F~..G...FI..G...FI..G...GI..G...FI..GRichH..G................PE..d.....\`.........." .....H"..|................................................0...........`......................................... G,.P...pG,.h....p/...... ...C............/.X}..8.*.............................`.*.8............`"..............................text....F"......H"................. ..`.rdata..,....`"......L".............@..@.data.......`,......H,.............@....pdata...C... ...D....-.............@..@.rsrc........p/......./.............@..@.reloc..X}..../..~..../.............@..B........................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):13824
              Entropy (8bit):5.022002700113301
              Encrypted:false
              SSDEEP:192:PazStvNK3z4vq6lU4NMf1yl1obERPoVk2cmjDLU/8t:PPN60C6C4NMf1KOgmVk2XLU/8t
              MD5:4054E5A3334D18EF458076CA479ECE5A
              SHA1:C4613D2432E6F1D27017D4430A163DD11B72C950
              SHA-256:F9CF98F1102ACE4C2FAA261887AD1726000F7F70871F0B932408CF527A7C23F3
              SHA-512:715559A5D892F4B850B66AAB8589C5B5A0D1EBB1F5D12AFF4FB0079DD726C7A5B8CECBC47D73A015947B39284317D27C12642B177D629C0C44CA376634E8B075
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........vP........................................................................^.......^.......^.......^.......Rich............................PE..d.....\`.........." ........."......T.....................................................`..........................................8..P....8..d....`.......P..(............p..8....2...............................2..8............0..H............................text............................... ..`.rdata.......0......................@..@.data...X....@.......,..............@....pdata..(....P......................@..@.rsrc........`.......2..............@..@.reloc..8....p.......4..............@..B................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3406016
              Entropy (8bit):6.095119740432485
              Encrypted:false
              SSDEEP:98304:ZX+SicVMcqx5q6ypQ821CPwDv3uFfJwwzS:1FicVMcqx5q6yX21CPwDv3uFfJwwz
              MD5:89511DF61678BEFA2F62F5025C8C8448
              SHA1:DF3961F833B4964F70FCF1C002D9FD7309F53EF8
              SHA-256:296426E7CE11BC3D1CFA9F2AEB42F60C974DA4AF3B3EFBEB0BA40E92E5299FDF
              SHA-512:9AF069EA13551A4672FDD4635D3242E017837B76AB2815788148DD4C44B4CF3A650D43AC79CD2122E1E51E01FB5164E71FF81A829395BDB8E50BB50A33F0A668
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x...<.<.<.5.;...n...>.n...7.n...4.n...?.g...7.<.......!.....E.....=...W.=.....=.Rich<.................PE..d....El`.........." .....f$..........s........................................4......F4...`..............................................h...3.@.....3.|.....1.......3.......4..O...~,.8........................... .,...............3..............................text....d$......f$................. ..`.rdata........$......j$.............@..@.data....z...p1..,...L1.............@....pdata..d.....1......x1.............@..@.idata...#....3..$...43.............@..@.00cfg........3......X3.............@..@.rsrc...|.....3......Z3.............@..@.reloc...x....4..z...b3.............@..B........................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):32792
              Entropy (8bit):6.3566777719925565
              Encrypted:false
              SSDEEP:384:2nypDwZH1XYEMXvdQOsNFYzsQDELCvURDa7qscTHstU0NsICwHLZxXYIoBneEAR8:2l0Vn5Q28J8qsqMttktDxOpWDG4yKRF
              MD5:EEF7981412BE8EA459064D3090F4B3AA
              SHA1:C60DA4830CE27AFC234B3C3014C583F7F0A5A925
              SHA-256:F60DD9F2FCBD495674DFC1555EFFB710EB081FC7D4CAE5FA58C438AB50405081
              SHA-512:DC9FF4202F74A13CA9949A123DFF4C0223DA969F49E9348FEAF93DA4470F7BE82CFA1D392566EAAA836D77DDE7193FED15A8395509F72A0E9F97C66C0A096016
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.3.r}]Ar}]Ar}]A{..Ap}]A .\@p}]A..\@q}]Ar}\AU}]A .X@~}]A .Y@z}]A .^@q}]A..Y@t}]A..^@s}]A..]@s}]A.._@s}]ARichr}]A........................PE..d......].........." .....F...$.......I....................................................`..........................................j.......m..P....................f...............b...............................b...............`.. ............................text....D.......F.................. ..`.rdata..H....`.......J..............@..@.data................^..............@....pdata...............`..............@..@.reloc...............d..............@..B................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):690368
              Entropy (8bit):5.529996741069741
              Encrypted:false
              SSDEEP:12288:XXnznrSRNaJkxbpdM2QJCCMHxtfz8Irj0R6wQHPRv8Fl4tekY2U2lvz:vSTxbpd/Rrj0R6nd+SJnU2lvz
              MD5:50BCFB04328FEC1A22C31C0E39286470
              SHA1:3A1B78FAF34125C7B8D684419FA715C367DB3DAA
              SHA-256:FDDD0DA02DCD41786E9AA04BA17BA391CE39DAE6B1F54CFA1E2BB55BC753FCE9
              SHA-512:370E6DFD318D905B79BAF1808EFBF6DA58590F00006513BDAAED0C313F6FA6C36F634EA3B05F916CEE59F4DB25A23DD9E6F64CAF3C04A200E78C193027F57685
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...BkT.BkT.BkT.:.T.BkT.*jU.BkT.*jU.BkT.*nU.BkT.*oU.BkT.*hU.BkT(+jU.BkT.BjThCkT(+oU.BkT(+kU.BkT(+.T.BkT(+iU.BkTRich.BkT........................PE..d....El`.........." .....*...H.......%...................................................`..............................................N..05..........s........K...l..........L.......8........................... ................ ..0............................text....(.......*.................. ..`.rdata...%...@...&..................@..@.data...!M...p...D...T..............@....pdata..`T.......V..................@..@.idata...V... ...X..................@..@.00cfg...............F..............@..@.rsrc...s............H..............@..@.reloc..5............P..............@..B................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):192176
              Entropy (8bit):6.324569903225762
              Encrypted:false
              SSDEEP:3072:YwabphO7kuk/yXzSEDSNh/tTRxbqvxvLmFqhMY+2ZyHI2X+juhSOOu+QL7faWk7b:YjbS7kuk/ogh/tTzWLwXmyHv+rwLL27b
              MD5:96D55E550EB6F991783ECE2BCA53583D
              SHA1:7B46EAAE4E499A1F6604D3C81A85A0B827CC0B9E
              SHA-256:F5D8188C6674CBD814ABD1E0DD4E5A8BFADB28E31B5088AE6C4346473B03D17E
              SHA-512:254B926690A565BC31CAE88183745397C99D00B5D5417AB517A8762C8874DFF8FCC30A59BDA1CD41B0E19E2D807AC417293A3A001005996A5D4DB43B9B14D5EB
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f.;f".U5".U5".U5+..5(.U5N.T4 .U5N.P4).U5N.Q4*.U5N.V4!.U5..T4 .U5y.T4!.U5".T5P.U5..X4&.U5..U4#.U5..5#.U5..W4#.U5Rich".U5................PE..d...03.`.........." ................................................................j.....`............................................P...@........................................5..T............................6..8............ ...............................text............................... ..`.rdata....... ......................@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):59568
              Entropy (8bit):5.903448863846082
              Encrypted:false
              SSDEEP:768:fn+mYEBMcEfpzVHBlAUcfc0la6Wc6kH/ZFJ1Yu+wNBECaOMyCgUhkb0E/GP1IyB3:f+mYEBMofwkK1IyB00yQIi
              MD5:E438F5470C5C1CB5DDBE02B59E13AD2C
              SHA1:EC58741BF0BE7F97525F4B867869A3B536E68589
              SHA-256:1DC81D8066D44480163233F249468039D3DE97E91937965E7A369AE1499013DA
              SHA-512:BD8012B167DD37BD5B57521CA91AD2C9891A61866558F2CC8E80BB029D6F7D73C758FB5BE7A181562640011E8B4B54AFA3A12434BA00F445C1A87B52552429D3
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............d...d...d.0.l...d.0.d...d.0.....d.0.f...d.Rich..d.................PE..d...%3.`.........." ................................................................._....`.........................................` ..<............................................ ..T............................................................................text............................... ..`.rdata..`.... ......................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4462768
              Entropy (8bit):6.436862397697842
              Encrypted:false
              SSDEEP:49152:Fj3PQkQ7o11Nr9feH8NoaGh5A9lhIrcoFHuGxOCrls2Xtu6rfPa7w3J1AfkovlBl:RQkQ7o/Qeef6K3AroFVvrHRMRLwbCP
              MD5:5CD203D356A77646856341A0C9135FC6
              SHA1:A1F4AC5CC2F5ECB075B3D0129E620784814A48F7
              SHA-256:A56AFCF5F3A72769C77C3BC43C9B84197180A8B3380B6258073223BFD72ED47A
              SHA-512:390008D57FA711D7C88B77937BF16FDB230E7C1E7182FAEA6D7C206E9F65CED6F2E835F9DA9BEFB941E80624ABE45875602E0E7AD485D9A009D2450A2A0E0F1F
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................... ........................N...............k..z..k.....k."....k.....Rich...........................PE..d....3.`.........." .....*#..n#.....DP........................................F.......D...`..........................................b<.....T(=.|....0F.......D.h/....C......@F..u...$.T........................... .$.8............@#.p............................text...T(#......*#................. ..`.rdata..p....@#.......#.............@..@.data...P....P=......<=.............@....pdata..h/....D..0...LA.............@..@.rsrc........0F......|C.............@..@.reloc...u...@F..v....C.............@..B................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):28848
              Entropy (8bit):6.167573133461333
              Encrypted:false
              SSDEEP:384:+Wu7bFYpo5K98HhIJg6mwhY6HqMGXYPAr70cE9o1IymGpMDG4y8lVJhj/:nykc6mwhBHqFY8p1IymGpMDG4yKhL
              MD5:0E3CF5D792A3F543BE8BBC186B97A27A
              SHA1:50F4C70FCE31504C6B746A2C8D9754A16EBC8D5E
              SHA-256:C7FFAE6DC927CF10AC5DA08614912BB3AD8FC52AA0EF9BC376D831E72DD74460
              SHA-512:224B42E05B4DBDF7275EE7C5D3EB190024FC55E22E38BD189C1685EFEE2A3DD527C6DFCB2FEEEC525B8D6DC35ADED1EAC2423ED62BB2599BB6A9EA34E842C340
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+.J~E.J~E.J~E.C...H~E.&.D.H~E.&.@.A~E.&.A.B~E.&.F.N~E...D.H~E...D.O~E.J~D..~E...H.K~E...E.K~E.....K~E...G.K~E.RichJ~E.........PE..d...;3.`.........." ....."...4............................................................`..........................................Q..L....Q..x............p..T....T..........@....B..T...........................0C..8............@..(............................text.... .......".................. ..`.rdata.......@.......&..............@..@.data........`.......B..............@....pdata..T....p.......D..............@..@.rsrc................H..............@..@.reloc..@............R..............@..B................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1705120
              Entropy (8bit):6.496511987047776
              Encrypted:false
              SSDEEP:24576:umJTd0nVi/Md3bupZkKBhWPRIlq5YZ6a2CXH7oZgKGc+erWJUVWyubuapwQDlaTR:umJTd4iMwXH7oZgKb++BVL4B+GITgr0h
              MD5:C0B23815701DBAE2A359CB8ADB9AE730
              SHA1:5BE6736B645ED12E97B9462B77E5A43482673D90
              SHA-256:F650D6BC321BCDA3FC3AC3DEC3AC4E473FB0B7B68B6C948581BCFC54653E6768
              SHA-512:ED60384E95BE8EA5930994DB8527168F78573F8A277F8D21C089F0018CD3B9906DA764ED6FCC1BD4EFAD009557645E206FBB4E5BAEF9AB4B2E3C8BB5C3B5D725
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k)...GD..GD..GD.bFE..GD9..D..GD.bDE..GD.bBE..GD.bCE..GD.r.D..GD.jAE..GD.jFE..GD..FD..GD.bOE..GD.bGE..GD.b.D..GD.bEE..GDRich..GD........PE..d......\.........." .....d..........0h.......................................@.......b....`..........................................p..._......T.......0.... ............... .......<...............................=...............................................text....b.......d.................. ..`.rdata...k.......l...h..............@..@.data...."..........................@....pdata....... ......................@..@.rsrc...0...........................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10012
              Entropy (8bit):4.988870027581882
              Encrypted:false
              SSDEEP:192:oM9irmCuZgxr31nvnaLAlgspxUth+PNkuQmYz6mh8029d2rPYVzXWamv:oM9irmCuixrxvispxUth+IzX29grPKzu
              MD5:AAD7CE4027C713577DF2BC8D35406C13
              SHA1:931262903B347F18AC1BE338524DB851B7AAE5BB
              SHA-256:D4B3D9601454EA4828DFF3BE426C33FB845D005E98D2CC139DBB0D69CAD3168B
              SHA-512:F54362286A3BCC4A421AC1687C6C1986C6575CF7233207D905EBE9217323612663728B8300D5660FC1F5A297BE7D2BFA770F8743C8D115533C3EA8BA5004BC36
              Malicious:false
              Preview:# -*- tcl -*-.# ### ### ### ######### ######### #########.## Overview..# Heuristics to assemble a platform identifier from publicly available.# information. The identifier describes the platform of the currently.# running tcl shell. This is a mixture of the runtime environment and.# of build-time properties of the executable itself..#.# Examples:.# <1> A tcl shell executing on a x86_64 processor, but having a.# wordsize of 4 was compiled for the x86 environment, i.e. 32.# bit, and loaded packages have to match that, and not the.# actual cpu..#.# <2> The hp/solaris 32/64 bit builds of the core cannot be.# distinguished by looking at tcl_platform. As packages have to.# match the 32/64 information we have to look in more places. In.# this case we inspect the executable itself (magic numbers,.# i.e. fileutil::magic::filetype)..#.# The basic information used comes out of the 'os' and 'machine'.# entries of the 'tcl_platform' array. A number of general and.# os/machine specific
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5977
              Entropy (8bit):4.79231401569641
              Encrypted:false
              SSDEEP:96:Wo05xaJIrnU0gEMydSv+lrnU0gEMPdSvfSrnUN4y1mP3jm5Q1/I+gYQ1KyHe36mV:Wo05xaJsnU0DMAK+5nU0DMFKfunUN4Oc
              MD5:2A8B773513480EFA986D9CE061218348
              SHA1:85763F378A68BA6A1EEE9887CDCF34C14D3AD5BF
              SHA-256:2F812A0550716B88930174A8CA245698427CD286680C0968558AE269AB52440D
              SHA-512:D3EC3891CC897A8ABB949EBA6A055D9283BA6E491E1CAEA132D894E7B3FD3B159E8226E0BBCDF369DB3F0E00AA1E0347E5B1838353E75B8AE114A83016010238
              Malicious:false
              Preview:.# -*- tcl -*-.# ### ### ### ######### ######### #########.## Overview..# Higher-level commands which invoke the functionality of this package.# for an arbitrary tcl shell (tclsh, wish, ...). This is required by a.# repository as while the tcl shell executing packages uses the same.# platform in general as a repository application there can be.# differences in detail (i.e. 32/64 bit builds)...# ### ### ### ######### ######### #########.## Requirements..package require platform.namespace eval ::platform::shell {}..# ### ### ### ######### ######### #########.## Implementation..# -- platform::shell::generic..proc ::platform::shell::generic {shell} {. # Argument is the path to a tcl shell... CHECK $shell. LOCATE base out.. set code {}. # Forget any pre-existing platform package, it might be in. # conflict with this one.. lappend code {package forget platform}. # Inject our platform package. lappend code [list source $base]. # Query and print the architectu
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):33935
              Entropy (8bit):4.898273709861797
              Encrypted:false
              SSDEEP:768:joWBAxonz0L7KILBk0U8Vl9NFljRFpGA1TrPiBDxDFP8sCNl:MWBAxgzY7KIL7j1NFl1Fp11/PiBVBksU
              MD5:DB52847C625EA3290F81238595A915CD
              SHA1:45A4ED9B74965E399430290BCDCD64ACA5D29159
              SHA-256:4FDF70FDCEDEF97AA8BD82A02669B066B5DFE7630C92494A130FC7C627B52B55
              SHA-512:5A8FB4ADA7B2EFBF1CADD10DBE4DC7EA7ACD101CB8FD0B80DAD42BE3ED8804FC8695C53E6AEEC088C2D4C3EE01AF97D148B836289DA6E4F9EE14432B923C7E40
              Malicious:false
              Preview:# msgcat.tcl --.#.#.This file defines various procedures which implement a.#.message catalog facility for Tcl programs. It should be.#.loaded with the command "package require msgcat"..#.# Copyright (c) 2010-2015 by Harald Oehlmann..# Copyright (c) 1998-2000 by Ajuba Solutions..# Copyright (c) 1998 by Mark Harrison..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...package require Tcl 8.5-.# When the version number changes, be sure to update the pkgIndex.tcl file,.# and the installation directory in the Makefiles..package provide msgcat 1.6.1..namespace eval msgcat {. namespace export mc mcexists mcload mclocale mcmax mcmset mcpreferences mcset\. mcunknown mcflset mcflmset mcloadedlocales mcforgetpackage\.. mcpackageconfig mcpackagelocale.. # Records the list of locales to search. variable Loclist {}.. # List of currently loaded locales. variable LoadedLocales {}.. # Rec
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):101389
              Entropy (8bit):4.78335748687105
              Encrypted:false
              SSDEEP:1536:r3UFHL/k3tqN0E7NkhtMcrQ3qoyX2/2rCmTMttfN/CrQnXcwIHmlDB/mizvB21J1:r3UdOAVfnPIHmlDFmiDB21cK/xasmhC
              MD5:D34207F736FA9FC26785A4D87C867A44
              SHA1:24E533DDD16C67E0D0B9ED303A40C9D90ABF3E80
              SHA-256:3BFD9E06826C98490E22B00200488D06C1FE49E3B78E24E985ABC377B04021FE
              SHA-512:1007E5812CBF7D907E33FD769FDC4E9A9D0E68852E91208F5C887A2A86849AF69A11CE4B00358059193A46D17F19C26A255A22C107D30433482A8A0CE7ED0D03
              Malicious:false
              Preview:# tcltest.tcl --.#.#.This file contains support code for the Tcl test suite. It.# defines the tcltest namespace and finds and defines the output.# directory, constraints available, output and error channels,.#.etc. used by Tcl tests. See the tcltest man page for more.#.details..#.# This design was based on the Tcl testing approach designed and.# initially implemented by Mary Ann May-Pumphrey of Sun.#.Microsystems..#.# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998-1999 by Scriptics Corporation..# Copyright (c) 2000 by Ajuba Solutions.# Contributions from Don Porter, NIST, 2002. (not subject to US copyright).# All rights reserved...package require Tcl 8.5-..;# -verbose line uses [info frame].namespace eval tcltest {.. # When the version number changes, be sure to update the pkgIndex.tcl file,. # and the install directory in the Makefiles. When the minor version. # changes (new feature) be sure to update the man page as well..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):108619
              Entropy (8bit):4.834993492587442
              Encrypted:false
              SSDEEP:1536:nFRYkDjVePrJwFR09W9JXvfM/2QXjjCV4ScA4MaLm1r:nF2wjVePrJyRpXv9+CV4S74rLg
              MD5:E9C1DBACE852DE98ECC8906918C3167A
              SHA1:A3CECEC2C8E67EB0BFCAA6E0DF8970440C29175F
              SHA-256:D66A3E47106268C4FDE02F857EFDBBC9C44C9BFC6246B7678919F6DAD3C3B68D
              SHA-512:C830CCA95D8EF2476BFD1B8AA8D0BBD8C557C44989D7398991716DE6F20C075A7FB321ABC0E48A1E5DDF8B4228444678D08761A5FA9D3C417CD58718235F0937
              Malicious:false
              Preview:# http.tcl --.#.#.Client-side HTTP for GET, POST, and HEAD commands. These routines can.#.be used in untrusted code that uses the Safesock security policy..#.These procedures use a callback interface to avoid using vwait, which.#.is not defined in the safe base..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...package require Tcl 8.6-.# Keep this in sync with pkgIndex.tcl and with the install directories in.# Makefiles.package provide http 2.9.0..namespace eval http {. # Allow resourcing to not clobber existing data.. variable http. if {![info exists http]} {..array set http {.. -accept */*.. -pipeline 1.. -postfresh 0.. -proxyhost {}.. -proxyport {}.. -proxyfilter http::ProxyRequired.. -repost 0.. -urlencoding utf-8.. -zip 1..}..# We need a useragent string of this style or various servers will..# refuse to send us compressed content even when we ask for it. This..#
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):21148
              Entropy (8bit):4.7268785966563405
              Encrypted:false
              SSDEEP:384:vyPcB5RJtAZ7SP9nYP9I5HU3mOuWzXBEWKYHEN+7yBtYSbI0QD+lM:AcB5RJtAFSPBYPN3mOuiVHEN+78YSbqT
              MD5:5E9B3E874F8FBEAADEF3A004A1B291B5
              SHA1:B356286005EFB4A3A46A1FDD53E4FCDC406569D0
              SHA-256:F385515658832FEB75EE4DCE5BD53F7F67F2629077B7D049B86A730A49BD0840
              SHA-512:482C555A0DA2E635FA6838A40377EEF547746B2907F53D77E9FFCE8063C1A24322D8FAA3421FC8D12FDCAFF831B517A65DAFB1CEA6F5EA010BDC18A441B38790
              Malicious:false
              Preview:# auto.tcl --.#.# utility procs formerly in init.tcl dealing with auto execution of commands.# and can be auto loaded themselves..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# auto_reset --.#.# Destroy all cached information for auto-loading and auto-execution, so that.# the information gets recomputed the next time it's needed. Also delete any.# commands that are listed in the auto-load index..#.# Arguments:.# None...proc auto_reset {} {. global auto_execs auto_index auto_path. if {[array exists auto_index]} {..foreach cmdName [array names auto_index] {.. set fqcn [namespace which $cmdName].. if {$fqcn eq ""} {...continue.. }.. rename $fqcn {}..}. }. unset -nocomplain auto_execs auto_index ::tcl::auto_oldpath. if {[catch {llength $auto_path}]} {..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):128934
              Entropy (8bit):5.001022641779315
              Encrypted:false
              SSDEEP:3072:6klVEuSDFeEzGtdaui+urVke5i1IsQ5SvtTImhrYnPrzAvtt2eyw7uZH/SOyQasa:yDFeEzMaui+urVke5i1R6SvtTImhrYPK
              MD5:F1E825244CC9741595F47F4979E971A5
              SHA1:7159DD873C567E10CADAF8638D986FFE11182A27
              SHA-256:F0CF27CB4B5D9E3B5D7C84B008981C8957A0FF94671A52CC6355131E55DD59FB
              SHA-512:468C881EB7CE92C91F28CAE2471507A76EF44091C1586DCD716309E3252ED00CCB847EC3296C1954CA6F965161664F7BB73F21A24B9FF5A86F625C0B67C74F67
              Malicious:false
              Preview:#----------------------------------------------------------------------.#.# clock.tcl --.#.#.This file implements the portions of the [clock] ensemble that are.#.coded in Tcl. Refer to the users' manual to see the description of.#.the [clock] command and its subcommands..#.#.#----------------------------------------------------------------------.#.# Copyright (c) 2004,2005,2006,2007 by Kevin B. Kenny.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#.#----------------------------------------------------------------------..# We must have message catalogs that support the root locale, and we need.# access to the Registry on Windows systems...uplevel \#0 {. package require msgcat 1.6. if { $::tcl_platform(platform) eq {windows} } {..if { [catch { package require registry 1.1 }] } {.. namespace eval ::tcl::clock [list variable NoRegistry {}]..}. }.}..# Put the library directory into the namespace
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):2.009389929214244
              Encrypted:false
              SSDEEP:12:5TUvEESVrVJ/eyN9j233V2NdWTeVCT0VbsV7EV7sYnVAMmVZyg851VqxsGkl/:5TUmJvRju3ShVbsZiAMiZyb7PF
              MD5:68D69C53B4A9F0AABD60646CA7E06DAE
              SHA1:DD83333DC1C838BEB9102F063971CCC20CC4FD80
              SHA-256:294C97175FD0894093B866E73548AE660AEED0C3CC1E73867EB66E52D34C0DD2
              SHA-512:48960E838D30401173EA0DF8597BB5D9BC3A09ED2CFFCB774BA50CB0B2ACCF47AAD3BA2782B3D4A92BEF572CBD98A3F4109FC4344DB82EB207BFDE4F61094D72
              Malicious:false
              Preview:# Encoding file: ascii, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E0000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):92873
              Entropy (8bit):3.255311357682213
              Encrypted:false
              SSDEEP:768:3kkmY4kD7HGJxYXIdjQWTGzvKHBDViIM1sbh+dJE+FKw0sXlWVvDg21jj9:cGfKqIQCGzv8D7ksb2Ur79jj9
              MD5:9E67816F304FA1A8E20D2270B3A53364
              SHA1:9E35EBF3D5380E34B92FE2744124F9324B901DD3
              SHA-256:465AE2D4880B8006B1476CD60FACF676875438244C1D93A7DBE4CDE1035E745F
              SHA-512:EE529DA3511EB8D73465EB585561D54833C46B8C31062299B46F5B9EE7EB5BE473E630AA264F45B2806FC1B480C8ED39A173FF1756CB6401B363568E951F0637
              Malicious:false
              Preview:# Encoding file: big5, multi-byte.M.003F 0 89.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.00000000000000000000000000000000000000000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.286986942547087
              Encrypted:false
              SSDEEP:24:CqTUmJvRju3ShVbsZiAMiZyb7Ptuja5z8twsDO4yT2H:JgmOEVIwAMiw/Ptuja5z8RDtyT2H
              MD5:79ACD9BD261A252D93C9D8DDC42B8DF6
              SHA1:FA2271030DB9005D71FAAD60B44767955D5432DD
              SHA-256:1B42DF7E7D6B0FEB17CB0BC8D97E6CE6899492306DD880C48A39D1A2F0279004
              SHA-512:607F21A84AE569B19DF42463A56712D232CA192E1827E53F3ACB46D373EF4165A38FFBF116E28D4EAAEF49B08F6162C7A1C517CCE2DFACA71DA07193FEFFFF06
              Malicious:false
              Preview:# Encoding file: cp1250, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.288070862623515
              Encrypted:false
              SSDEEP:24:CTTUmJvRju3ShVbsZiAMiZyb7P4DRrwFsC/+H+SAJlM9aHe3cmx:wgmOEVIwAMiw/PStwFz/T5+smx
              MD5:55FB20FB09C610DB38C22CF8ADD4F7B8
              SHA1:604396D81FD2D90F5734FE6C3F283F8F19AABB64
              SHA-256:2D1BED2422E131A140087FAF1B12B8A46F7DE3B6413BAE8BC395C06F0D70B9B0
              SHA-512:07C6640BB40407C384BCF646CC436229AEC77C6398D57659B739DC4E180C81A1524F55A5A8F7B3F671A53320052AD888736383486CC01DFC317029079B17172E
              Malicious:false
              Preview:# Encoding file: cp1251, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.04020403201A0453201E20262020202120AC203004092039040A040C040B040F.045220182019201C201D202220132014009821220459203A045A045C045B045F.00A0040E045E040800A4049000A600A7040100A9040400AB00AC00AD00AE0407.00B000B104060456049100B500B600B704512116045400BB0458040504550457.0410041104120413041404150416041704180419041A041B041C041D041E041F.0420042104220423042404250426042704280429042A042B042C042D042E042F.043004310432043304340435043604370438043
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.2209074629945476
              Encrypted:false
              SSDEEP:24:C4TUmJvRju3ShVbsZiAMiZyb7PMmVurcNvPNNAkbnMH+tjg:rgmOEVIwAMiw/PMhrUok7zE
              MD5:5900F51FD8B5FF75E65594EB7DD50533
              SHA1:2E21300E0BC8A847D0423671B08D3C65761EE172
              SHA-256:14DF3AE30E81E7620BE6BBB7A9E42083AF1AE04D94CF1203565F8A3C0542ACE0
              SHA-512:EA0455FF4CD5C0D4AFB5E79B671565C2AEDE2857D534E1371F0C10C299C74CB4AD113D56025F58B8AE9E88E2862F0864A4836FED236F5730360B2223FDE479DC
              Malicious:false
              Preview:# Encoding file: cp1252, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.3530146237761445
              Encrypted:false
              SSDEEP:24:CRTUmJvRju3ShVbsZiAMiZyb7PMuW24OrKUQQSqJWeIDmq:CgmOEVIwAMiw/PMuW2nKJQSqJWeI1
              MD5:2E5F553D214B534EBA29A9FCEEC36F76
              SHA1:8FF9A526A545D293829A679A2ECDD33AA6F9A90E
              SHA-256:2174D94E1C1D5AD93717B9E8C20569ED95A8AF51B2D3AB2BCE99F1A887049C0E
              SHA-512:44AB13C0D322171D5EE62946086058CF54963F91EC3F899F3A10D051F9828AC66D7E9F8055026E938DDD1B97A30D5D450B89D72F9113DEE2DBBB62DDBBBE456C
              Malicious:false
              Preview:# Encoding file: cp1253, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.2357714075228494
              Encrypted:false
              SSDEEP:24:CWTUmJvRju3ShVbsZiAMiZyb7PMSrcmvPNNAkKMH+tZL/M:lgmOEVIwAMiw/PMSrrokKzR0
              MD5:35AD7A8FC0B80353D1C471F6792D3FD8
              SHA1:484705A69596C9D813EA361625C3A45C6BB31228
              SHA-256:BC4CBE4C99FD65ABEA45FBDAF28CC1D5C42119280125FBBD5C2C11892AE460B2
              SHA-512:CCA3C6A4B826E0D86AC10E45FFC6E5001942AA1CF45B9E0229D56E06F2600DDA0139764F1222C56CF7A9C14E6E6C387F9AB265CB9B936E803FECD8285871C70F
              Malicious:false
              Preview:# Encoding file: cp1254, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.20AC0081201A0192201E20262020202102C62030016020390152008D008E008F.009020182019201C201D20222013201402DC21220161203A0153009D009E0178.00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF.00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF.00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF.011E00D100D200D300D400D500D600D700D800D900DA00DB00DC0130015E00DF.00E000E100E200E300E400E500E600E700E800E
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.267336792625871
              Encrypted:false
              SSDEEP:24:CfTUmJvRju3ShVbsZiAMiZyb7PMI22iEePlNQhv6l50b:MgmOEVIwAMiw/PMI27EsQhvgg
              MD5:0419DBEE405723E7A128A009DA06460D
              SHA1:660DBE4583923CBDFFF6261B1FADF4349658579C
              SHA-256:F8BD79AE5A90E5390D77DC31CB3065B0F93CB8813C9E67ACCEC72E2DB2027A08
              SHA-512:FDD9F23A1B5ABBF973BEE28642A7F28F767557FE842AF0B30B1CF97CD258892F82E547392390A51900DC7FF5D56433549A5CB463779FC131E885B00568F86A32
              Malicious:false
              Preview:# Encoding file: cp1255, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.3332869352420795
              Encrypted:false
              SSDEEP:24:C0TUmJvRju3ShVbsZiAMiZyb7Ps0pPESLym/cwPm+ZMZjyco/fQIG/h:XgmOEVIwAMiw/Ps0FPLym/AsBfg/h
              MD5:0FFA293AA50AD2795EAB7A063C4CCAE5
              SHA1:38FEE39F44E14C3A219978F8B6E4DA548152CFD6
              SHA-256:BBACEA81D4F7A3A7F3C036273A4534D31DBF8B6B5CCA2BCC4C00CB1593CF03D8
              SHA-512:AB4A6176C8C477463A6CABD603528CEB98EF4A7FB9AA6A8659E1AA6FE3F88529DB9635D41649FBAD779AEB4413F9D8581E6CA078393A3042B468E8CAE0FA0780
              Malicious:false
              Preview:# Encoding file: cp1256, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.2734430397929604
              Encrypted:false
              SSDEEP:24:CNTUmJvRju3ShVbsZiAMiZyb7PtuWTfN641PaxUVG4da:ugmOEVIwAMiw/PtuWkgVfa
              MD5:A1CCD70248FEA44C0EBB51FB71D45F92
              SHA1:CC103C53B3BA1764714587EAEBD92CD1BC75194D
              SHA-256:4151434A714FC82228677C39B07908C4E19952FC058E26E7C3EBAB7724CE0C77
              SHA-512:74E4A13D65FAB11F205DB1E6D826B06DE421282F7461B273196FD7EECEE123EA0BD32711640B15B482C728966CC0C70FFC67AEDAD91566CA87CD623738E34726
              Malicious:false
              Preview:# Encoding file: cp1257, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.226508038800896
              Encrypted:false
              SSDEEP:24:CKlTUmJvRju3ShVbsZiAMiZyb7PMIX2jmvPNNXkohWiZo//:xgmOEVIwAMiw/PMIXXfkohnun
              MD5:BB010BFF4DD16B05EEB6E33E5624767A
              SHA1:6294E42ED22D75679FF1464FF41D43DB3B1824C2
              SHA-256:0CDB59E255CCD7DCF4AF847C9B020AEAEE78CE7FCF5F214EBCF123328ACF9F24
              SHA-512:2CD34F75DC61DC1495B0419059783A5579932F43DB9B125CADCB3838A142E0C1CD7B42DB71EF103E268206E31099D6BB0670E84D5658C0E18D0905057FF87182
              Malicious:false
              Preview:# Encoding file: cp1258, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.447501009231115
              Encrypted:false
              SSDEEP:24:CFyTUmJvRju3ShVbsZiAMiZyb7P4jpuKBIrRjK8DvmH:wygmOEVIwAMiw/PYwjKgmH
              MD5:8645C2DFCC4D5DAD2BCD53A180D83A2F
              SHA1:3F725245C66050D39D9234BAACE9D047A3842944
              SHA-256:D707A1F03514806E714F01CBFCB7C9F9973ACDC80C2D67BBD4E6F85223A50952
              SHA-512:208717D7B1CBDD8A0B8B3BE1B6F85353B5A094BDC370E6B8396158453DD7DC400EE6C4D60490AD1A1F4C943E733298FC971AE30606D6BAB14FB1290B886C76D0
              Malicious:false
              Preview:# Encoding file: cp437, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.551534707521956
              Encrypted:false
              SSDEEP:24:CjTUmJvRju3ShVbsZiAMiZyb7P48KhQFhWeYDr1K8DZckbiY:WgmOEVIwAMiw/P9KhQFhWeY31Kk2Y
              MD5:C68ADEFE02B77F6E6B5217CD83D46406
              SHA1:C95EA4ED3FBEF013D810C0BFB193B15FA8ADE7B8
              SHA-256:8BFCA34869B3F9A3B2FC71B02CBAC41512AF6D1F8AB17D2564E65320F88EDE10
              SHA-512:5CCAACD8A9795D4FE0FD2AC6D3E33C10B0BCC43B29B45DFBA66FBD180163251890BB67B8185D806E4341EB01CB1CED6EA682077577CC9ED948FC094B099A662A
              Malicious:false
              Preview:# Encoding file: cp737, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.039103920393039403950396039703980399039A039B039C039D039E039F03A0.03A103A303A403A503A603A703A803A903B103B203B303B403B503B603B703B8.03B903BA03BB03BC03BD03BE03BF03C003C103C303C203C403C503C603C703C8.259125922593250225242561256225562555256325512557255D255C255B2510.25142534252C251C2500253C255E255F255A25542569256625602550256C2567.2568256425652559255825522553256B256A2518250C25882584258C25902580.03C903AC03AD03AE03CA03AF03CC03CD03CB03CE
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.3818286672990854
              Encrypted:false
              SSDEEP:24:CsOTUmJvRju3ShVbsZiAMiZyb7P4DBcqb67JnsUgqIPfJ:AgmOEVIwAMiw/PSzb67NsrLPR
              MD5:DE1282E2925870A277AF9DE4C52FA457
              SHA1:F4301A1340A160E1F282B5F98BF9FACBFA93B119
              SHA-256:44FB04B5C72B584B6283A99B34789690C627B5083C5DF6E8B5B7AB2C68903C06
              SHA-512:08173FC4E5FC9AA9BD1E296F299036E49C0333A876EA0BDF40BEC9F46120329A530B6AA57B32BC83C7AA5E6BD20DE9F616F4B17532EE54634B6799C31D8F668F
              Malicious:false
              Preview:# Encoding file: cp775, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.301196372002172
              Encrypted:false
              SSDEEP:24:C9TUmJvRju3ShVbsZiAMiZyb7P4jpuKBc+mTRF5aefDT4HJ:EgmOEVIwAMiw/PYelF5xfn4p
              MD5:FF3D96C0954843C7A78299FED6986D9E
              SHA1:5EAD37788D124D4EE49EC4B8AA1CF6AAA9C2849C
              SHA-256:55AA2D13B789B3125F5C9D0DC5B6E3A90D79426D3B7825DCD604F56D4C6E36A2
              SHA-512:B76CD82F3204E17D54FB679615120564C53BBE27CC474101EE073EFA6572B50DB2E9C258B09C0F7EAE8AC445D469461364C81838C07D41B43E353107C06C247E
              Malicious:false
              Preview:# Encoding file: cp850, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.3816687566591797
              Encrypted:false
              SSDEEP:24:CPTUmJvRju3ShVbsZiAMiZyb7P4OvEUs5ycHQjc59X/C:mgmOEVIwAMiw/Pkv5ycHQjc59Xa
              MD5:25A59EA83B8E9F3322A54B138861E274
              SHA1:904B357C30603DFBCF8A10A054D9399608B131DF
              SHA-256:5266B6F18C3144CFADBCB7B1D27F0A7EAA1C641FD3B33905E42E4549FD373770
              SHA-512:F7E41357849599E7BA1D47B9B2E615C3C2EF4D432978251418EBF9314AAEB0E1B0A56ED14ED9BA3BE46D3DABE5DD80E0CA6592AE88FB1923E7C3D90D7F846709
              Malicious:false
              Preview:# Encoding file: cp852, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.3580450853378596
              Encrypted:false
              SSDEEP:24:CoTUmJvRju3ShVbsZiAMiZyb7P4hHVLjwk6rMZCb32SLauDbr:hgmOEVIwAMiw/PM/wcMb3VuuT
              MD5:0220F1955F01B676D2595C30DEFB6064
              SHA1:F8BD4BF6D95F672CB61B8ECAB580A765BEBDAEA5
              SHA-256:E3F071C63AC43AF66061506EF2C574C35F7BF48553FB5158AE41D9230C1A10DF
              SHA-512:F7BFF7D6534C9BFDBF0FB0147E31E948F60E933E6DA6A39E8DC62CC55FEBDD6901240460D7B3C0991844CDEE7EB8ED26E5FDBBC12BDC9B8173884D8FCA123B69
              Malicious:false
              Preview:# Encoding file: cp855, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.2936796452153128
              Encrypted:false
              SSDEEP:24:CaTUmJvRju3ShVbsZiAMiZyb7P4jpu6u/5WH5aeoC4ljIJ:jgmOEVIwAMiw/Pr/UH5xp4l6
              MD5:58C52199269A3BB52C3E4C20B5CE6093
              SHA1:888499D9DFDF75C60C2770386A4500F35753CE70
              SHA-256:E39985C6A238086B54427475519C9E0285750707DB521D1820E639723C01C36F
              SHA-512:754667464C4675E8C8F2F88A9211411B3648068085A898D693B33BF3E1FAECC9676805FD2D1A4B19FAAB30E286236DCFB2FC0D498BF9ABD9A5E772B340CEE768
              Malicious:false
              Preview:# Encoding file: cp857, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.438607583601603
              Encrypted:false
              SSDEEP:24:CMTUmJvRju3ShVbsZiAMiZyb7P4Aj4AxOt49+nK8DvmH:VgmOEVIwAMiw/PeR+snKgmH
              MD5:8CA7C4737A18D5326E9A437D5ADC4A1A
              SHA1:C6B1E9320EEF46FC9A23437C255E4085EA2980DB
              SHA-256:6DB59139627D29ABD36F38ED2E0DE2A6B234A7D7E681C7DBAF8B888F1CAC49A5
              SHA-512:2D2427E7A3FF18445321263A42C6DA560E0250691ACBE5113BDE363B36B5E9929003F3C91769A02FF720AB8261429CBFA9D9580C1065FFE77400327B1A5539A6
              Malicious:false
              Preview:# Encoding file: cp860, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.4494568686644276
              Encrypted:false
              SSDEEP:24:ClTUmJvRju3ShVbsZiAMiZyb7P4jpOkPn9R2GRK8DvmH:8gmOEVIwAMiw/PAPXvKgmH
              MD5:45F0D888DBCB56703E8951C06CFAED51
              SHA1:53529772EA6322B7949DB73EEBAED91E5A5BA3DA
              SHA-256:A43A5B58BFC57BD723B12BBDEA9F6E1A921360B36D2D52C420F37299788442D3
              SHA-512:61D0C361E1C7D67193409EC327568867D1FD0FE448D11F16A08638D3EE31BE95AD37B8A2E67B8FB448D09489AA3F5D65AD9AC18E9BDC690A049F0C015BA806F1
              Malicious:false
              Preview:# Encoding file: cp861, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.4900477558394694
              Encrypted:false
              SSDEEP:24:CdMTUmJvRju3ShVbsZiAMiZyb7P4N6rRjK8DvmH:iMgmOEVIwAMiw/PljKgmH
              MD5:E417DCE52E8438BBE9AF8AD51A09F9E3
              SHA1:EF273671D46815F22996EA632D22CC27EB8CA44B
              SHA-256:AEA716D490C35439621A8F00CA7E4397EF1C70428E206C5036B7AF25F1C3D82F
              SHA-512:97D65E05008D75BC56E162D51AB76888E1FA0591D9642D7C0D09A5CE823904B5D6C14214828577940EDBE7F0265ABACDD67E4E12FACFDF5C7CD35FA80B90EC02
              Malicious:false
              Preview:# Encoding file: cp862, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.450081751310228
              Encrypted:false
              SSDEEP:24:CXTUmJvRju3ShVbsZiAMiZyb7P4aGuXVsq5RNK8DvmH:egmOEVIwAMiw/PT3VswKgmH
              MD5:A2C4062EB4F37C02A45B13BD08EC1120
              SHA1:7F6ED89BD0D415C64D0B8A037F08A47FEADD14C4
              SHA-256:13B5CB481E0216A8FC28BFA9D0F6B060CDF5C457B3E12435CA826EB2EF52B068
              SHA-512:95EFDA8CBC5D52E178640A145859E95A780A8A25D2AF88F98E8FFFA035016CABAE2259D22B3D6A95316F64138B578934FAF4C3403E35C4B7D42E0369B5D88C9B
              Malicious:false
              Preview:# Encoding file: cp863, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.00C700FC00E900E200C200E000B600E700EA00EB00E800EF00EE201700C000A7.00C900C800CA00F400CB00CF00FB00F900A400D400DC00A200A300D900DB0192.00A600B400F300FA00A800B800B300AF00CE231000AC00BD00BC00BE00AB00BB.259125922593250225242561256225562555256325512557255D255C255B2510.25142534252C251C2500253C255E255F255A25542569256625602550256C2567.2568256425652559255825522553256B256A2518250C25882584258C25902580.03B100DF039303C003A303C300B503C403A60398
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.6558830653506647
              Encrypted:false
              SSDEEP:24:CwTUmJvRju3YhVbsZiAMiZyb7P46SY927iqtcYQjDUjSD:5gmOqVIwAMiw/PCXjcYQfcSD
              MD5:3C88BF83DBA99F7B682120FBEEC57336
              SHA1:E0CA400BAE0F66EEBE4DFE147C5A18DD3B00B78C
              SHA-256:E87EC076F950FCD58189E362E1505DD55B0C8F4FA7DD1A9331C5C111D2CE569F
              SHA-512:6BD65D0A05F57333DA0078759DB2FC629B56C47DAB24E231DE41AD0DF3D07BF7A2A55D1946A7BA38BE228D415FB2BDB606BF1EF243974ED7DFD204548B2A43BA
              Malicious:false
              Preview:# Encoding file: cp864, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.451408971174579
              Encrypted:false
              SSDEEP:24:CsKTUmJvRju3ShVbsZiAMiZyb7P4jpuKBn9RUK8DvmH:ggmOEVIwAMiw/PYRXUKgmH
              MD5:6F290E2C3B8A8EE38642C23674B18C71
              SHA1:0EB40FEEB8A382530B69748E08BF513124232403
              SHA-256:407FC0FE06D2A057E9BA0109EA9356CAB38F27756D135EF3B06A85705B616F50
              SHA-512:A975F69360A28484A8A3B4C93590606B8F372A27EC612ECC2355C9B48E042DCE132E64411CF0B107AA5566CAF6954F6937BEBFE17A2AE79EFF25B67FA0F88B7D
              Malicious:false
              Preview:# Encoding file: cp865, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.435639928335435
              Encrypted:false
              SSDEEP:24:CCTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aHe3cIK8D/eke:bgmOEVIwAMiw/Pr5+sIK8ev
              MD5:C612610A7B63519BB7FEFEE26904DBB5
              SHA1:431270939D3E479BF9B9A663D9E67FCEBA79416F
              SHA-256:82633643CD326543915ACC5D28A634B5795274CD39974D3955E51D7330BA9338
              SHA-512:A3B84402AB66B1332C150E9B931E75B401378DDB4378D993DD460C81909DB72F2D136F0BE7B014F0A907D9EF9BE541C8E0B42CAB01667C6EF17E1DE1E0A3D0AE
              Malicious:false
              Preview:# Encoding file: cp866, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.458262128093304
              Encrypted:false
              SSDEEP:24:CtTUmJvRju3ShVbsZiAMiZyb7P4UN+lhNo5+8dKfQFhWGDrjz9:EgmOEVIwAMiw/PxYNo5+8dKfQFhWG3jZ
              MD5:51B18570775BCA6465BD338012C9099C
              SHA1:E8149F333B1809DCCDE51CF8B6332103DDE7FC30
              SHA-256:27F16E3DD02B2212C4980EA09BDC068CF01584A1B8BB91456C03FCABABE0931E
              SHA-512:EB285F0E5A9333FFF0E3A6E9C7CAC9D44956EDF180A46D623989A93683BC70EE362256B58EB9AED3BFC6B5C8F5DB4E42540DFC681D51D22A97398CD18F76A1E1
              Malicious:false
              Preview:# Encoding file: cp869, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1090
              Entropy (8bit):3.2660589395582478
              Encrypted:false
              SSDEEP:24:CSyTUmJvRju3ShVbsZiAMiZyb7PQXzHmED43U/TW5dV:CgmOEVIwAMiw/PIr43UKV
              MD5:7884C95618EF4E9BAA1DED2707F48467
              SHA1:DA057E1F93F75521A51CC725D47130F41E509E70
              SHA-256:3E067363FC07662EBE52BA617C2AAD364920F2AF395B3416297400859ACD78BB
              SHA-512:374AA659A8DB86C023187D02BD7993516CE0EC5B4C6743AD4956AA2DDB86D2B4A57B797253913E08E40485BF3263FBD1C74DDE2C00E6F228201811ED89A6DFF0
              Malicious:false
              Preview:# Encoding file: cp874, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):48207
              Entropy (8bit):3.450462303370557
              Encrypted:false
              SSDEEP:768:LhuW1PJnT9TO7RaQiPCLUKr7KBi9FrOLdtZ7RkEw:LZPV9KuqTxFGXZlQ
              MD5:AA4398630883066C127AA902832C82E4
              SHA1:D0B3DEB0EE6539CE5F28A51464BFBB3AA03F28E5
              SHA-256:9D33DF6E1CFDD2CF2553F5E2758F457D710CAFF5F8C69968F2665ACCD6E9A6FD
              SHA-512:77794E74B0E6B5855773EE9E1F3B1DA9DB7661D66485DAE6F61CA69F6DA9FD308A55B3A76C9B887135949C60FC3888E6F9A45C6BC481418737AA452A0D9CAE64
              Malicious:false
              Preview:# Encoding file: cp932, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):132509
              Entropy (8bit):3.458586416034501
              Encrypted:false
              SSDEEP:1536:JUbXcUPivzybu9VBPbUQMp8nDr+VFQQHkrUkAEAd4WD7tH8dd1+a:muVDQEr2dhDBH8d3+a
              MD5:27280A39A06496DE6035203A6DAE5365
              SHA1:3B1D07B02AE7E3B40784871E17F36332834268E6
              SHA-256:619330192984A80F93AC6F2E4E5EAA463FD3DDDC75C1F65F3975F33E0DD7A0BB
              SHA-512:EA05CC8F9D6908EE2241E2A72374DAAD55797B5A487394B4C2384847C808AF091F980951941003039745372022DE88807F93EEF6CDB3898FBB300A48A09B66E8
              Malicious:false
              Preview:# Encoding file: cp936, multi-byte.M.003F 0 127.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.20AC000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.000000000000000000000000000000000000000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):130423
              Entropy (8bit):3.0309641114333425
              Encrypted:false
              SSDEEP:1536:fimT/rTarSdgL6MVTCwCWUw62Ljv10xb+KYTuHEh:ftT/IQYLzGxSdCy
              MD5:6788B104D2297CBD8D010E2776AF6EBA
              SHA1:904A8B7846D34521634C8C09013DBB1D31AF47CA
              SHA-256:26BCB620472433962717712D04597A63264C8E444459432565C4C113DE0A240B
              SHA-512:0DF73561B76159D0A94D16A2DAB22F2B3D88C67146A840CB74D19E70D50A4C7E4DDF1952B5B805471985A896CA9F1B69C3FC4E6D8D17454566D7D39377BA1394
              Malicious:false
              Preview:# Encoding file: cp949, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):91831
              Entropy (8bit):3.253346615914323
              Encrypted:false
              SSDEEP:768:VkkmY4kD7HGJxYXIdjQW7GzvKHBDViIM1sbh+dJE+FKw0sXlWVvDg21jjA:mGfKqIQwGzv8D7ksb2Ur79jjA
              MD5:A0F8C115D46D02A5CE2B8C56AFF53235
              SHA1:6605FCCB235A08F9032BB45231B1A6331764664B
              SHA-256:1FB9A3D52D432EA2D6CD43927CEBF9F58F309A236E1B11D20FE8D5A5FB944E6E
              SHA-512:124EA2134CF59585DB2C399B13DE67089A6BB5412D2B210DF484FA38B77555AAF0605D04F441BDC2B0BE0F180FA17C145731D7826DA7556A573D357CC00A968F
              Malicious:false
              Preview:# Encoding file: cp950, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1093
              Entropy (8bit):3.7149721845090347
              Encrypted:false
              SSDEEP:24:vJM0UmJvRjuyfqYCsUBOdXBCbtwHviANskfUPiXFtoE4OSFgHrBPkq:vKfmOEqYCs6CXRPiANIiXFt9XSMdPH
              MD5:7715CC78774FEA9EB588397D8221FA5B
              SHA1:6A21D57B44A0856ABCDE61B1C16CB93F4E4C3D74
              SHA-256:3BDE9AE7EAF9BE799C84B2AA4E80D78BE8ACBACA1E486F10B9BDD42E3AEDDCB2
              SHA-512:C7500B9DD36F7C92C1A92B8F7BC507F6215B12C26C8CB4564A8A87299859C29C05DEFD3212DE8F2DB76B7DFAB527D6C7B10D1E9A9F6B682F1B5BC4911CFAD26C
              Malicious:false
              Preview:# Encoding file: dingbats, single-byte.S.003F 1 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.00202701270227032704260E2706270727082709261B261E270C270D270E270F.2710271127122713271427152716271727182719271A271B271C271D271E271F.2720272127222723272427252726272726052729272A272B272C272D272E272F.2730273127322733273427352736273727382739273A273B273C273D273E273F.2740274127422743274427452746274727482749274A274B25CF274D25A0274F.27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000276127622763276427652766276726632666266526602460246124622463.2464246524662467246824692776277727782779277A277B277C277D277E277F.2780278127822783278427852786278727882789278A278B278C278D278E278F.2790279127922793279421922194219527982799279A279B279C279D279E279F.27A027A127A227A327A427A527A627A727A82
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1054
              Entropy (8bit):2.92745681322567
              Encrypted:false
              SSDEEP:24:scICJZoBqoQzRKCGW5JyY9yZk3Vvd2p4Z4XgiAmV3q:JmqrRKCtEYYZk3V4WSwitV6
              MD5:67212AAC036FE54C8D4CDCB2D03467A6
              SHA1:465509C726C49680B02372501AF7A52F09AB7D55
              SHA-256:17A7D45F3B82F2A42E1D36B13DB5CED077945A3E82700947CD1F803DD2A60DBF
              SHA-512:9500685760800F5A31A755D582FCEDD8BB5692C27FEEEC2709D982C0B8FCB5238AFB310DCB817F9FE140086A8889B7C60D5D1017764CEB03CB388DD22C8E0B3E
              Malicious:false
              Preview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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):85574
              Entropy (8bit):2.3109636068522357
              Encrypted:false
              SSDEEP:384:SgOycCs6mBixg1k6y8NMSwR8JMvz6VaVZmASVHBtGtRfS7FXtQ/RSJj9fNLSmXn/:SdC4BmCkjSwAO6VIrahNrVNTSYG3Oln
              MD5:9A60E5D1AB841DB3324D584F1B84F619
              SHA1:BCCC899015B688D5C426BC791C2FCDE3A03A3EB5
              SHA-256:546392237F47D71CEE1DAA1AAE287D94D93216A1FABD648B50F59DDCE7E8AE35
              SHA-512:E9F42B65A8DFB157D1D3336A94A83D372227BAA10A82EB0C6B6FB5601AA352A576FA3CDFD71EDF74A2285ABCA3B1D3172BB4B393C05B3B4AB141AAF04B10F426
              Malicious:false
              Preview:# Encoding file: euc-cn, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):82537
              Entropy (8bit):2.267779266005065
              Encrypted:false
              SSDEEP:384:c7C2o8+/s5VHxANqsFvGFkMpUEg4MWv947ebZ745zIPcvZ3p6JhE1mrUH2xUoSuL:U+UTHxAlFxkUeGcOmaj6JhEMrUwLf3d1
              MD5:453626980EB36062E32D98ACECCCBD6E
              SHA1:F8FCA3985009A2CDD397CB3BAE308AF05B0D7CAC
              SHA-256:3BFB42C4D36D1763693AEFCE87F6277A11AD5A756D691DEDA804D9D0EDCB3093
              SHA-512:0F026E1EF3AE1B08BBC7050DB0B181B349511F2A526D2121A6100C426674C0FB1AD6904A5CC11AA924B7F03E33F6971599BAF85C94528428F2E22DCB7D6FE443
              Malicious:false
              Preview:# Encoding file: euc-jp, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):93918
              Entropy (8bit):2.3267174168729032
              Encrypted:false
              SSDEEP:768:1/W3oNwgt2qyVY1OVxk6ZN4KYDN1uq44hohExh:1/W3pqv10xb+KYTuHEh
              MD5:93FEADA4D8A974E90E77F6EB8A9F24AB
              SHA1:89CDA4FE6515C9C03551E4E1972FD478AF3A419C
              SHA-256:1F1AD4C4079B33B706E948A735A8C3042F40CC68065C48C220D0F56FD048C33B
              SHA-512:7FC43C273F8C2A34E7AD29375A36B6CAC539AC4C1CDCECFAF0B366DCFE605B5D924D09DAD23B2EE589B1A8A63EE0F7A0CE32CE74AC873369DE8555C9E27A5EDF
              Malicious:false
              Preview:# Encoding file: euc-kr, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):86619
              Entropy (8bit):2.2972446758995697
              Encrypted:false
              SSDEEP:384:XSeUMIZQkyMiS4Y3fPOYo55XVi684z6WwQrrNoTRoyzDciB126afGG9whRJGAy/I:XhcQjSr3XeXVbmWdWd/zl5auG2hU/I
              MD5:12DBEEF45546A01E041332427FEC7A51
              SHA1:5C8E691AE3C13308820F4CF69206D765CFD5094B
              SHA-256:0C0DF17BFECE897A1DA7765C822453B09866573028CECCED13E2EFEE02BCCCC4
              SHA-512:FC8A250EE17D5E94A765AFCD9464ECAE74A4E2FF594A8632CEAEC5C84A3C4D26599642DA42E507B7873C37849D3E784CFB0792DE5B4B4262428619D7473FF611
              Malicious:false
              Preview:# Encoding file: gb12345, double-byte.D.233F 0 83.21.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.000030003001300230FB02C902C700A8300330052015FF5E2225202620182019.201C201D3014301530083009300A300B300C300D300E300F3016301730103011.00B100D700F72236222722282211220F222A222922082237221A22A522252220.23122299222B222E2261224C2248223D221D2260226E226F22642265221E2235.22342642264000B0203220332103FF0400A4FFE0FFE1203000A7211626062605.25CB25CF25CE25C725C625A125A025B325B2203B219221902191219330130000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.1978221748141253
              Encrypted:false
              SSDEEP:24:qrmTUmJvRju36hVbsZiAMiZyb7PN8pUPnfk5JM0RHFj:qSgmO8VIwAMiw/PNPQPFj
              MD5:06645FE6C135D2EDE313629D24782F98
              SHA1:49C663AC26C1FE4F0FD1428C9EF27058AEE6CA95
              SHA-256:A2717AE09E0CF2D566C245DC5C5889D326661B40DB0D5D9A6D95B8E6B0F0E753
              SHA-512:DB544CFE58753B2CF8A5D65321A2B41155FE2430DB6783DD2F20E1244657482072633D16C8AC99765C113B60E99C8718263C483763A34C5E4BB04B4FFBA41976
              Malicious:false
              Preview:# Encoding file: gb1988, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):84532
              Entropy (8bit):2.3130049332819502
              Encrypted:false
              SSDEEP:384:KSevutIzbwixZ1J9vS+MReR8cMvwKVDAcmaj8HEtG0waFtFsKQ2RzIjTfYahm6n3:Kat+wmTJYReltKVMeYkXOjYo5tG3VN+
              MD5:BF74C90D28E52DD99A01377A96F462E3
              SHA1:DBA09C670F24D47B95D12D4BB9704391B81DDA9A
              SHA-256:EC11BFD49C715CD89FB9D387A07CF54261E0F4A1CCEC1A810E02C7B38AD2F285
              SHA-512:8F5A86BB57256ED2412F6454AF06C52FB44C83EB7B820C642CA9216E9DB31D6EC22965BF5CB9E8AE4492C77C1F48EB2387B1CBDC80F6CDA33FA57C57EC9FF9CD
              Malicious:false
              Preview:# Encoding file: gb2312, double-byte.D.233F 0 81.21.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.000030003001300230FB02C902C700A8300330052015FF5E2225202620182019.201C201D3014301530083009300A300B300C300D300E300F3016301730103011.00B100D700F72236222722282211220F222A222922082237221A22A522252220.23122299222B222E2261224C2248223D221D2260226E226F22642265221E2235.22342642264000B0203220332103FF0400A4FFE0FFE1203000A7211626062605.25CB25CF25CE25C725C625A125A025B325B2203B219221902191219330130000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.00000000000000000000000000000000000000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):85574
              Entropy (8bit):2.3109636068522357
              Encrypted:false
              SSDEEP:384:SgOycCs6mBixg1k6y8NMSwR8JMvz6VaVZmASVHBtGtRfS7FXtQ/RSJj9fNLSmXn/:SdC4BmCkjSwAO6VIrahNrVNTSYG3Oln
              MD5:9A60E5D1AB841DB3324D584F1B84F619
              SHA1:BCCC899015B688D5C426BC791C2FCDE3A03A3EB5
              SHA-256:546392237F47D71CEE1DAA1AAE287D94D93216A1FABD648B50F59DDCE7E8AE35
              SHA-512:E9F42B65A8DFB157D1D3336A94A83D372227BAA10A82EB0C6B6FB5601AA352A576FA3CDFD71EDF74A2285ABCA3B1D3172BB4B393C05B3B4AB141AAF04B10F426
              Malicious:false
              Preview:# Encoding file: euc-cn, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):192
              Entropy (8bit):4.915818681498601
              Encrypted:false
              SSDEEP:3:SOd5MNXVSVLqRIBXSl1AEXMV/RRDfANDemSjs5dqcRcRZMvs5BCUNZ:SVNFS01K+MtkvSjwqd9NZ
              MD5:224219C864280FA5FB313ADBC654E37D
              SHA1:39E20B41CFA8B269377AFA06F9C4D66EDD946ACB
              SHA-256:E12928E8B5754D49D0D3E799135DE2B480BA84B5DBAA0E350D9846FA67F943EC
              SHA-512:6E390D83B67E2FD5BCAC1BA603A9C6F8BE071FA64021612CE5F8EE33FD8E3840A8C31A7B00134A0039E46BDC66BEF7EB6EA1F8663BA72816B86AF792EF7BDC56
              Malicious:false
              Preview:# Encoding file: iso2022-jp, escape-driven.E.name..iso2022-jp.init..{}.final..{}.ascii..\x1b(B.jis0201..\x1b(J.jis0208..\x1b$B.jis0208..\x1b$@.jis0212..\x1b$(D.gb2312..\x1b$A.ksc5601..\x1b$(C.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):115
              Entropy (8bit):4.945508829557185
              Encrypted:false
              SSDEEP:3:SOd5MNXVTEXIBXSl1AEXNELmUHhqQc6XfUNOvn:SVNFS1K+9Qc6sNA
              MD5:F6464F7C5E3F642BC3564D59B888C986
              SHA1:94C5F39256366ABB68CD67E3025F177F54ECD39D
              SHA-256:6AC0F1845A56A1A537B9A6D9BCB724DDDF3D3A5E61879AE925931B1C0534FBB7
              SHA-512:B9A7E0A9344D8E883D44D1A975A7C3B966499D34BA6206B15C90250F88A8FA422029CEF190023C4E4BE806791AC3BEA87FD8872B47185B0CE0F9ED9C38C41A84
              Malicious:false
              Preview:# Encoding file: iso2022-kr, escape-driven.E.name..iso2022-kr.init..\x1b$)C.final..{}.iso8859-1.\x0f.ksc5601..\x0e.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):226
              Entropy (8bit):4.925633473589168
              Encrypted:false
              SSDEEP:3:SOd5MNXVUW+IBXSl1AEXM56DfqQc6WHmSjs5dReQSXcRcRZMvs5BCUNxXeR5IHRv:SVNFUX1K+M55Qc6WGSjwRDSXd9NGIHRv
              MD5:745464FF8692E3C3D8EBBA38D23538C8
              SHA1:9D6F077598A5A86E6EB6A4EEC14810BF525FBD89
              SHA-256:753DDA518A7E9F6DC0309721B1FAAE58C9661F545801DA9F04728391F70BE2D0
              SHA-512:E919677CC96DEF4C75126A173AF6C229428731AB091CDDBB2A6CE4EB82BCD8191CE64A33B418057A15E094A48E846BEE7820619E414E7D90EDA6E2B66923DDA5
              Malicious:false
              Preview:# Encoding file: iso2022, escape-driven.E.name..iso2022.init..{}.final..{}.iso8859-1.\x1b(B.jis0201..\x1b(J.gb1988..\x1b(T.jis0208..\x1b$B.jis0208..\x1b$@.jis0212..\x1b$(D.gb2312..\x1b$A.ksc5601..\x1b$(C.jis0208..\x1b&@\x1b$B.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.163043970763833
              Encrypted:false
              SSDEEP:24:iyTUmJvRju3ShVbsZiAMiZyb7P4UPvvPNNAkbnMH+tjg:iygmOEVIwAMiw/PTvok7zE
              MD5:E3BAE26F5D3D9A4ADCF5AE7D30F4EC38
              SHA1:A71B6380EA3D23DC0DE11D3B8CEA86A4C8063D47
              SHA-256:754EF6BF3A564228AB0B56DDE391521DCC1A6C83CFB95D4B761141E71D2E8E87
              SHA-512:AFED8F5FE02A9A30987736F08B47F1C19339B5410D6020CC7EA37EA0D717A70AF6CDDC775F53CE261FCF215B579206E56458D61AB4CEB44E060BD6B3AC2F4C41
              Malicious:false
              Preview:# Encoding file: iso8859-1, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.2483197762497458
              Encrypted:false
              SSDEEP:24:jTUmJvRju3ShVbsZiAMiZyb7P4UP6L2yhBKyta:jgmOEVIwAMiw/PT6L2Ryta
              MD5:162E76BD187CB54A5C9F0B72A082C668
              SHA1:CEC787C4DE78F9DBB97B9C44070CF2C12A2468F7
              SHA-256:79F6470D9BEBD30832B3A9CA59CD1FDCA28C5BE6373BD01D949EEE1BA51AA7A8
              SHA-512:ADDBCA6E296286220FFF449D3E34E5267528627AFFF1FCBD2B9AC050A068D116452D70308049D88208FB7CB2C2F7582FCF1703CF22CFC125F2E6FA89B8A653FE
              Malicious:false
              Preview:# Encoding file: iso8859-10, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.267798724121087
              Encrypted:false
              SSDEEP:24:olTUmJvRju3ShVbsZiAMiZyb7P4UP1w4LaxUVG4dT:olgmOEVIwAMiw/PT+4VfT
              MD5:BF3993877A45AC7091CFC81CFD4A4D43
              SHA1:D462934A074EE13F2C810463FD061084953F77BC
              SHA-256:33C6072A006BA4E9513D7B7FD3D08B1C745CA1079B6D796C36B2A5AE8E4AE02B
              SHA-512:17489E6AD6A898628239EA1B43B4BE81ECC33608F0FD3F7F0E19CF74F7FC4752813C3C21F1DC73E9CC8765E23C63ED932799905381431DAF4E10A88EC29EBF6E
              Malicious:false
              Preview:# Encoding file: iso8859-13, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.296489289648924
              Encrypted:false
              SSDEEP:24:vTUmJvRju3ShVbsZiAMiZyb7P4UPt6C5AkE7MH+tZS4Y:vgmOEVIwAMiw/PTAQAkCzsP
              MD5:3BE4986264587BEC738CC46EBB43D698
              SHA1:62C253AA7A868CE32589868FAB37336542457A96
              SHA-256:8D737283289BAF8C08EF1DD7E47A6C775DACE480419C5E2A92D6C0E85BB5B381
              SHA-512:CB9079265E47EF9672EAACFCE474E4D6771C6F61394F29CC59C9BBE7C99AE89A0EACD73F2BCDD8374C4E03BE9B1685F463F029E35C4070DF9D1B143B02CAD573
              Malicious:false
              Preview:# Encoding file: iso8859-14, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.1878838020538374
              Encrypted:false
              SSDEEP:24:mTUmJvRju3ShVbsZiAMiZyb7P4UPvRarkbnMH+tjg:mgmOEVIwAMiw/PTvqk7zE
              MD5:6AE49F4E916B02EB7EDB160F88B5A27F
              SHA1:49F7A42889FB8A0D78C80067BDE18094DBE956EE
              SHA-256:C7B0377F30E42048492E4710FE5A0A54FA9865395B8A6748F7DAC53B901284F9
              SHA-512:397E636F4B95522FD3909B4546A1B7E31E92388DAE4F9F6B638875449E3498B49320F4C4A47168C7ADD43C78EF5680CAAEE40661DDC8205687532D994133EA3B
              Malicious:false
              Preview:# Encoding file: iso8859-15, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.2349228762697972
              Encrypted:false
              SSDEEP:24:dTUmJvRju3ShVbsZiAMiZyb7P4UP/SlTPkyTtZVc:dgmOEVIwAMiw/PTqFPkypXc
              MD5:D30094CAEFA5C4A332159829C6CB7FEC
              SHA1:50FDA6C70A133CB64CF38AA4B2F313B54D2FD955
              SHA-256:C40CA014B88F97AE62AE1A816C5963B1ED432A77D84D89C3A764BA15C8A23708
              SHA-512:6EDD6912053D810D1E2B0698494D26E119EF1BF3FABC2FBFBA44551792800FA0CF163773E4F37F908C2DE41F05D6F17153656623A6D4681BE74EB253D9163422
              Malicious:false
              Preview:# Encoding file: iso8859-16, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.269412550127009
              Encrypted:false
              SSDEEP:24:UTUmJvRju3ShVbsZiAMiZyb7P4UPPssm0O4yT2H:UgmOEVIwAMiw/PTPss5tyT2H
              MD5:69FCA2E8F0FD9B39CDD908348BD2985E
              SHA1:FF62EB5710FDE11074A87DAEE9229BCF7F66D7A0
              SHA-256:0E0732480338A229CC3AD4CDDE09021A0A81902DC6EDFB5F12203E2AFF44668F
              SHA-512:46A7899D17810D2E0FF812078D91F29BF2BB8770F09A02367CF8361229F424FC9B06EAC8E3756491612972917463B6F27DB3D897AFAE8DB5F159D45975D9CBD8
              Malicious:false
              Preview:# Encoding file: iso8859-2, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.178020305301999
              Encrypted:false
              SSDEEP:24:tTUmJvRju3ShVbsZiAMiZyb7P4UPp2g4kBTvSMkFtP0:tgmOEVIwAMiw/PTj4kBTvSDP0
              MD5:5685992A24D85E93BD8EA62755E327BA
              SHA1:B0BEBEDEC53FFB894D9FB0D57F25AB2A459B6DD5
              SHA-256:73342C27CF55F625D3DB90C5FC8E7340FFDF85A51872DBFB1D0A8CB1E43EC5DA
              SHA-512:E88ED02435026CA9B8A23073F61031F3A75C4B2CD8D2FC2B598F924ADF34B268AB16909120F1D96B794BDBC484C764FDE83B63C9FB122279AC5242D57030AF3A
              Malicious:false
              Preview:# Encoding file: iso8859-3, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.2703067063488724
              Encrypted:false
              SSDEEP:24:KTUmJvRju3ShVbsZiAMiZyb7P4UP04xsD/njwKyjhJ:KgmOEVIwAMiw/PT06s3fylJ
              MD5:07576E85AFDB2816BBCFFF80E2A12747
              SHA1:CC1C2E6C35B005C17EB7B1A3D744983A86A75736
              SHA-256:17745BDD299779E91D41DB0CEE26CDC7132DA3666907A94210B591CED5A55ADB
              SHA-512:309EEF25EE991E3321A57D2CEE139C9C3E7C8B3D9408664AAFE9BA34E28EF5FB8167481F3C5CAD0557AE55249E47016CA3A6AC19857D76EFB58D0CDAC428F600
              Malicious:false
              Preview:# Encoding file: iso8859-4, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.2716690950473573
              Encrypted:false
              SSDEEP:24:zTUmJvRju3ShVbsZiAMiZyb7P4UPNXe+SAJlM9aHe3cmy+:zgmOEVIwAMiw/PTNp5+smy+
              MD5:67577E6720013EEF73923D3F050FBFA1
              SHA1:F9F64BB6014068E2C0737186C694B8101DD9575E
              SHA-256:BC5ED164D15321404BBDCAD0D647C322FFAB1659462182DBD3945439D9ECBAE7
              SHA-512:B584DB1BD5BE97CCFCA2F71E765DEC66CF2ABE18356C911894C988B2238E14074748C71074E0633C7CA50733E189D937160A35438C720DB2243CBC3566F52629
              Malicious:false
              Preview:# Encoding file: iso8859-5, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):2.9147595181616284
              Encrypted:false
              SSDEEP:24:YTUmJvRju3ShVbsZiAMiZyb7P4UPSIZjyco/rs:YgmOEVIwAMiw/PTBsBrs
              MD5:49DEC951C7A7041314DF23FE26C9B300
              SHA1:B810426354D857718CC841D424DA070EFB9F144F
              SHA-256:F502E07AE3F19CCDC31E434049CFC733DD5DF85487C0160B0331E40241AD0274
              SHA-512:CB5D8C5E807A72F35AD4E7DA80882F348D70052169A7ED5BB585152C2BF628177A2138BD0A982A398A8DF373E1D3E145AD1F6C52485DE57ECBE5A7ED33E13776
              Malicious:false
              Preview:# Encoding file: iso8859-6, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.2933089629252037
              Encrypted:false
              SSDEEP:24:TMyTUmJvRju3ShVbsZiAMiZyb7P4UP1mKUQQSqJWeIDmq:TlgmOEVIwAMiw/PTkKJQSqJWeI1
              MD5:0AF65F8F07F623FA38E2D732400D95CF
              SHA1:D2903B32FEA225F3FB9239E622390A078C8A8FA6
              SHA-256:8FEC7631A69FCF018569EBADB05771D892678790A08E63C05E0007C9910D58A8
              SHA-512:EF03237A030C54E0E20DBA7ED724580C513490B9B3B043C1E885638E7BCE21415CE56C3902EA39689365B12E44194C6BF868C4D9BCBCA8FDC334BE77DA46E24D
              Malicious:false
              Preview:# Encoding file: iso8859-7, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.00A02018201900A30000000000A600A700A800A9000000AB00AC00AD00002015.00B000B100B200B303840385038600B703880389038A00BB038C00BD038E038F.0390039103920393039403950396039703980399039A039B039C039D039E039F.03A003A1000003A303A403A503A603A703A803A903AA03AB03AC03AD03AE03AF.03B003B103B203B303B403B503B603B703B8
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):2.9730608214144323
              Encrypted:false
              SSDEEP:24:uTUmJvRju3ShVbsZiAMiZyb7P4UPtePly0b:ugmOEVIwAMiw/PTtw
              MD5:45E35EFF7ED2B2DF0B5694A2B639FE1E
              SHA1:4EA5EC5331541EDE65A9CF601F5418FD4B6CFCBC
              SHA-256:E1D207917AA3483D9110E24A0CC0CD1E0E5843C8BFC901CFEE7A6D872DD945A9
              SHA-512:527283C9EFF2C1B21FAE716F5DFB938D8294B22938C76A73D88135312FA01B5C3DF288461CCE8B692928B334A28A7D29319F9F48733174C898F41BD1BEB8E862
              Malicious:false
              Preview:# Encoding file: iso8859-8, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1094
              Entropy (8bit):3.1865263857127375
              Encrypted:false
              SSDEEP:24:XTUmJvRju3ShVbsZiAMiZyb7P4UPvvPNNAkKMH+tZL/M:XgmOEVIwAMiw/PTvokKzR0
              MD5:675C89ECD212C8524B1875095D78A5AF
              SHA1:F585C70A5589DE39558DAC016743FF85E0C5F032
              SHA-256:1CDCF510C38464E5284EDCFAEC334E3FC516236C1CA3B9AB91CA878C23866914
              SHA-512:E620657C5F521A101B6FF7B5FD9A7F0DDD560166BA109D20E91F2E828F81697F897DFA136533C0D6F24A9861E92F34C0CC0FA590F344713C089157F8AC3ECFE2
              Malicious:false
              Preview:# Encoding file: iso8859-9, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1092
              Entropy (8bit):3.1984111069807395
              Encrypted:false
              SSDEEP:24:zBTUmJvRju3ShVbsZiAMiZyb7PN8pUPnfk5JM0RHFj:zBgmOEVIwAMiw/PNPQPFj
              MD5:0DCB64ACBB4B518CC20F4E196E04692C
              SHA1:7AEB708C89C178FB4D5611C245EA1A7CF66ADF3A
              SHA-256:480F61D0E1A75DEE59BF9A66DE0BB78FAAE4E87FD6317F93480412123277D442
              SHA-512:4AFA210763DE9742626886D7D281AC15169CDC7A31D185F48D105190CA247AA014FB8F281AFCB4A0C31D2D55EE7D907B6A8E51FC4BEEDB9DB8C484E88CAA78A9
              Malicious:false
              Preview:# Encoding file: jis0201, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):80453
              Entropy (8bit):2.274731552146978
              Encrypted:false
              SSDEEP:384:R7Cyeug/RAEo7umlshyGYknyRXglMVw9bq7bYI45zh2cvA3FXwhZ1BrUc2C5oS5u:RgZJo7uNhbyO1ZiEXPcXwhZbrUPkBso2
              MD5:F35938AC582E460A14646D2C93F1A725
              SHA1:A922ACACE0C1A4A7DDC92FE5DD7A116D30A3686B
              SHA-256:118EA160EF29E11B46DEC57AF2C44405934DD8A7C49D2BC8B90C94E8BAA6138B
              SHA-512:D27CD9C9D67370C288036AACA5999314231F7070152FF7EEF1F3379E748EF9047001430D391B61C281FF69AB4F709D47F8FF5390873B5DEFD105371AB8FB8872
              Malicious:false
              Preview:# Encoding file: jis0208, double-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):70974
              Entropy (8bit):2.2631380488363284
              Encrypted:false
              SSDEEP:768:WmU4+qNPpEzjKgGWJACVeCssX2Qt5E2+G7PBIv:LU4+qNaCgGW7VGK2o+0qv
              MD5:F518436AC485F5DC723518D7872038E0
              SHA1:15013478760463A0BCE3577B4D646ECDB07632B5
              SHA-256:24A9D379FDA39F2BCC0580CA3E0BD2E99AE279AF5E2841C9E7DBE7F931D19CC0
              SHA-512:2325705D4772A10CD81082A035BEAC85E6C64C7CCFA5981955F0B85CAF9A95D8A0820092957822A05C2E8E773F2089035ED5E76BF3FAF19B0E7E6AED7B4214D8
              Malicious:false
              Preview:# Encoding file: jis0212, double-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.463428231669408
              Encrypted:false
              SSDEEP:24:KcJ5mTUmJvRju3ShVbsZiAMiZyb7PcSzm1XvRS3YcmchJQ3MAxSy:KmmgmOEVIwAMiw/Ptz8gBmRcAx5
              MD5:E66D42CB71669CA0FFBCDC75F6292832
              SHA1:366C137C02E069B1A93FBB5D64B9120EA6E9AD1F
              SHA-256:7142B1120B993D6091197574090FE04BE3EA64FFC3AD5A167A4B5E0B42C9F062
              SHA-512:6FBF7AF0302B4AA7EF925EFED7235E946EDA8B628AA204A8BBB0A3D1CB8C79DD37D9DD92A276AD14B55776FEBB3B55CF5881AC4013F95ED4E618E3B49771E8A5
              Malicious:false
              Preview:# Encoding file: koi8-r, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.439504497428066
              Encrypted:false
              SSDEEP:24:K+TUmJvRju3ShVbsZiAMiZyb7PcSzmn3gXDRS3YcmchJQ3MAxSy:K+gmOEVIwAMiw/Ptz0KgBmRcAx5
              MD5:D722EFEA128BE671A8FDA45ED7ADC586
              SHA1:DA9E67F64EC4F6A74C60CB650D5A12C4430DCFF7
              SHA-256:BBB729B906F5FC3B7EE6694B208B206D19A9D4DC571E235B9C94DCDD4A323A2A
              SHA-512:FDF183C1A0D9109E21F7EEBC5996318AEDED3F87319A980C4E96BFE1D43593BDB693D181744C5C7E391A849783E3594234060A9F76116DE56F9592EF95979E63
              Malicious:false
              Preview:# Encoding file: koi8-u, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):92877
              Entropy (8bit):2.32911747373862
              Encrypted:false
              SSDEEP:768:XtWS2ymX62EztZ1Oyxk1uGtQPUNg0q+6XVfEFh:XtWnzEn1HxRQQPV0Eeh
              MD5:599CEA614F5C5D01CDFA433B184AA904
              SHA1:C2FFA427457B4931E5A92326F251CD3D671059B0
              SHA-256:0F8B530AD0DECBF8DD81DA8291B8B0F976C643B5A292DB84680B31ECFBE5D00A
              SHA-512:43D24B719843A21E3E1EDDFC3607B1B198542306C2EC8D621188CD39BA913D23678D39D12D8370CC1CE12828661AF0A5F14AD2B2BF99F62387C5E3E365BA1E75
              Malicious:false
              Preview:# Encoding file: ksc5601, double-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1096
              Entropy (8bit):3.3601842107710365
              Encrypted:false
              SSDEEP:24:8jTUmJvRju3ShVbsZiAMiZyb7P4ZVPJS82WcVDX1MPEd4RPMppJ8K:8jgmOEVIwAMiw/PsVoy24VMppiK
              MD5:CADFBF5A4C7CAD984294284D643E9CA3
              SHA1:16B51D017001688A32CB7B15DE6E7A49F28B76FD
              SHA-256:8F3089F4B2CA47B7AC4CB78375B2BFAC01268113A7C67D020F8B5B7F2C25BBDA
              SHA-512:3941ACA62CF59BF6857BA9C300B4236F18690DE1213BB7FCFA0EC87DCD71152849F1DEAFB470CA4BC2ACC2C0C13D7FD57661BFC053960ADD7570DE365AE7E63C
              Malicious:false
              Preview:# Encoding file: macCentEuro, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.00C40100010100C9010400D600DC00E10105010C00E4010D0106010700E90179.017A010E00ED010F01120113011600F3011700F400F600F500FA011A011B00FC.202000B0011800A300A7202200B600DF00AE00A92122011900A822600123012E.012F012A22642265012B0136220222110142013B013C013D013E0139013A0145.0146014300AC221A01440147220600AB00BB202600A00148015000D50151014C.20132014201C201D2018201900F725CA014D0154015501582039203A01590156.01570160201A201E0161015A015B00C101
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1096
              Entropy (8bit):3.3293096097500965
              Encrypted:false
              SSDEEP:24:8ULyTUmJvRju3ShVbsZiAMiZyb7P4SNMdNxOZwl+KR8DklJyseQWkv:8ULygmOEVIwAMiw/P34+KR8DklEswm
              MD5:F13D479550D4967A0BC76A60C89F1461
              SHA1:63F44E818284384DE07AB0D8B0CD6F7EBFE09AB9
              SHA-256:8D0B6A882B742C5CCE938241328606C111DDA0CB83334EBEDCDA17605F3641AE
              SHA-512:80AB9DCAAC1A496FD2CA6BE9959FE2DE201F504D8A58D114F2FF5D1F6AAD507F052B87D29D3EBA69093C3D965CC4C113C9EA6DB8EEBB67BD620ADF860CA2CC35
              Malicious:false
              Preview:# Encoding file: macCroatian, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1096
              Entropy (8bit):3.3482225358368565
              Encrypted:false
              SSDEEP:24:8dTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aDpiR/Pk956e3cmh:8dgmOEVIwAMiw/Pr5NY3k9nsmh
              MD5:60FFC8E390A31157D8646AEAC54E58AE
              SHA1:3DE17B2A5866272602FB8E9C54930A4CD1F3B06C
              SHA-256:EB135A89519F2E004282DED21B11C3AF7CCB2320C9772F2DF7D1A4A1B674E491
              SHA-512:3644429A9BD42ADC356E1BD6FCFABEE120E851348B538A4FE4903B72A533174D7448A6C2DA71219E4CD5D0443C0475417D54C8E113005DF2CA20C608DE5E3306
              Malicious:false
              Preview:# Encoding file: macCyrillic, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0410041104120413041404150416041704180419041A041B041C041D041E041F.0420042104220423042404250426042704280429042A042B042C042D042E042F.202000B0049000A300A7202200B6040600AE00A9212204020452226004030453.221E00B122642265045600B504910408040404540407045704090459040A045A.0458040500AC221A01922248220600AB00BB202600A0040B045B040C045C0455.20132014201C201D2018201900F7201E040E045E040F045F211604010451044F.0430043104320433043404350436043704
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1096
              Entropy (8bit):3.8086748658227827
              Encrypted:false
              SSDEEP:24:87JM0UmJvRjuyfqYCsUBOdXBCbtwHviANskNWkiXFtoE4OSFgHrBPkq:87KfmOEqYCs6CXRPiANHWkiXFt9XSMdf
              MD5:EBD121A4E93488A48FC0A06ADE9FD158
              SHA1:A40E6DB97D6DB2893A072B2275DC22E2A4D60737
              SHA-256:8FBCC63CB289AFAAE15B438752C1746F413F3B79BA5845C2EF52BA1104F8BDA6
              SHA-512:26879ABE4854908296F32B2BB97AEC1F693C56EC29A7DB9B63B2DA62282F2D2EDAE9D50738595D1530731DF5B1812719A74F50ADF521F80DD5067F3DF6A3517C
              Malicious:false
              Preview:# Encoding file: macDingbats, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1093
              Entropy (8bit):3.4271472017271556
              Encrypted:false
              SSDEEP:24:8dOTUmJvRju3ShVbsZiAMiZyb7P4Hlb7BMM2aSYjsSkUEkp1FsOSUTime:8kgmOEVIwAMiw/Pg7K23s0x1FsOJTime
              MD5:14AD68855168E3E741FE179888EA7482
              SHA1:9C2AD53D69F5077853A05F0933330B5D6F88A51C
              SHA-256:F7BFF98228DED981EC9A4D1D0DA62247A8D23F158926E3ACBEC3CCE379C998C2
              SHA-512:FB13F32197D3582BC20EEA604A0B0FD7923AE541CCEB3AF1CDE36B0404B8DB6312FB5270B40CBC8BA4C91B9505B57FB357EB875E8AFB3DB76DFB498CE17851ED
              Malicious:false
              Preview:# Encoding file: macGreek, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.3292041026777457
              Encrypted:false
              SSDEEP:24:8KTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdjY4g4JysAWD:8KgmOEVIwAMiw/Pf2YRMFBEszD
              MD5:6D52A84C06970CD3B2B7D8D1B4185CE6
              SHA1:C434257D76A9FDF81CCCD8CC14242C8E3940FD89
              SHA-256:633F5E3E75BF1590C94AB9CBF3538D0F0A7A319DB9016993908452D903D9C4FD
              SHA-512:711F4DC86DD609823BF1BC5505DEE9FA3875A8AA7BCA31DC1B5277720C5ABE65B62E8A592FC55D99D1C7CA181FDDC2606551C43A9D12489B9FECFF152E9A3DCF
              Malicious:false
              Preview:# Encoding file: macIceland, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):48028
              Entropy (8bit):3.3111639331656635
              Encrypted:false
              SSDEEP:768:ehuW1PJnT9TO7RaQiPCLUKr7KBi9FrOLdtHJ:eZPV9KuqTxFGXp
              MD5:105B49F855C77AE0D3DED6C7130F93C2
              SHA1:BA187C52FAE9792DA5BFFBEAA781FD4E0716E0F6
              SHA-256:2A6856298EC629A16BDD924711DFE3F3B1E3A882DDF04B7310785D83EC0D566C
              SHA-512:5B5FBE69D3B67AF863759D92D4A68481EC2211FF84ED9F0B3BD6129857966DE32B42A42432C44B9246C9D0D9C4C546CD3C6D13FF49BD338192C24AD053C0602E
              Malicious:false
              Preview:# Encoding file: macJapan, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1093
              Entropy (8bit):3.3361385497578406
              Encrypted:false
              SSDEEP:24:8TTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdjBtRg4JysAWD:8TgmOEVIwAMiw/P32YRMTtRBEszD
              MD5:30BECAE9EFD678B6FD1E08FB952A7DBE
              SHA1:E4D8EA6A0E70BB793304CA21EB1337A7A2C26A31
              SHA-256:68F22BAD30DAA81B215925416C1CC83360B3BB87EFC342058929731AC678FF37
              SHA-512:E87105F7A5A983ACEAC55E93FA802C985B2B19F51CB3C222B4C13DDCF17C32D08DF323C829FB4CA33770B668485B7D14B7F6B0CF2287B0D76091DE2A675E88BD
              Malicious:false
              Preview:# Encoding file: macRoman, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.342586490827578
              Encrypted:false
              SSDEEP:24:8tTUmJvRju3ShVbsZiAMiZyb7P4SNMVZSxOZFYRMdj/TAg4JysAWD:8tgmOEVIwAMiw/P3AtYRMFTABEszD
              MD5:C9AD5E42DA1D2C872223A14CC76F1D2B
              SHA1:E257BD16EF34FDC29D5B6C985A1B45801937354C
              SHA-256:71AE80ADFB437B7BC88F3C76FD37074449B3526E7AA5776D2B9FD5A43C066FA8
              SHA-512:74588523D35A562AD4B1AF2B570596194D8C5018D5B44C8BA2B1F6BAD422D06E90172B0E65BB975663F3A3C246BCF2F598E9778BA86D1C5A51F5C0A38A2670EC
              Malicious:false
              Preview:# Encoding file: macRomania, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1092
              Entropy (8bit):3.539905812302991
              Encrypted:false
              SSDEEP:24:88TUmJvRju3ShVbsZiAMiZyb7P4oJi8XPHmED43U/Tmh:88gmOEVIwAMiw/PNJpP43U0
              MD5:163729C7C2B1F5A5DE1FB7866C93B102
              SHA1:633D190B5E281CFC0178F6C11DD721C6A266F643
              SHA-256:CEAD5EB2B0B44EF4003FBCB2E49CA0503992BA1D6540D11ACBBB84FDBBD6E79A
              SHA-512:2093E3B59622E61F29276886911FAA50BA3AA9D903CAF8CB778A1D3FDB3D1F7DA43071AFC3672C27BE175E7EEBBC542B655A85533F41EA39F32E80663CAF3B44
              Malicious:false
              Preview:# Encoding file: macThai, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.353168947106635
              Encrypted:false
              SSDEEP:24:8QjTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdD/g4JysD:88gmOEVIwAMiw/P32YRM9BEsD
              MD5:F20CBBE1FF9289AC4CBAFA136A9D3FF1
              SHA1:382E34824AD8B79EF0C98FD516750649FD94B20A
              SHA-256:F703B7F74CC6F5FAA959F51C757C94623677E27013BCAE23BEFBA01A392646D9
              SHA-512:23733B711614EA99D954E92C6035DAC1237866107FE11CDD5B0CD2A780F22B9B7B879570DB38C6B9195F54DAD9DFB0D60641AB37DFF3C51CF1A11D1D36471B2D
              Malicious:false
              Preview:# Encoding file: macTurkish, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1095
              Entropy (8bit):3.3460856516901947
              Encrypted:false
              SSDEEP:24:8TzTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aDpiR/Pk956e3cmq:8PgmOEVIwAMiw/Pr5NY3k9nsmq
              MD5:92716A59D631BA3A352DE0872A5CF351
              SHA1:A487946CB2EFD75FD748503D75E495720B53E5BC
              SHA-256:4C94E7FBE183379805056D960AB624D78879E43278262E4D6B98AB78E5FEFEA8
              SHA-512:863A667B6404ED02FE994089320EB0ECC34DC431D591D661277FB54A2055334DBEBCAAE1CA06FB8D190727EBA23A47B47991323BE35E74C182F83E5DEAA0D83B
              Malicious:false
              Preview:# Encoding file: macUkraine, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):41862
              Entropy (8bit):3.4936148161949747
              Encrypted:false
              SSDEEP:768:/huW1PJnT9TOZRaQiPCLUKr7KBi9FrOLdtY:/ZPV9KoqTxFGXY
              MD5:8FBCB1BBC4B59D6854A8FCBF25853E0D
              SHA1:2D56965B24125D999D1020C7C347B813A972647C
              SHA-256:7502587D52E7810228F2ECB45AC4319EA0F5C008B7AC91053B920010DC6DDF94
              SHA-512:128E66F384F9EA8F3E7FBEAD0D3AA1D45570EB3669172269A89AE3B522ED44E4572C6A5C9281B7E219579041D14FF0E76777A36E3902BFA1B58DC3DA729FA075
              Malicious:false
              Preview:# Encoding file: shiftjis, multi-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.675943323650254
              Encrypted:false
              SSDEEP:24:Sd0UmJvRjuLoVoMQVoRmSdsTAsSnP9Us+yw4VivXObCXv:afmOEVoMQVoRmosTHSP9U/ydmXwCXv
              MD5:1B612907F31C11858983AF8C009976D6
              SHA1:F0C014B6D67FC0DC1D1BBC5F052F0C8B1C63D8BF
              SHA-256:73FD2B5E14309D8C036D334F137B9EDF1F7B32DBD45491CF93184818582D0671
              SHA-512:82D4A8F9C63F50E5D77DAD979D3A59729CD2A504E7159AE3A908B7D66DC02090DABD79B6A6DC7B998C32C383F804AACABC564A5617085E02204ADF0B13B13E5B
              Malicious:false
              Preview:# Encoding file: symbol, single-byte.S.003F 1 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002122000023220300250026220D002800292217002B002C2212002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.22450391039203A70394039503A603930397039903D1039A039B039C039D039F.03A0039803A103A303A403A503C203A9039E03A80396005B2234005D22A5005F.F8E503B103B203C703B403B503C603B303B703B903D503BA03BB03BC03BD03BF.03C003B803C103C303C403C503D603C903BE03C803B6007B007C007D223C007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.000003D2203222642044221E0192266326662665266021942190219121922193.00B000B12033226500D7221D2202202200F72260226122482026F8E6F8E721B5.21352111211C21182297229522052229222A2283228722842282228622082209.2220220700AE00A92122220F221A22C500AC2227222821D421D021D121D221D3.22C42329F8E8F8E9F8EA2211F8EBF8ECF8EDF8E
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):2.9763240350841884
              Encrypted:false
              SSDEEP:24:ZlTUmJvRju3ShVbsZiAMiZyb7PNHmED43U/TW5dF:PgmOEVIwAMiw/PJ43UKF
              MD5:7273E998972C9EFB2CEB2D5CD553DE49
              SHA1:4AA47E6DF964366FA3C29A0313C0DAE0FA63A78F
              SHA-256:330517F72738834ECBF4B6FA579F725B4B33AD9F4669975E727B40DF185751FF
              SHA-512:56BF15C123083D3F04FE0C506EE8ECE4C08C17754F0CAAD3566F1469728CFD2F0A487023DCB26432240EB09F064944D3EF08175979F5D1D2BF734E7C7C609055
              Malicious:false
              Preview:# Encoding file: tis-620, single-byte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
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7900
              Entropy (8bit):4.806010360595623
              Encrypted:false
              SSDEEP:192:DXzSaH9ox7j4LaQMpsyGb0XEACrHpff6Jy8qNy6QRIt5QYTLa3QAQYplavQqQIL0:DpH9m7DPnQdg+Q
              MD5:E8FD468CCD2EE620544FE204BDE2A59D
              SHA1:2E26B7977D900EAA7D4908D5113803DF6F34FC59
              SHA-256:9B6E400EB85440EC64AB66B4AC111546585740C9CA61FD156400D7153CBAD9F4
              SHA-512:13A40A4BDE32F163CB789C69BD260ABF41C6771E7AC50FB122C727B9F39BE5D73E4D8BAE040DDDD94C5F2B901AB7C32D9C6BB62310121CA8DB4ADE25CB9AA4B0
              Malicious:false
              Preview:# history.tcl --.#.# Implementation of the history command..#.# Copyright (c) 1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#...# The tcl::history array holds the history list and some additional.# bookkeeping variables..#.# nextid.the index used for the next history list item..# keep..the max size of the history list.# oldest.the index of the oldest item in the history...namespace eval ::tcl {. variable history. if {![info exists history]} {..array set history {.. nextid.0.. keep.20.. oldest.-20..}. }.. namespace ensemble create -command ::tcl::history -map {..add.::tcl::HistAdd..change.::tcl::HistChange..clear.::tcl::HistClear..event.::tcl::HistEvent..info.::tcl::HistInfo..keep.::tcl::HistKeep..nextid.::tcl::HistNextID..redo.::tcl::HistRedo. }.}...# history --.#.#.This is the main history command. See the man page for its interface..#.This does s
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9689
              Entropy (8bit):4.754346192989986
              Encrypted:false
              SSDEEP:192:kQkH8VqqNg5PPx7GRpoMJesrCL2coOG0vARQVSDR6VrKj7vWQYQN81QvLbDdv:pVqeglpu6toO3ACUnvv
              MD5:1DA12C32E7E4C040BD9AB2BCBAC5445B
              SHA1:8E8659BEF065AF9430509BBDD5FB4CFE0EF14153
              SHA-256:ACBFF9B5EF75790920B95023156FAD80B18AFF8CAFC4A6DC03893F9388E053A2
              SHA-512:A269C76C1684EC1A2E2AA611ABB459AA3BE2973FD456737BC8C8D2E5C8BC53A26BBC1488062281CA87E38D548281166C4D775C50C695AEC9741FE911BB431EAD
              Malicious:false
              Preview:# http.tcl.# Client-side HTTP for GET, POST, and HEAD commands..# These routines can be used in untrusted code that uses the Safesock.# security policy..# These procedures use a callback interface to avoid using vwait,.# which is not defined in the safe base..#.# See the http.n man page for documentation..package provide http 1.0..array set http {. -accept */*. -proxyhost {}. -proxyport {}. -useragent {Tcl http client package 1.0}. -proxyfilter httpProxyRequired.}.proc http_config {args} {. global http. set options [lsort [array names http -*]]. set usage [join $options ", "]. if {[llength $args] == 0} {..set result {}..foreach name $options {.. lappend result $name $http($name)..}..return $result. }. regsub -all -- - $options {} options. set pat ^-([join $options |])$. if {[llength $args] == 1} {..set flag [lindex $args 0]..if {[regexp -- $pat $flag]} {.. return $http($flag)..} else {.. return -code error "Unknown option $flag, must be:
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):735
              Entropy (8bit):4.669068874824871
              Encrypted:false
              SSDEEP:12:jHxxYRs+opS42wyGlTajUA43KXks4L57+HkuRz20JSv6C3l5kl:bbYRshS42wyGlTah9XkbL5i1z2jxXkl
              MD5:10EC7CD64CA949099C818646B6FAE31C
              SHA1:6001A58A0701DFF225E2510A4AAEE6489A537657
              SHA-256:420C4B3088C9DACD21BC348011CAC61D7CB283B9BEE78AE72EED764AB094651C
              SHA-512:34A0ACB689E430ED2903D8A903D531A3D734CB37733EF13C5D243CB9F59C020A3856AAD98726E10AD7F4D67619A3AF1018F6C3E53A6E073E39BD31D088EFD4AF
              Malicious:false
              Preview:# Tcl package index file, version 1.0.# This file is generated by the "pkg_mkIndex" command.# and sourced either when an application starts up or.# by a "package unknown" script. It invokes the.# "package ifneeded" command to set up package-related.# information so that packages will be loaded automatically.# in response to "package require" commands. When this.# script is sourced, the variable $dir must contain the.# full path name of this file's directory...package ifneeded http 1.0 [list tclPkgSetup $dir http 1.0 {{http.tcl source {httpCopyDone httpCopyStart httpEof httpEvent httpFinish httpMapReply httpProxyRequired http_code http_config http_data http_formatQuery http_get http_reset http_size http_status http_wait}}}].
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):24432
              Entropy (8bit):4.824619671192163
              Encrypted:false
              SSDEEP:384:U8Oh2gWD8Ud4zaJqacMQsRNLKx32LgWMOFaBBf6/9IrO1zWq8oXbjdEfdQxAp12Q:2OD8Ud4WJqJfcMOFt/9IrOBWq8oXwQxM
              MD5:B900811A252BE90C693E5E7AE365869D
              SHA1:345752C46F7E8E67DADEF7F6FD514BED4B708FC5
              SHA-256:BC492B19308BC011CFCD321F1E6E65E6239D4EEB620CC02F7E9BF89002511D4A
              SHA-512:36B8CDBA61B9222F65B055C0C513801F3278A3851912215658BCF0CE10F80197C1F12A5CA3054D8604DA005CE08DA8DCD303B8544706B642140A49C4377DD6CE
              Malicious:false
              Preview:# init.tcl --.#.# Default system startup file for Tcl-based applications. Defines.# "unknown" procedure and auto-load facilities..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 1998-1999 Scriptics Corporation..# Copyright (c) 2004 by Kevin B. Kenny. All rights reserved..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# This test intentionally written in pre-7.5 Tcl.if {[info commands package] == ""} {. error "version mismatch: library\nscripts expect Tcl version 7.5b1 or later but the loaded version is\nonly [info patchlevel]".}.package require -exact Tcl 8.6.9..# Compute the auto path to use in this interpreter..# The values on the path come from several locations:.#.# The environment variable TCLLIBPATH.#.# tcl_library, which is the directory containing this init.tcl script..# [tclInit] (Tcl_Init()) sea
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):989
              Entropy (8bit):4.015702624322247
              Encrypted:false
              SSDEEP:12:4EnLzu8wcm2NkKcmtH3WhvdfjESBToOqepFHvFgdF69dixmem1OMVjeza6O6c:4azu8DtkN3bbJ75pF9gG3U2e+gc
              MD5:3A3B4D3B137E7270105DC7B359A2E5C2
              SHA1:2089B3948F11EF8CE4BD3D57167715ADE65875E9
              SHA-256:2981965BD23A93A09EB5B4A334ACB15D00645D645C596A5ECADB88BFA0B6A908
              SHA-512:044602E7228D2CB3D0A260ADFD0D3A1F7CAB7EFE5DD00C7519EAF00A395A48A46EEFDB3DE81902D420D009B137030BC98FF32AD97E9C3713F0990FE6C09887A2
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset af DAYS_OF_WEEK_ABBREV [list \. "So"\. "Ma"\. "Di"\. "Wo"\. "Do"\. "Vr"\. "Sa"]. ::msgcat::mcset af DAYS_OF_WEEK_FULL [list \. "Sondag"\. "Maandag"\. "Dinsdag"\. "Woensdag"\. "Donderdag"\. "Vrydag"\. "Saterdag"]. ::msgcat::mcset af MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset af MONTHS_FULL [list \. "Januarie"\. "Februarie"\. "Maart"\. "April"\. "Mei"\. "Junie"\. "Julie"\. "Augustus"\. "September"\. "Oktober"\. "November"\. "Desember"\. ""]. ::msgcat::mcset af AM "VM". ::msgcat::mcset af PM "NM".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.879621059534584
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmouFygvNLouFqF3v6aZouFy9+3vR6HK:4EnLzu8YAgvNTYF3v6axAI3voq
              MD5:27C356DF1BED4B22DFA55835115BE082
              SHA1:677394DF81CDBAF3D3E735F4977153BB5C81B1A6
              SHA-256:3C2F5F631ED3603EF0D5BCB31C51B2353C5C27839C806A036F3B7007AF7F3DE8
              SHA-512:EE88348C103382F91F684A09F594177119960F87E58C5E4FC718C698AD436E332B74B8ED18DF8563F736515A3A6442C608EBCBE6D1BD13B3E3664E1AA3851076
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset af_ZA DATE_FORMAT "%d %B %Y". ::msgcat::mcset af_ZA TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset af_ZA DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1964
              Entropy (8bit):4.417722751563065
              Encrypted:false
              SSDEEP:24:4azu8fnkFewadQxvbkMPm/FiUoAwonC9UFsvSnvMq:46dw/L+C9cKSvF
              MD5:0A88A6BFF15A6DABAAE48A78D01CFAF1
              SHA1:90834BCBDA9B9317B92786EC89E20DCF1F2DBD22
              SHA-256:BF984EC7CF619E700FE7E00381FF58ABE9BD2F4B3DD622EB2EDACCC5E6681050
              SHA-512:85CB96321BB6FB3119D69540B9E76916F0C5F534BA01382E73F8F9A0EE67A7F1BFC39947335688F2C8F3DB9B51D969D8EA7C7104A035C0E949E8E009D4656288
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar DAYS_OF_WEEK_ABBREV [list \. "\u062d"\. "\u0646"\. "\u062b"\. "\u0631"\. "\u062e"\. "\u062c"\. "\u0633"]. ::msgcat::mcset ar DAYS_OF_WEEK_FULL [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar MONTHS_ABBREV [list \. "\u064a\u0646\u0627"\. "\u0641\u0628\u0631"\. "\u0645\u0627\u0631"\. "\u0623\u0628\u0631"\. "\u0645\u0627\u064a"\. "\u064a\u0648\u0646"\. "\u064a\u0648\u0644"\. "\u0623\u063a\u0633"\. "\u0633\u0628\u062a"\. "\u0623\u0643\u062a"\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):259
              Entropy (8bit):4.825452591398057
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoKNvf/NLoKU3v6xH5oKNo+3vfXM6PYv:4EnLzu8yvf/Nq3v6vF3vfc6q
              MD5:EEB42BA91CC7EF4F89A8C1831ABE7B03
              SHA1:74D12B4CBCDF63FDF00E589D8A604A5C52C393EF
              SHA-256:29A70EAC43B1F3AA189D8AE4D92658E07783965BAE417FB66EE5F69CFCB564F3
              SHA-512:6CCB2F62986CE1CF3CE78538041A0E4AAF717496F965D73014A13E9B05093EB43185C3C14212DC052562F3F369AB6985485C8C93D1DFC60CF9B8DABEA7CDF434
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_IN DATE_FORMAT "%A %d %B %Y". ::msgcat::mcset ar_IN TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset ar_IN DATE_TIME_FORMAT "%A %d %B %Y %I:%M:%S %z %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1812
              Entropy (8bit):4.023830561129656
              Encrypted:false
              SSDEEP:24:4azu8J5Fe6k+wR+9Gb+Oa+UcP+wR+9Gb+Oa+UD:46I6CNbtdNbQ
              MD5:4338BD4F064A6CDC5BFED2D90B55D4E8
              SHA1:709717BB1F62A71E94D61056A70660C6A03B48AE
              SHA-256:78116E7E706C7D1E3E7446094709819FB39A50C2A2302F92D6A498E06ED4A31B
              SHA-512:C63A535AD19CBEF5EFC33AC5A453B1C503A59C6CE71A4CABF8083BC516DF0F3F14D3D4F309D33EDF2EC5E79DB00ED1F7D56FD21068F09F178BB2B191603BAC25
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_JO DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_JO MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1812
              Entropy (8bit):4.020656526954981
              Encrypted:false
              SSDEEP:24:4azu865Fehk+wR+9Gb+Oa+UXP+wR+9Gb+Oa+UD:46nhCNbadNbQ
              MD5:3789E03CF926D4F12AFD30FC7229B78D
              SHA1:AEF38AAB736E5434295C72C14F38033AAFE6EF15
              SHA-256:7C970EFEB55C53758143DF42CC452A3632F805487CA69DB57E37C1F478A7571B
              SHA-512:C9172600703337EDB2E36D7470A3AED96CCC763D7163067CB19E7B097BB7877522758C3109E31D5D72F486DD50BF510DDBA50EDD248B899FA0A2EEF09FCBF903
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_LB DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_LB MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1812
              Entropy (8bit):4.02203966019266
              Encrypted:false
              SSDEEP:24:4azu8k5Fezk+wR+9Gb+Oa+U5P+wRa9Gb+Oa+UD:46ZzCNb0d5bQ
              MD5:EC736BFD4355D842E5BE217A7183D950
              SHA1:C6B83C02F5D4B14064D937AFD8C6A92BA9AE9EFB
              SHA-256:AEF17B94A0DB878E2F0FB49D982057C5B663289E3A8E0E2B195DCEC37E8555B1
              SHA-512:68BB7851469C24003A9D74FC7FE3599A2E95EE3803014016DDEBF4C5785F49EDBADA69CD4103F2D3B6CE91E9A32CC432DBDFEC2AED0557E5B6B13AED489A1EDA
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_SY DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_SY MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2105
              Entropy (8bit):4.215818273236158
              Encrypted:false
              SSDEEP:48:46dJRQPQ86AK0xQuEQS3oQsDptuCrQICZmQ8ZVDtN1QFqQLtCSjZMpktvp:hdP6HIZoFnl1Rgx
              MD5:1A3ABFBC61EF757B45FF841C197BB6C3
              SHA1:74D623DAB6238D05C18DDE57FC956D84974FC2D4
              SHA-256:D790E54217A4BF9A7E1DCB4F3399B5861728918E93CD3F00B63F1349BDB71C57
              SHA-512:154D053410AA0F7817197B7EE1E8AE839BA525C7660620581F228477B1F5B972FE95A4E493BB50365D0B63B0115036DDE54A98450CA4E8048AF5D0AF092BADE5
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset be DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0434"\. "\u043f\u043d"\. "\u0430\u0442"\. "\u0441\u0440"\. "\u0447\u0446"\. "\u043f\u0442"\. "\u0441\u0431"]. ::msgcat::mcset be DAYS_OF_WEEK_FULL [list \. "\u043d\u044f\u0434\u0437\u0435\u043b\u044f"\. "\u043f\u0430\u043d\u044f\u0434\u0437\u0435\u043b\u0430\u043a"\. "\u0430\u045e\u0442\u043e\u0440\u0430\u043a"\. "\u0441\u0435\u0440\u0430\u0434\u0430"\. "\u0447\u0430\u0446\u0432\u0435\u0440"\. "\u043f\u044f\u0442\u043d\u0456\u0446\u0430"\. "\u0441\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset be MONTHS_ABBREV [list \. "\u0441\u0442\u0434"\. "\u043b\u044e\u0442"\. "\u0441\u043a\u0432"\. "\u043a\u0440\u0441"\. "\u043c\u0430\u0439"\. "\u0447\u0440\u0432"\. "\u043b\u043f\u043d"\. "\u0436\u043d\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1819
              Entropy (8bit):4.363233187157474
              Encrypted:false
              SSDEEP:48:46scAXuQfuQVoQAWN5EPIKfD8WQjQ3QgQaQLSqQsQGtQWCQMmt1f:hD/zQaPIKfTSiF3KVfVCqp
              MD5:11FA3BA30A0EE6A7B2B9D67B439C240D
              SHA1:EC5557A16A0293ABF4AA8E5FD50940B60A8A36A6
              SHA-256:E737D8DC724AA3B9EC07165C13E8628C6A8AC1E80345E10DC77E1FC62A6D86F1
              SHA-512:B776E7C98FB819436C61665206EE0A2644AA4952D739FF7CC58EAFBD549BD1D26028DE8E11B8533814102B31FC3884F95890971F547804BCAA4530E35BDD5CFD
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bg DAYS_OF_WEEK_ABBREV [list \. "\u041d\u0434"\. "\u041f\u043d"\. "\u0412\u0442"\. "\u0421\u0440"\. "\u0427\u0442"\. "\u041f\u0442"\. "\u0421\u0431"]. ::msgcat::mcset bg DAYS_OF_WEEK_FULL [list \. "\u041d\u0435\u0434\u0435\u043b\u044f"\. "\u041f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\. "\u0412\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0421\u0440\u044f\u0434\u0430"\. "\u0427\u0435\u0442\u0432\u044a\u0440\u0442\u044a\u043a"\. "\u041f\u0435\u0442\u044a\u043a"\. "\u0421\u044a\u0431\u043e\u0442\u0430"]. ::msgcat::mcset bg MONTHS_ABBREV [list \. "I"\. "II"\. "III"\. "IV"\. "V"\. "VI"\. "VII"\. "VIII"\. "IX"\. "X"\. "XI"\. "XII"\. ""]. ::msgcat::mcset bg MONTHS_FULL [list \. "\u042
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2286
              Entropy (8bit):4.04505151160981
              Encrypted:false
              SSDEEP:24:4azu8adWa9tUEVcqVc5VcaUTVcHVEVc+7VclEVcNGVcn0VcMG/0VcMjVcMK7YXs+:46C07LetHigetH1YES
              MD5:B387D4A2AB661112F2ABF57CEDAA24A5
              SHA1:80DB233687A9314600317AD39C01466C642F3C4C
              SHA-256:297D4D7CAE6E99DB3CA6EE793519512BFF65013CF261CF90DED4D28D3D4F826F
              SHA-512:450BB56198AAAB2EEFCD4E24C29DD79D71D2EF7E8D066F3B58F9C5D831F960AFB78C46ECE2DB32EF81454BCCC80C730E36A610DC9BAF06757E0757B421BACB19
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bn DAYS_OF_WEEK_ABBREV [list \. "\u09b0\u09ac\u09bf"\. "\u09b8\u09cb\u09ae"\. "\u09ae\u0999\u0997\u09b2"\. "\u09ac\u09c1\u09a7"\. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf"\. "\u09b6\u09c1\u0995\u09cd\u09b0"\. "\u09b6\u09a8\u09bf"]. ::msgcat::mcset bn DAYS_OF_WEEK_FULL [list \. "\u09b0\u09ac\u09bf\u09ac\u09be\u09b0"\. "\u09b8\u09cb\u09ae\u09ac\u09be\u09b0"\. "\u09ae\u0999\u0997\u09b2\u09ac\u09be\u09b0"\. "\u09ac\u09c1\u09a7\u09ac\u09be\u09b0"\. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf\u09ac\u09be\u09b0"\. "\u09b6\u09c1\u0995\u09cd\u09b0\u09ac\u09be\u09b0"\. "\u09b6\u09a8\u09bf\u09ac\u09be\u09b0"]. ::msgcat::mcset bn MONTHS_ABBREV [list \. "\u099c\u09be\u09a8\u09c1\u09df\u09be\u09b0\u09c0"\. "\u09ab\u09c7\u09ac\u09cd\u09b0\u09c1\u09df\u09be\u09b0\u09c0"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):259
              Entropy (8bit):4.821338044395148
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmovtvflD/Lo/E3v6xH5ovto+3vflm6PYv:4EnLzu81tvflD/SE3v6etF3vflm6q
              MD5:764E70363A437ECA938DEC17E615608B
              SHA1:2296073AE8CC421780E8A3BCD58312D6FB2F5BFC
              SHA-256:7D3A956663C529D07C8A9610414356DE717F3A2A2CE9B331B052367270ACEA94
              SHA-512:4C7B9082DA9DDF07C2BE16C359A1A42834B8E730AD4DD5B987866C2CC735402DDE513588A89C8DFA25A1AC6F66AF9FDDBEA8FD500F8526C4641BBA7011CD0D28
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bn_IN DATE_FORMAT "%A %d %b %Y". ::msgcat::mcset bn_IN TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset bn_IN DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1102
              Entropy (8bit):4.213250101046006
              Encrypted:false
              SSDEEP:24:4azu8WBVUUQ48wsF0nuLsCtJeUFqwv1v3:46BwoL5ScfR3
              MD5:9378A5AD135137759D46A7CC4E4270E0
              SHA1:8D2D53DA208BB670A335C752DFC4B4FF4509A799
              SHA-256:14FF564FAB584571E954BE20D61C2FACB096FE2B3EF369CC5ECB7C25C2D92D5A
              SHA-512:EF784D0D982BA0B0CB37F1DA15F8AF3BE5321F59E586DBED1EDD0B3A38213D3CEA1CDFC983A025418403400CCE6039B786EE35694A5DFCE1F22CB2D315F5FCF8
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ca DAYS_OF_WEEK_ABBREV [list \. "dg."\. "dl."\. "dt."\. "dc."\. "dj."\. "dv."\. "ds."]. ::msgcat::mcset ca DAYS_OF_WEEK_FULL [list \. "diumenge"\. "dilluns"\. "dimarts"\. "dimecres"\. "dijous"\. "divendres"\. "dissabte"]. ::msgcat::mcset ca MONTHS_ABBREV [list \. "gen."\. "feb."\. "mar\u00e7"\. "abr."\. "maig"\. "juny"\. "jul."\. "ag."\. "set."\. "oct."\. "nov."\. "des."\. ""]. ::msgcat::mcset ca MONTHS_FULL [list \. "gener"\. "febrer"\. "mar\u00e7"\. "abril"\. "maig"\. "juny"\. "juliol"\. "agost"\. "setembre"\. "octubre"\. "novembre"\. "desembre"\. ""]. ::msgcat::mcset ca DATE_FORMAT "%d/%m/%Y". ::msg
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1300
              Entropy (8bit):4.400184537938628
              Encrypted:false
              SSDEEP:24:4azu8f4sO4fETEtd3N5EPIK+kJQz3R3VJ2PYYITCF3eYGCvt2/v3eG:46/ETKN5EPIKfsxV+pBtMJ
              MD5:4C5679B0880394397022A70932F02442
              SHA1:CA5C47A76CD4506D8E11AECE1EA0B4A657176019
              SHA-256:49CF452EEF0B8970BC56A7B8E040BA088215508228A77032CBA0035522412F86
              SHA-512:39FA0D3235FFD3CE2BCCFFFA6A4A8EFE2668768757DAFDE901917731E20AD15FCAC4E48CF4ACF0ADFAA38CC72768FD8F1B826464B0F71A1C784E334AE72F857C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset cs DAYS_OF_WEEK_ABBREV [list \. "Ne"\. "Po"\. "\u00dat"\. "St"\. "\u010ct"\. "P\u00e1"\. "So"]. ::msgcat::mcset cs DAYS_OF_WEEK_FULL [list \. "Ned\u011ble"\. "Pond\u011bl\u00ed"\. "\u00dater\u00fd"\. "St\u0159eda"\. "\u010ctvrtek"\. "P\u00e1tek"\. "Sobota"]. ::msgcat::mcset cs MONTHS_ABBREV [list \. "I"\. "II"\. "III"\. "IV"\. "V"\. "VI"\. "VII"\. "VIII"\. "IX"\. "X"\. "XI"\. "XII"\. ""]. ::msgcat::mcset cs MONTHS_FULL [list \. "leden"\. "\u00fanor"\. "b\u0159ezen"\. "duben"\. "kv\u011bten"\. "\u010derven"\. "\u010dervenec"\. "srpen"\. "z\u00e1\u0159\u00ed"\. "\u0159\u00edjen"\. "listopad"\. "prosinec"\. ""]
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1156
              Entropy (8bit):4.242018456508518
              Encrypted:false
              SSDEEP:24:4azu8xVKE6V4/xPsS9CfXTBfijQT1GqAPwvsvT:461H6y/RsJXTNGqAuKT
              MD5:F012F45523AA0F8CFEACC44187FF1243
              SHA1:B171D1554244D2A6ED8DE17AC8000AA09D2FADE9
              SHA-256:CA58FF5BAA9681D9162E094E833470077B7555BB09EEE8E8DD41881B108008A0
              SHA-512:5BBC44471AB1B1622FABC7A12A8B8727087BE64BEAF72D2C3C9AAC1246A41D9B7CAFC5C451F24A3ACC681C310BF47BBC3384CF80EB0B4375E12646CB7BB8FFD5
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset da DAYS_OF_WEEK_ABBREV [list \. "s\u00f8"\. "ma"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f8"]. ::msgcat::mcset da DAYS_OF_WEEK_FULL [list \. "s\u00f8ndag"\. "mandag"\. "tirsdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f8rdag"]. ::msgcat::mcset da MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset da MONTHS_FULL [list \. "januar"\. "februar"\. "marts"\. "april"\. "maj"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset da BCE "f.Kr.". ::msgcat::mcset da CE "e.Kr.".
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1222
              Entropy (8bit):4.277486792653572
              Encrypted:false
              SSDEEP:24:4azu8byFouxpZzWsu0biMe5pF9g1tT9egQTqrS8QWmWFUvIvWI3:46CFB/ZzWsu0vpHlrS8QLWFSeWI3
              MD5:68882CCA0886535A613ECFE528BB81FC
              SHA1:6ABF519F6E4845E6F13F272D628DE97F2D2CD481
              SHA-256:CC3672969C1DD223EADD9A226E00CAC731D8245532408B75AB9A70E9EDD28673
              SHA-512:ACD5F811A0494E04A18035D2B9171FAF3AB8C856AAB0C09AEBE755590261066ADCD2750565F1CB840B2D0111D95C98970294550A4FBD00E4346D2EDBA3A5C957
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de DAYS_OF_WEEK_ABBREV [list \. "So"\. "Mo"\. "Di"\. "Mi"\. "Do"\. "Fr"\. "Sa"]. ::msgcat::mcset de DAYS_OF_WEEK_FULL [list \. "Sonntag"\. "Montag"\. "Dienstag"\. "Mittwoch"\. "Donnerstag"\. "Freitag"\. "Samstag"]. ::msgcat::mcset de MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mrz"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de MONTHS_FULL [list \. "Januar"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de BCE "v. Chr.". ::msgcat::mcset de CE "n. Chr.".
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):812
              Entropy (8bit):4.344116560816791
              Encrypted:false
              SSDEEP:12:4EnLzu8U3S5dkTo7eqepFHvFgt1BAI+5zS17eM5Qz3q6owjI9I3vd3v6B3v9dy:4azu8UlMe5pF9gXDT9egQTqr+rv1vivi
              MD5:63B8EBBA990D1DE3D83D09375E19F6AC
              SHA1:B7714AF372B4662A0C15DDBC0F80D1249CB1EEBD
              SHA-256:80513A9969A12A8FB01802D6FC3015712A4EFDDA64552911A1BB3EA7A098D02C
              SHA-512:638307C9B97C74BAF38905AC88E73B57F24282E40929DA43ADB74978040B818EFCC2EE2A377DFEB3AC9050800536F2BE1C7C2A7AB9E7B8BCF8D15E5F293F24D9
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de_AT MONTHS_ABBREV [list \. "J\u00e4n"\. "Feb"\. "M\u00e4r"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de_AT MONTHS_FULL [list \. "J\u00e4nner"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de_AT DATE_FORMAT "%Y-%m-%d". ::msgcat::mcset de_AT TIME_FORMAT "%T". ::msgcat::mcset de_AT TIME_FORMAT_12 "%T". ::msgcat::mcset de_AT DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1223
              Entropy (8bit):4.319193323810203
              Encrypted:false
              SSDEEP:24:4azu8I8VWRFFAVa8VpZzWsuEbkMe5pF9grtT9egQTqr9u5sevOevmDvi:46kR6VaIZzWsuEJnHlrg5soOomzi
              MD5:A741CF1A27C77CFF2913076AC9EE9DDC
              SHA1:DE519D3A86DCF1E8F469490967AFE350BAEAFE01
              SHA-256:7573581DEC27E90B0C7D34057D9F4EF89727317D55F2C4E0428A47740FB1EB7A
              SHA-512:C9272793BAA1D33C32576B48756063F4A9BB97E8FFA276809CF4C3956CC457E48C577BDF359C1ECF5CF665A68135CAED17E972DC053A6AFBAAC3BA0ECBAFEB05
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de_BE DAYS_OF_WEEK_ABBREV [list \. "Son"\. "Mon"\. "Die"\. "Mit"\. "Don"\. "Fre"\. "Sam"]. ::msgcat::mcset de_BE DAYS_OF_WEEK_FULL [list \. "Sonntag"\. "Montag"\. "Dienstag"\. "Mittwoch"\. "Donnerstag"\. "Freitag"\. "Samstag"]. ::msgcat::mcset de_BE MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "M\u00e4r"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de_BE MONTHS_FULL [list \. "Januar"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de_BE AM "vorm". ::msgcat::mcs
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2252
              Entropy (8bit):4.313031807335687
              Encrypted:false
              SSDEEP:24:4azu8+v+39bYW4v+0Wn4Obg+EKkJQg9UWWY+YcYGV97Wu9TJGJABRF6RrJFdsvjt:468XxCSpAWL8jdL
              MD5:E152787B40C5E30699AD5E9B0C60DC07
              SHA1:4FB9DB6E784E1D28E632B55ED31FBBB4997BF575
              SHA-256:9B2F91BE34024FBCF645F6EF92460E5F944CA6A16268B79478AB904B2934D357
              SHA-512:DE59E17CAB924A35C4CC74FE8FCA4776BD49E30C224E476741A273A74BBE40CDAAEDBF6BBB5E30011CD0FEED6B2840F607FD0F1BD3E136E7FE39BAE81C7ED4DB
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset el DAYS_OF_WEEK_ABBREV [list \. "\u039a\u03c5\u03c1"\. "\u0394\u03b5\u03c5"\. "\u03a4\u03c1\u03b9"\. "\u03a4\u03b5\u03c4"\. "\u03a0\u03b5\u03bc"\. "\u03a0\u03b1\u03c1"\. "\u03a3\u03b1\u03b2"]. ::msgcat::mcset el DAYS_OF_WEEK_FULL [list \. "\u039a\u03c5\u03c1\u03b9\u03b1\u03ba\u03ae"\. "\u0394\u03b5\u03c5\u03c4\u03ad\u03c1\u03b1"\. "\u03a4\u03c1\u03af\u03c4\u03b7"\. "\u03a4\u03b5\u03c4\u03ac\u03c1\u03c4\u03b7"\. "\u03a0\u03ad\u03bc\u03c0\u03c4\u03b7"\. "\u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae"\. "\u03a3\u03ac\u03b2\u03b2\u03b1\u03c4\u03bf"]. ::msgcat::mcset el MONTHS_ABBREV [list \. "\u0399\u03b1\u03bd"\. "\u03a6\u03b5\u03b2"\. "\u039c\u03b1\u03c1"\. "\u0391\u03c0\u03c1"\. "\u039c\u03b1\u03ca"\. "\u0399\u03bf\u03c5\u03bd"\. "\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):300
              Entropy (8bit):4.849761581276844
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoCwmGjbJFLoCws6W3vULoCws6W3v6p6HH5oCwmT+3vjb0y6:4EnLzu8brJFqs6W3v3s6W3v6QQJ3vK
              MD5:F8AE50E60590CC1FF7CCC43F55B5B8A8
              SHA1:52892EDDFA74DD4C8040F9CDD19A9536BFF72B6E
              SHA-256:B85C9A373FF0F036151432652DD55C182B0704BD0625EA84BED1727EC0DE3DD8
              SHA-512:8E15C9CA9A7D2862FDBA330F59BB177B06E5E3154CF3EA948B8E4C0282D66E75E18C225F28F6A203B4643E8BCAA0B5BDB59578A4C20D094F8B923650796E2E72
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_AU DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset en_AU TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_AU TIME_FORMAT_12 "%I:%M:%S %P %z". ::msgcat::mcset en_AU DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):305
              Entropy (8bit):4.823881517188826
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoCr3FD/LoCsX3vtfNrFLoCsX3v6YNn5oCs+3v3FnN9:4EnLzu863FD/U3vtNm3v6yt3v3FnN9
              MD5:A0BB5A5CC6C37C12CB24523198B82F1C
              SHA1:B7A6B4BFB6533CC33A0A0F5037E55A55958C4DFC
              SHA-256:596AC02204C845AA74451FC527645549F2A3318CB63051FCACB2BF948FD77351
              SHA-512:9859D8680E326C2EB39390F3B96AC0383372433000A4E828CF803323AB2AB681B2BAE87766CB6FB23F6D46DBA38D3344BC4A941AFB0027C737784063194F9AE4
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_BE DATE_FORMAT "%d %b %Y". ::msgcat::mcset en_BE TIME_FORMAT "%k:%M:%S". ::msgcat::mcset en_BE TIME_FORMAT_12 "%k h %M min %S s %z". ::msgcat::mcset en_BE DATE_TIME_FORMAT "%d %b %Y %k:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.869619023232552
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmosmGvNLoss6W3v6aZosmT+3vR6HK:4EnLzu8WrvNbs6W3v6aBJ3voq
              MD5:ECC735522806B18738512DC678D01A09
              SHA1:EEEC3A5A3780DBA7170149C779180748EB861B86
              SHA-256:340804F73B620686AB698B2202191D69227E736B1652271C99F2CFEF03D72296
              SHA-512:F46915BD68249B5B1988503E50EBC48C13D9C0DDBDCBA9F520386E41A0BAAE640FD97A5085698AB1DF65640CE70AC63ED21FAD49AF54511A5543D1F36247C22D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_BW DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_BW TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_BW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):288
              Entropy (8bit):4.828989678102087
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoAhgqH5oAZF3vGoAZF3v6loAh9+3vnFDLq:4EnLzu8mhgqHFZF3vGZF3v65hI3v9G
              MD5:F9A9EE00A4A2A899EDCCA6D82B3FA02A
              SHA1:BFDBAD5C0A323A37D5F91C37EC899B923DA5B0F5
              SHA-256:C9FE2223C4949AC0A193F321FC0FD7C344A9E49A54B00F8A4C30404798658631
              SHA-512:4E5471ADE75E0B91A02A30D8A042791D63565487CBCA1825EA68DD54A3AE6F1E386D9F3B016D233406D4B0B499B05DF6295BC0FFE85E8AA9DA4B4B7CC0128AD9
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_CA DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_CA TIME_FORMAT "%r". ::msgcat::mcset en_CA TIME_FORMAT_12 "%I:%M:%S %p". ::msgcat::mcset en_CA DATE_TIME_FORMAT "%a %d %b %Y %r %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.84511182583436
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoEbtvqH5oELE3vG5oELE3v6X5oEbto+3vnFDoAov:4EnLzu8ibtvqHBLE3v4LE3v6RbtF3v98
              MD5:07C16C81F1B59444508D0F475C2DB175
              SHA1:DEDBDB2C9ACA932C373C315FB6C5691DBEDEB346
              SHA-256:AE38AD5452314B0946C5CB9D3C89CDFC2AD214E146EB683B8D0CE3FE84070FE1
              SHA-512:F13333C975E6A0AD06E57C5C1908ED23C4A96008A895848D1E2FE7985001B2E5B9B05C4824C74EDA94E0CC70EC7CABCB103B97E54E957F986D8F277EEC3325B7
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_GB DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_GB TIME_FORMAT "%T". ::msgcat::mcset en_GB TIME_FORMAT_12 "%T". ::msgcat::mcset en_GB DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):321
              Entropy (8bit):4.803235346516854
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoa/5oaQ9woaAx/G4FLoaYYW3v6aZoaAx/T+3v4x6HK:4EnLzu8cpZF4F7xW3v6ah/3v4Iq
              MD5:27B4185EB5B4CAAD8F38AE554231B49A
              SHA1:67122CAA8ECA829EC0759A0147C6851A6E91E867
              SHA-256:C9BE2C9AD31D516B508D01E85BCCA375AAF807D6D8CD7C658085D5007069FFFD
              SHA-512:003E5C1E2ECCCC48D14F3159DE71A5B0F1471275D4051C7AC42A3CFB80CAF651A5D04C4D8B868158211E8BC4E08554AF771993B0710E6625AA3AE912A33F5487
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_HK AM "AM". ::msgcat::mcset en_HK PM "PM". ::msgcat::mcset en_HK DATE_FORMAT "%B %e, %Y". ::msgcat::mcset en_HK TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_HK DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.78446779523026
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoK6qH5oKi+3vG5oKi+3v6X5oKv+3vnFDoAov:4EnLzu8vqHr3vQ3v6O3v9dy
              MD5:30E351D26DC3D514BC4BF4E4C1C34D6F
              SHA1:FA87650F840E691643F36D78F7326E925683D0A8
              SHA-256:E7868C80FD59D18BB15345D29F5292856F639559CFFD42EE649C16C7938BF58D
              SHA-512:5AAC8A55239A909207E73EFB4123692D027F7728157D07FAFB629AF5C6DB84B35CF11411E561851F7CDB6F25AEC174E85A1982C4B79C7586644E74512F5FBDDA
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_IE DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_IE TIME_FORMAT "%T". ::msgcat::mcset en_IE TIME_FORMAT_12 "%T". ::msgcat::mcset en_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):310
              Entropy (8bit):4.756550208645364
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoKr3v5oKrGaoKr5vvNLoKrw3vULoKr5o+3voA6:4EnLzu8si2vvNa3vuF3vo3
              MD5:1423A9CF5507A198580D84660D829133
              SHA1:70362593A2B04CF965213F318B10E92E280F338D
              SHA-256:71E5367FE839AFC4338C50D450F111728E097538ECACCC1B17B10238001B0BB1
              SHA-512:C4F1AD41D44A2473531247036BEEF8402F7C77A21A33690480F169F35E78030942FD31C9331A82B8377D094E22D506C785D0311DBB9F1C2B4AD3575B3F0E76E3
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_IN AM "AM". ::msgcat::mcset en_IN PM "PM". ::msgcat::mcset en_IN DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_IN TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_IN DATE_TIME_FORMAT "%d %B %Y %H:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):300
              Entropy (8bit):4.89415873600679
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoyejbJFLo63vULo63v6p6HH5oy7+3vjb0y6:4EnLzu8YeJFL3vI3v6QtS3vK
              MD5:DB734349F7A1A83E1CB18814DB6572E8
              SHA1:3386B2599C7C170A03E4EED68C39EAC7ADD01708
              SHA-256:812DB204E4CB8266207A4E948FBA3DD1EFE4D071BBB793F9743A4320A1CEEBE3
              SHA-512:EF09006552C624A2F1C62155251A18BDA9EE85C9FC81ABBEDE8416179B1F82AD0D88E42AB0A10B4871EF4B7DB670E4A824392339976C3C95FB31F588CDE5840D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_NZ DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset en_NZ TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_NZ TIME_FORMAT_12 "%I:%M:%S %P %z". ::msgcat::mcset en_NZ DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):321
              Entropy (8bit):4.775448167269054
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoJ5oXo2e4FLoe3v6aZo27+3v4x6HK:4EnLzu8l4Fj3v6aE3v4Iq
              MD5:787C83099B6E4E80AC81DD63BA519CBE
              SHA1:1971ACFAA5753D2914577DCC9EBDF43CF89C1D00
              SHA-256:BE107F5FAE1E303EA766075C52EF2146EF149EDA37662776E18E93685B176CDC
              SHA-512:527A36D64B4B5C909F69AA8609CFFEBBA19A378CEA618E1BB07EC2AED89E456E2292080C43917DF51B08534A1D0B35F2069008324C99A7688BBEDE49049CD8A2
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_PH AM "AM". ::msgcat::mcset en_PH PM "PM". ::msgcat::mcset en_PH DATE_FORMAT "%B %e, %Y". ::msgcat::mcset en_PH TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_PH DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.865159200607995
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoQW53FD/LoQGuX3v6ZhLoQWa+3v3F0fJ:4EnLzu8283FD/LJ3v6Xc3v3F4
              MD5:3045036D8F0663E26796E4E8AFF144E2
              SHA1:6C9066396C107049D861CD0A9C98DE8753782571
              SHA-256:B8D354519BD4EB1004EB7B25F4E23FD3EE7F533A5F491A46D19FD520ED34C930
              SHA-512:EBA6CD05BD596D0E8C96BBCA86379F003AD31E564D9CB90C906AF4B3A776AA797FC18EC405781F83493BBB33510DEDC0E78504AD1E6977BE0F83B2959AD25B8A
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_SG DATE_FORMAT "%d %b %Y". ::msgcat::mcset en_SG TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset en_SG DATE_TIME_FORMAT "%d %b %Y %P %I:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):245
              Entropy (8bit):4.89152584889677
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoOr0l5oOK3v6wLoOs+3v0l6C:4EnLzu8WL3v663vlC
              MD5:F285A8BA3216DA69B764991124F2F75A
              SHA1:A5B853A39D944DB9BB1A4C0B9D55AFDEF0515548
              SHA-256:98CE9CA4BB590BA5F922D6A196E5381E19C64E7682CDBEF914F2DCE6745A7332
              SHA-512:05695E29BA10072954BC91885A07D74EFBCB81B0DE3961261381210A51968F99CE1801339A05B810A54295E53B0A7E1D75CA5350485A8DEBFFFCBD4945234382
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_ZA DATE_FORMAT "%Y/%m/%d". ::msgcat::mcset en_ZA TIME_FORMAT_12 "%I:%M:%S". ::msgcat::mcset en_ZA DATE_TIME_FORMAT "%Y/%m/%d %I:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.888960668540414
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoEmGvNLoEs6W3v6aZoEmT+3vR6HK:4EnLzu8urvNDs6W3v6a5J3voq
              MD5:D8878533B11C21445CAEFA324C638C7E
              SHA1:EFF82B28741FA16D2DFC93B5421F856D6F902509
              SHA-256:91088BBBF58A704185DEC13DBD421296BBD271A1AEBBCB3EF85A99CECD848FF8
              SHA-512:CBFD4FC093B3479AE9E90A5CA05EA1894F62DA9E0559ACC2BD37BBED1F0750ECFF13E6DF2078D68268192CA51A832E1BEED379E11380ADF3C91C1A01A352B20C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_ZW DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_ZW TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_ZW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1231
              Entropy (8bit):4.282246801138565
              Encrypted:false
              SSDEEP:24:4azu8CouOZBQpsS9C58mTXv8/s5pkPXvRvm:46nZ6psX8mT/cYpmfFm
              MD5:FE2F92E5C0AB19CDC7119E70187479F6
              SHA1:A14B9AA999C0BBD9B21E6A2B44A934D685897430
              SHA-256:50DF3E0E669502ED08DD778D0AFEDF0F71993BE388B0FCAA1065D1C91BD22D83
              SHA-512:72B4975DC2CAB725BD6557CAED41B9C9146E0DE167EE0A0723C3C90D7CF49FB1D749977042FFECBCD7D8F21509307AAB3CE80E3C51023D22072FB5B415801EA9
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eo DAYS_OF_WEEK_ABBREV [list \. "di"\. "lu"\. "ma"\. "me"\. "\u0135a"\. "ve"\. "sa"]. ::msgcat::mcset eo DAYS_OF_WEEK_FULL [list \. "diman\u0109o"\. "lundo"\. "mardo"\. "merkredo"\. "\u0135a\u016ddo"\. "vendredo"\. "sabato"]. ::msgcat::mcset eo MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "a\u016dg"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset eo MONTHS_FULL [list \. "januaro"\. "februaro"\. "marto"\. "aprilo"\. "majo"\. "junio"\. "julio"\. "a\u016dgusto"\. "septembro"\. "oktobro"\. "novembro"\. "decembro"\. ""]. ::msgcat::mcset eo BCE "aK". ::msgcat::mcset e
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1180
              Entropy (8bit):4.216657382642579
              Encrypted:false
              SSDEEP:24:4azu8OJccwdQSBJr/S3tFA7C28/sF9AaD5rYrvtAvrG:46w3wdJB1/6FA22c49XrY7tWrG
              MD5:022CBA4FF73CF18D63D1B0C11D058B5D
              SHA1:8B2D0BE1BE354D639EC3373FE20A0F255E312EF6
              SHA-256:FFF2F08A5BE202C81E469E16D4DE1F8A0C1CFE556CDA063DA071279F29314837
              SHA-512:5142AD14C614E6BA5067B371102F7E81B14EB7AF3E40D05C674CFF1052DA4D172768636D34FF1DEE2499E43B2FEB4771CB1B67EDA10B887DE50E15DCD58A5283
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es DAYS_OF_WEEK_ABBREV [list \. "dom"\. "lun"\. "mar"\. "mi\u00e9"\. "jue"\. "vie"\. "s\u00e1b"]. ::msgcat::mcset es DAYS_OF_WEEK_FULL [list \. "domingo"\. "lunes"\. "martes"\. "mi\u00e9rcoles"\. "jueves"\. "viernes"\. "s\u00e1bado"]. ::msgcat::mcset es MONTHS_ABBREV [list \. "ene"\. "feb"\. "mar"\. "abr"\. "may"\. "jun"\. "jul"\. "ago"\. "sep"\. "oct"\. "nov"\. "dic"\. ""]. ::msgcat::mcset es MONTHS_FULL [list \. "enero"\. "febrero"\. "marzo"\. "abril"\. "mayo"\. "junio"\. "julio"\. "agosto"\. "septiembre"\. "octubre"\. "noviembre"\. "diciembre"\. ""]. ::msgcat::mcset es BCE "a.C.". ::msgcat::mcset es
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):242
              Entropy (8bit):4.830874390627383
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo8GUFLot/W3vULo8T+3v9y6:4EnLzu8KGUFN3v+K3v3
              MD5:C806EF01079E6B6B7EAE5D717DA2AAB3
              SHA1:3C553536241A5D2E95A3BA9024AAB46BB87FBAD9
              SHA-256:AF530ACD69676678C95B803A29A44642ED2D2F2D077CF0F47B53FF24BAC03B2E
              SHA-512:619905C2FB5F8D2BC2CBB9F8F0EA117C0AEFBDDE5E4F826FF962D7DC069D16D5DE12E27E898471DC6C039866FB64BBF62ED54DBC031E03C7D24FC2EA38DE5699
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_AR DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_AR TIME_FORMAT "%H:%M:%S". ::msgcat::mcset es_AR DATE_TIME_FORMAT "%d/%m/%Y %H:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.878640071219599
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoYePWHFLoU3v6rZoY7+3vPUe6HK:4EnLzu8OegFp3v6rHS3vs3q
              MD5:4C2B2A6FBC6B514EA09AA9EF98834F17
              SHA1:853FFCBB9A2253B7DC2B82C2BFC3B132500F7A9D
              SHA-256:24B58DE38CD4CB2ABD08D1EDA6C9454FFDE7ED1A33367B457D7702434A0A55EE
              SHA-512:3347F9C13896AF19F6BAFBEF225AF2A1F84F20F117E7F0CE3E5CAA783FDD88ABDFAF7C1286AE421BC609A39605E16627013945E4ACA1F7001B066E14CAB90BE7
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_BO DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset es_BO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_BO DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.889615718638578
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmodvPWHFLok3v6rZodo+3vPUe6HK:4EnLzu8DgF93v6rC3vs3q
              MD5:B7E7BE63F24FC1D07F28C5F97637BA1C
              SHA1:8FE1D17696C910CF59467598233D55268BFE0D94
              SHA-256:12AD1546EB391989105D80B41A87686D3B30626D0C42A73705F33B2D711950CC
              SHA-512:FD8B83EF06B1E1111AFF186F5693B17526024CAD8CC99102818BE74FD885344D2F628A0541ABB485F38DB8DE7E29EA4EE4B28D8E5F6ECEF826BABE1013ABDFB8
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CL DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset es_CL TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CL DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.862231219172699
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo4FjbJFLo4F+3v6rZo4++3vjb0f6HK:4EnLzu8QJFL+3v6rv3vbq
              MD5:FD946BE4D44995911E79135E5B7BD3BB
              SHA1:3BA38CB03258CA834E37DBB4E3149D4CDA9B353B
              SHA-256:1B4979874C3F025317DFCF0B06FC8CEE080A28FF3E8EFE1DE9E899F6D4F4D21E
              SHA-512:FBD8087891BA0AE58D71A6D07482EED5E0EA5C658F0C82A9EC67DFC0D826059F1FC6FF404D6A6DC9619BD9249D4E4EC30D828B177E0939302196C51FA9B2FC4B
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CO DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_CO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CO DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.873281593259653
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo76GUFLoTW3v6rZo76T+3v9f6HK:4EnLzu8d6GUF73v6rq6K3vMq
              MD5:F08EF3582AF2F88B71C599FBEA38BFD9
              SHA1:456C90C09C2A8919DC948E86170F523062F135DB
              SHA-256:7AC5FC35BC422A5445603E0430236E62CCA3558787811DE22305F72D439EB4BB
              SHA-512:7187FC4CE0533F14BBA073039A0B86D610618573BA9A936CBE7682ED2939384C6BB9E0A407C016A42702E83627CCE394618ACB58419EA36908AA37F59165E371
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CR DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_CR TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CR DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.8668686830029335
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmomerQZnFLou3v6rZom7+3vrQZg6HK:4EnLzu8xkZFH3v6rM3vkrq
              MD5:44F2EE567A3E9A021A3C16062CEAE220
              SHA1:180E938584F0A57AC0C3F85E6574BC48291D820E
              SHA-256:847C14C297DBE4D8517DEBAA8ED555F3DAEDF843D6BAD1F411598631A0BD3507
              SHA-512:BEB005D006E432963F9C1EF474A1E3669C8B7AF0681681E74DDA8FE9C8EE04D307EF85CF0257DA72663026138D38807A6ABA1255337CF8CC724ED1993039B40C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_DO DATE_FORMAT "%m/%d/%Y". ::msgcat::mcset es_DO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_DO DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.86970949384834
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmozgUFLoro+3v6rZoz9+3v9f6HK:4EnLzu8ZgUFcF3v6ruI3vMq
              MD5:CCB036C33BA7C8E488D37E754075C6CF
              SHA1:336548C8D361B1CAA8BDF698E148A88E47FB27A6
              SHA-256:2086EE8D7398D5E60E5C3048843B388437BD6F2507D2293CA218936E3BF61E59
              SHA-512:05058262E222653CF3A4C105319B74E07322AEE726CC11AEB2B562F01FF2476E3169EA829BF8B66E1B76617CB58E45423480E5A6CB3B3D4B33AA4DDDFA52D111
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_EC DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_EC TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_EC DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.86395314548955
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmohvjbJFLoI3v6rZoho+3vjb0f6HK:4EnLzu8PJFB3v6r23vbq
              MD5:1E6062716A094CC3CE1F2C97853CD3CD
              SHA1:499F69E661B3B5747227B31DE4539CAF355CCAAC
              SHA-256:1BC22AF98267D635E3F07615A264A716940A2B1FAA5CAA3AFF54D4C5A4A34370
              SHA-512:7C3FB65EC76A2F35354E93A47C3A59848170AAF504998CEF66AEBAAD39D303EC67BE212C6FACC98305E35FFEBF23CCB7E34396F11987E81D76B3685E6B5E89B3
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_GT DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_GT TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_GT DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.902544453689719
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoIvriP/FLoP3v6rZoIo+3vrig6HK:4EnLzu8w+nF+3v6rP3v+lq
              MD5:AAE4A89F6AB01044D6BA3511CBE6FE66
              SHA1:639A94279453B0028995448FD2E221C1BDE23CEE
              SHA-256:A2D25880C64309552AACED082DEED1EE006482A14CAB97DB524E9983EE84ACFC
              SHA-512:E2BE94973C931B04C730129E9B9746BB76E7AC7F5AAA8D7899903B8C86B4E3D4A955E9580CF2C64DE48AFD6A2A9386337C2F8A8128A511AFBFBBA09CC032A76E
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_HN DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_HN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_HN DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.863953145489551
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoPjbJFLoH+3v6rZoI+3vjb0f6HK:4EnLzu8NJF73v6rE3vbq
              MD5:F60290CF48AA4EDCA938E496F43135FD
              SHA1:0EE5A36277EA4E7A1F4C6D1D9EE32D90918DA25C
              SHA-256:D0FAA9D7997D5696BFF92384144E0B9DFB2E4C38375817613F81A89C06EC6383
              SHA-512:380DFCD951D15E53FCB1DEF4B892C8FD65CEFBF0857D5A7347FF3ED34F69ADD53AEEF895EDCFC6D2F24A65AB8F67CF813AEA2045EDBF3BF182BD0635B5ACB1A4
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_MX DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_MX TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_MX DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.872124246425178
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoe/GriP/FLo3W3v6rZoe/T+3vrig6HK:4EnLzu8Ae+nFmW3v6rxS3v+lq
              MD5:2C4C45C450FEA6BA0421281F1CF55A2A
              SHA1:5249E31611A670EAEEF105AB4AD2E5F14B355CAE
              SHA-256:4B28B46981BBB78CBD2B22060E2DD018C66FCFF1CEE52755425AD4900A90D6C3
              SHA-512:969A4566C7B5FAF36204865D5BC22C849FBB44F0D16B04B9A9473B05DBABF22AEB9B77F282A44BB85D7E2A56C4E5BCE59E4E4CDEB3F6DD52AF47C65C709A3690
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_NI DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_NI TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_NI DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.860352858208512
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoX5rQZnFLoHE3v6rZoXa+3vrQZg6HK:4EnLzu8vkZF93v6rm3vkrq
              MD5:148626186A258E58851CC0A714B4CFD6
              SHA1:7F14D46F66D8A94A493702DCDE7A50C1D71774B2
              SHA-256:6832DC5AB9F610883784CF702691FCF16850651BC1C6A77A0EFA81F43BC509AC
              SHA-512:2B452D878728BFAFEA9A60030A26E1E1E44CE0BB26C7D9B8DB1D7C4F1AD3217770374BD4EDE784D0A341AB5427B08980FF4A62141FAF7024AB17296FE98427AC
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PA DATE_FORMAT "%m/%d/%Y". ::msgcat::mcset es_PA TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PA DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.8632965835916195
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoIgUFLoQ9X3v6rZoI9+3v9f6HK:4EnLzu8jUFZ3v6rS3vMq
              MD5:74F014096C233B4D1D38A9DFB15B01BB
              SHA1:75C28321AFED3D9CDA3EBF3FD059CDEA597BB13A
              SHA-256:CC826C93682EF19D29AB6304657E07802C70CF18B1E5EA99C3480DF6D2383983
              SHA-512:24E7C3914BF095B55DE7F01CB537E20112E10CF741333FD0185FEF0B0E3A1CD9651C2B2EDC470BCF18F51ADB352CA7550CFBF4F79342DCA33F7E0841AEDEBA8D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PE DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_PE TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.859298425911738
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo06GriP/FLoeW3v6rZo06T+3vrig6HK:4EnLzu8ZG+nFy3v6rAK3v+lq
              MD5:AEB569C12A50B8C4A57C8034F666C1B3
              SHA1:24D8B096DD8F1CFA101D6F36606D003D4FCC7B4D
              SHA-256:19563225CE7875696C6AA2C156E6438292DE436B58F8D7C23253E3132069F9A2
              SHA-512:B5432D7A80028C3AD3A7819A5766B07EDB56CEE493C0903EDFA72ACEE0C2FFAA955A8850AA48393782471905FFF72469F508B19BE83CC626478072FFF6B60B5D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PR DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_PR TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PR DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.871431420165191
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo/5UFLovE3v6rZo/a+3v9f6HK:4EnLzu8XUF13v6re3vMq
              MD5:D24FF8FAEE658DD516AC298B887D508A
              SHA1:61990E6F3E399B87060E522ABCDE77A832019167
              SHA-256:94FF64201C27AB04F362617DD56B7D85B223BCCA0735124196E7669270C591F0
              SHA-512:1409E1338988BC70C19DA2F6C12A39E311CF91F6BB759575C95E125EA67949F17BBE450B2CD29E3F6FDA1421C742859CB990921949C6940B34D7A8B8545FF8F0
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PY DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_PY TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.883202808381857
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmofriP/FLo3+3v6rZoY+3vrig6HK:4EnLzu89+nFO+3v6rw3v+lq
              MD5:6A013D20A3C983639EAF89B93AB2037C
              SHA1:9ABEC22E82C1638B9C8E197760C66E370299BB93
              SHA-256:E3268C95E9B7D471F5FD2436C17318D5A796220BA39CEBEBCD39FBB0141A49CE
              SHA-512:C4FE0493A2C45DA792D0EE300EC1D30E25179209FE39ACCD74B23ACDFF0A72DEEEED1A1D12842101E0A4E57E8FEADF54F926347B6E9B987B70A52E0557919FC2
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_SV DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_SV TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_SV DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.877844330421912
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmooygUFLooq9X3v6rZooy9+3v9f6HK:4EnLzu8SrUFzsX3v6rZJ3vMq
              MD5:40250432AD0DC4FF168619719F91DBCA
              SHA1:D38532CA84E80FE70C69108711E3F9A7DFD5230F
              SHA-256:BA557A3C656275A0C870FB8466F2237850F5A7CF2D001919896725BB3D3EAA4B
              SHA-512:26FB4B3332E2C06628869D4C63B7BAB4F42FF73D1D4FD8603323A93067F60D9505C70D1A14D7E34A9880E2993183FC09D43013F3BEB8BC48732F08181643D05D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_UY DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_UY TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_UY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.882638228899482
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoXrUFLoXK3v6rZoXs+3v9f6HK:4EnLzu8VUFH3v6r83vMq
              MD5:F3A789CBC6B9DD4F5BA5182C421A9F78
              SHA1:7C2AF280C90B0104AB49B2A527602374254274CE
              SHA-256:64F796C5E3E300448A1F309A0DA7D43548CC40511036FF3A3E0C917E32147D62
              SHA-512:822C0D27D2A72C9D5336C1BCEDC13B564F0FB12146CF8D30FBE77B9C4728C4B3BF456AC62DACD2962A6B5B84761354B31CD505105EDB060BF202BA0B0A830772
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_VE DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_VE TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_VE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1206
              Entropy (8bit):4.321464868793769
              Encrypted:false
              SSDEEP:24:4azu8W1Yn1YZ1waUuvVTGiMiLpBgoVTJ01iLTh/w2SJmG5F1svtFmsv5d:46K1y1Mv9GrM9oc/FSJmG5F1KtFmK5d
              MD5:3B4BEE5DD7441A63A31F89D6DFA059BA
              SHA1:BEE39E45FA3A76B631B4C2D0F937FF6041E09332
              SHA-256:CCC2B4738DB16FAFB48BFC77C9E2F8BE17BC19E4140E48B61F3EF1CE7C9F3A8C
              SHA-512:AEC24C75CB00A506A46CC631A2A804C59FBE4F8EBCB86CBA0F4EE5DF7B7C12ED7D25845150599837B364E40BBFDB68244991ED5AF59C9F7792F8362A1E728883
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset et DAYS_OF_WEEK_ABBREV [list \. "P"\. "E"\. "T"\. "K"\. "N"\. "R"\. "L"]. ::msgcat::mcset et DAYS_OF_WEEK_FULL [list \. "p\u00fchap\u00e4ev"\. "esmasp\u00e4ev"\. "teisip\u00e4ev"\. "kolmap\u00e4ev"\. "neljap\u00e4ev"\. "reede"\. "laup\u00e4ev"]. ::msgcat::mcset et MONTHS_ABBREV [list \. "Jaan"\. "Veebr"\. "M\u00e4rts"\. "Apr"\. "Mai"\. "Juuni"\. "Juuli"\. "Aug"\. "Sept"\. "Okt"\. "Nov"\. "Dets"\. ""]. ::msgcat::mcset et MONTHS_FULL [list \. "Jaanuar"\. "Veebruar"\. "M\u00e4rts"\. "Aprill"\. "Mai"\. "Juuni"\. "Juuli"\. "August"\. "September"\. "Oktoober"\. "November"\. "Detsember"\. ""]. ::msgcat::mcset et
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):985
              Entropy (8bit):3.9137059580146376
              Encrypted:false
              SSDEEP:24:4azu80P6/XTPi6/XTotXSSzTGsy+trjz4HsKI:46qWKWoX75Bb4Mv
              MD5:E27FEB15A6C300753506FC706955AC90
              SHA1:FDFAC22CC0839B29799001838765EB4A232FD279
              SHA-256:7DCC4966A5C13A52B6D1DB62BE200B9B5A1DECBACCFCAF15045DD03A2C3E3FAA
              SHA-512:C54A0F72BC0DAF6A411466565467A2783690EA19F4D401A5448908944A0A6F3F74A7976FA0F851F15B6A97C6D6A3C41FB8BBC8EA42B5D5E3C17A5C8A37436FC5
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eu DAYS_OF_WEEK_ABBREV [list \. "igandea"\. "astelehena"\. "asteartea"\. "asteazkena"\. "osteguna"\. "ostirala"\. "larunbata"]. ::msgcat::mcset eu DAYS_OF_WEEK_FULL [list \. "igandea"\. "astelehena"\. "asteartea"\. "asteazkena"\. "osteguna"\. "ostirala"\. "larunbata"]. ::msgcat::mcset eu MONTHS_ABBREV [list \. "urt"\. "ots"\. "mar"\. "api"\. "mai"\. "eka"\. "uzt"\. "abu"\. "ira"\. "urr"\. "aza"\. "abe"\. ""]. ::msgcat::mcset eu MONTHS_FULL [list \. "urtarrila"\. "otsaila"\. "martxoa"\. "apirila"\. "maiatza"\. "ekaina"\. "uztaila"\. "abuztua"\. "iraila"\. "urria"\. "azaroa"\. "abendua"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):287
              Entropy (8bit):4.8689948586471825
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoszFnJF+l6VALoszw3vG5oszw3v6X5osz++3v/R3v:4EnLzu8gL+l6Vt3vf3v6P3vZf
              MD5:D20788793E6CC1CD07B3AFD2AA135CB6
              SHA1:3503FCB9490261BA947E89D5494998CEBB157223
              SHA-256:935164A2D2D14815906B438562889B31139519B3A8E8DB3D2AC152A77EC591DC
              SHA-512:F65E7D27BD0A99918D6F21C425238000563C2E3A4162D6806EEAC7C9DCB9798987AFFB8BE01899D577078F6297AF468DBAEBEB6375C09ABF332EB44E328F0E8B
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eu_ES DATE_FORMAT "%a, %Yeko %bren %da". ::msgcat::mcset eu_ES TIME_FORMAT "%T". ::msgcat::mcset eu_ES TIME_FORMAT_12 "%T". ::msgcat::mcset eu_ES DATE_TIME_FORMAT "%y-%m-%d %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1664
              Entropy (8bit):4.1508548760580295
              Encrypted:false
              SSDEEP:24:4azu8BMnqZEjgYDT0/y3xg2LSREyqyxDfsycNp/Tpn29Ey5ykDDzi:46cGTYDT0/ya4KIySNnCz2
              MD5:7E74DE42FBDA63663B58B2E58CF30549
              SHA1:CB210740F56208E8E621A45D545D7DEFCAE8BCAF
              SHA-256:F9CA4819E8C8B044D7D68C97FC67E0F4CCD6245E30024161DAB24D0F7C3A9683
              SHA-512:A03688894BD44B6AB87DC6CAB0A5EC348C9117697A2F9D00E27E850F23EFDC2ADBD53CAC6B9ED33756D3A87C9211B6EE8DF06020F6DA477B9948F52E96071F76
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa DAYS_OF_WEEK_ABBREV [list \. "\u06cc\u2214"\. "\u062f\u2214"\. "\u0633\u2214"\. "\u0686\u2214"\. "\u067e\u2214"\. "\u062c\u2214"\. "\u0634\u2214"]. ::msgcat::mcset fa DAYS_OF_WEEK_FULL [list \. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\. "\u062f\u0648\u0634\u0646\u0628\u0647"\. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\. "\u062c\u0645\u0639\u0647"\. "\u0634\u0646\u0628\u0647"]. ::msgcat::mcset fa MONTHS_ABBREV [list \. "\u0698\u0627\u0646"\. "\u0641\u0648\u0631"\. "\u0645\u0627\u0631"\. "\u0622\u0648\u0631"\. "\u0645\u0640\u0647"\. "\u0698\u0648\u0646"\. "\u0698\u0648\u06cc"\. "\u0627\u0648\u062a"\. "\u0633\u067e\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1957
              Entropy (8bit):4.433104256056609
              Encrypted:false
              SSDEEP:24:4azu8XMnSZEjgYDT0g3xg2LSREyqyxDf5cNp/Tpn29Ey5ykDDzJ6v3Nev0Nv0f:46OeTYDT0ga4K9SNnCz0v9o0JI
              MD5:E6DBD1544A69BFC653865B723395E79C
              SHA1:5E4178E7282807476BD0D6E1F2E320E42FA0DE77
              SHA-256:6360CE0F31EE593E311B275F3C1F1ED427E237F31010A4280EF2C58AA6F2633A
              SHA-512:8D77DCB4333F043502CED7277AEEB0453A2C019E1A46826A0FE90F0C480A530F5646A4F76ECC1C15825601FC8B646ED7C78E53996E2908B341BA4ED1392B95F0
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa_IN DAYS_OF_WEEK_ABBREV [list \. "\u06cc\u2214"\. "\u062f\u2214"\. "\u0633\u2214"\. "\u0686\u2214"\. "\u067e\u2214"\. "\u062c\u2214"\. "\u0634\u2214"]. ::msgcat::mcset fa_IN DAYS_OF_WEEK_FULL [list \. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\. "\u062f\u0648\u0634\u0646\u0628\u0647"\. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\. "\u062c\u0645\u0639\u0647"\. "\u0634\u0646\u0628\u0647"]. ::msgcat::mcset fa_IN MONTHS_ABBREV [list \. "\u0698\u0627\u0646"\. "\u0641\u0648\u0631"\. "\u0645\u0627\u0631"\. "\u0622\u0648\u0631"\. "\u0645\u0640\u0647"\. "\u0698\u0648\u0646"\. "\u0698\u0648\u06cc"\. "\u0627\u0648\u062a"\. "\u063
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):417
              Entropy (8bit):5.087144086729547
              Encrypted:false
              SSDEEP:12:4EnLzu82vGz7AhF/Q3vf3v6TANv+K3vz7AA7:4azu8vPm/ivfvF9xvP9
              MD5:044BAAA627AD3C3585D229865A678357
              SHA1:9D64038C00253A7EEDA4921B9C5E34690E185061
              SHA-256:CF492CBD73A6C230725225D70566B6E46D5730BD3F63879781DE4433965620BE
              SHA-512:DA138F242B44111FAFE9EFE986EB987C26A64D9316EA5644AC4D3D4FEC6DF9F5D55F342FC194BC487A1B7C740F931D883A574863B48396D837D1E270B733F735
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa_IR AM "\u0635\u0628\u062d". ::msgcat::mcset fa_IR PM "\u0639\u0635\u0631". ::msgcat::mcset fa_IR DATE_FORMAT "%d\u2044%m\u2044%Y". ::msgcat::mcset fa_IR TIME_FORMAT "%S:%M:%H". ::msgcat::mcset fa_IR TIME_FORMAT_12 "%S:%M:%l %P". ::msgcat::mcset fa_IR DATE_TIME_FORMAT "%d\u2044%m\u2044%Y %S:%M:%H %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1145
              Entropy (8bit):4.249302428029841
              Encrypted:false
              SSDEEP:24:4azu8ZeTWSS/DatuUSlWCBTtotL8W183eYKvt3v3eG:46sWp/DatBSPtoNmpMt/J
              MD5:34FE8E2D987FE534BD88291046F6820B
              SHA1:B173700C176336BD1B123C2A055A685F73B60C07
              SHA-256:BE0D2DCE08E6CD786BC3B07A1FB1ADC5B2CF12053C99EACDDAACDDB8802DFB9C
              SHA-512:4AC513F092D2405FEF6E30C828AE94EDBB4B0B0E1C68C1168EB2498C186DB054EBF697D6B55B49F865A2284F75B7D5490AFE7A80F887AE8312E6F9A5EFE16390
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fi DAYS_OF_WEEK_ABBREV [list \. "su"\. "ma"\. "ti"\. "ke"\. "to"\. "pe"\. "la"]. ::msgcat::mcset fi DAYS_OF_WEEK_FULL [list \. "sunnuntai"\. "maanantai"\. "tiistai"\. "keskiviikko"\. "torstai"\. "perjantai"\. "lauantai"]. ::msgcat::mcset fi MONTHS_ABBREV [list \. "tammi"\. "helmi"\. "maalis"\. "huhti"\. "touko"\. "kes\u00e4"\. "hein\u00e4"\. "elo"\. "syys"\. "loka"\. "marras"\. "joulu"\. ""]. ::msgcat::mcset fi MONTHS_FULL [list \. "tammikuu"\. "helmikuu"\. "maaliskuu"\. "huhtikuu"\. "toukokuu"\. "kes\u00e4kuu"\. "hein\u00e4kuu"\. "elokuu"\. "syyskuu"\. "lokakuu"\. "marraskuu"\. "joulukuu"\. ""]. ::msgcat
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):986
              Entropy (8bit):4.07740021579371
              Encrypted:false
              SSDEEP:12:4EnLzu87mY5mvAqO6RxmtV5qHbMj6aywE1ZD4ScMfRDc6VZTEpSecbLwJQT1Y4:4azu874/RqEXsSpffTBtbQQT1t
              MD5:996B699F6821A055B826415446A11C8E
              SHA1:C382039ED7D2AE8D96CF2EA55FA328AE9CFD2F7D
              SHA-256:F249DD1698ED1687E13654C04D08B829193027A2FECC24222EC854B59350466A
              SHA-512:AB6F5ABC9823C7F7A67BA1E821680ACD37761F83CD1F46EC731AB2B72AA34C2E523ACE288E9DE70DB3D58E11F5CB42ECB5A5E4E39BFD7DFD284F1FF6B637E11D
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fo DAYS_OF_WEEK_ABBREV [list \. "sun"\. "m\u00e1n"\. "t\u00fds"\. "mik"\. "h\u00f3s"\. "fr\u00ed"\. "ley"]. ::msgcat::mcset fo DAYS_OF_WEEK_FULL [list \. "sunnudagur"\. "m\u00e1nadagur"\. "t\u00fdsdagur"\. "mikudagur"\. "h\u00f3sdagur"\. "fr\u00edggjadagur"\. "leygardagur"]. ::msgcat::mcset fo MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset fo MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "apr\u00edl"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.816022066048386
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoZA4HFLoZd3vG5oZd3v6X5oZd+3vnFDoAov:4EnLzu8kyFO3vf3v6f3v9dy
              MD5:A76D09A4FA15A2C985CA6BDD22989D6A
              SHA1:E6105EBCDC547FE2E2FE9EDDC9C573BBDAD85AD0
              SHA-256:7145B57AC5C074BCA968580B337C04A71BBD6EFB93AFAF291C1361FD700DC791
              SHA-512:D16542A1CCDC3F5C2A20300B7E38F43F94F7753E0E99F08EB7240D4F286B263815AD481B29F4E96F268E24BA17C5E135E356448685E1BF65B2B63CE6146AA54C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fo_FO DATE_FORMAT "%d/%m-%Y". ::msgcat::mcset fo_FO TIME_FORMAT "%T". ::msgcat::mcset fo_FO TIME_FORMAT_12 "%T". ::msgcat::mcset fo_FO DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1205
              Entropy (8bit):4.313638548211754
              Encrypted:false
              SSDEEP:24:4azu8qW09HSZ2p60wTyVz5bGzJzzTK+VUuG4CNnvxvB:46JYY5moleiUb42vlB
              MD5:B475F8E7D7065A67E73B1E5CDBF9EB1F
              SHA1:1B689EDC29F8BC4517936E5D77A084083F12AE31
              SHA-256:7A87E418B6D8D14D8C11D63708B38D607D28F7DDBF39606C7D8FBA22BE7892CA
              SHA-512:EA77EFF9B23A02F59526499615C08F1314A91AB41561856ED7DF45930FDD8EC11A105218890FD012045C4CC40621C226F94BDC3BEB62B83EA8FAA7AEC20516E7
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr DAYS_OF_WEEK_ABBREV [list \. "dim."\. "lun."\. "mar."\. "mer."\. "jeu."\. "ven."\. "sam."]. ::msgcat::mcset fr DAYS_OF_WEEK_FULL [list \. "dimanche"\. "lundi"\. "mardi"\. "mercredi"\. "jeudi"\. "vendredi"\. "samedi"]. ::msgcat::mcset fr MONTHS_ABBREV [list \. "janv."\. "f\u00e9vr."\. "mars"\. "avr."\. "mai"\. "juin"\. "juil."\. "ao\u00fbt"\. "sept."\. "oct."\. "nov."\. "d\u00e9c."\. ""]. ::msgcat::mcset fr MONTHS_FULL [list \. "janvier"\. "f\u00e9vrier"\. "mars"\. "avril"\. "mai"\. "juin"\. "juillet"\. "ao\u00fbt"\. "septembre"\. "octobre"\. "novembre"\. "d\u00e9cembre"\. ""]. ::msgcat::mcset fr BCE "a
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.863262857917797
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoXqH5oIX3vG5oIX3v6X5og+3vnFDoAov:4EnLzu81qHd3v63v6Y3v9dy
              MD5:483652B6A3D8010C3CDB6CAD0AD95E72
              SHA1:8FCDB01D0729E9F1A0CAC56F79EDB79A37734AF5
              SHA-256:980E703DFB1EEDE7DE48C958F6B501ED4251F69CB0FBCE0FCA85555F5ACF134A
              SHA-512:0282B8F3884BB4406F69AF2D2F44E431FB8077FEA86D09ED5607BC0932A049853D0C5CAF0B57EF0289F42A8265F76CC4B10111A28B1E0E9BD54E9319B25D8DB6
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_BE DATE_FORMAT "%d/%m/%y". ::msgcat::mcset fr_BE TIME_FORMAT "%T". ::msgcat::mcset fr_BE TIME_FORMAT_12 "%T". ::msgcat::mcset fr_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.843031408533295
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmooI9jo13vG5o13v6X5o1+3vnFDoAov:4EnLzu8eI9Q3vB3v613v9dy
              MD5:017D816D73DAB852546169F3EC2D16F2
              SHA1:3145BB54D9E1E4D9166186D5B43F411CE0250594
              SHA-256:F16E212D5D1F6E83A9FC4E56874E4C7B8F1947EE882610A73199480319EFA529
              SHA-512:4D4EF395B15F750F16EC64162BE8AB4B082C6CD1877CA63D5EA4A5E940A7F98E46D792115FD105B293DC43714E8662BC4411E14E93F09769A064622E52EDE258
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_CA DATE_FORMAT "%Y-%m-%d". ::msgcat::mcset fr_CA TIME_FORMAT "%T". ::msgcat::mcset fr_CA TIME_FORMAT_12 "%T". ::msgcat::mcset fr_CA DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):281
              Entropy (8bit):4.866549204705568
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoFt2poF+3vG5oF+3v6X5o++3vnFDoAov:4EnLzu8btn+3vB+3v6+3v9dy
              MD5:8B27EFF0D45F536852E7A819500B7F93
              SHA1:CAED7D4334BAD8BE586A1AEEE270FB6913A03512
              SHA-256:AB160BFDEB5C3ADF071E01C78312A81EE4223BBF5470AB880972BBF5965291F3
              SHA-512:52DD94F524C1D9AB13F5933265691E8C44B2946F507DE30D789FDCFEA7839A4076CB55A01CEB49194134D7BC84E4F490341AAB9DFB75BB960B03829D6550872B
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_CH DATE_FORMAT "%d. %m. %y". ::msgcat::mcset fr_CH TIME_FORMAT "%T". ::msgcat::mcset fr_CH TIME_FORMAT_12 "%T". ::msgcat::mcset fr_CH DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1141
              Entropy (8bit):4.24180563443443
              Encrypted:false
              SSDEEP:24:4azu8qppr5xqPs5Jpwe3zESbs5JpbxK+dfJ:46ct5XGe3zwXu4fJ
              MD5:88D5CB026EBC3605E8693D9A82C2D050
              SHA1:C2A613DC7C367A841D99DE15876F5E7A8027BBF8
              SHA-256:057C75C1AD70653733DCE43EA5BF151500F39314E8B0236EE80F8D5DB623627F
              SHA-512:253575BFB722CF06937BBE4E9867704B95EFE7B112B370E1430A2027A1818BD2560562A43AD2D067386787899093B25AE84ABFE813672A15A649FEF487E31F7A
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ga DAYS_OF_WEEK_ABBREV [list \. "Domh"\. "Luan"\. "M\u00e1irt"\. "C\u00e9ad"\. "D\u00e9ar"\. "Aoine"\. "Sath"]. ::msgcat::mcset ga DAYS_OF_WEEK_FULL [list \. "D\u00e9 Domhnaigh"\. "D\u00e9 Luain"\. "D\u00e9 M\u00e1irt"\. "D\u00e9 C\u00e9adaoin"\. "D\u00e9ardaoin"\. "D\u00e9 hAoine"\. "D\u00e9 Sathairn"]. ::msgcat::mcset ga MONTHS_ABBREV [list \. "Ean"\. "Feabh"\. "M\u00e1rta"\. "Aib"\. "Beal"\. "Meith"\. "I\u00fail"\. "L\u00fan"\. "MF\u00f3mh"\. "DF\u00f3mh"\. "Samh"\. "Noll"\. ""]. ::msgcat::mcset ga MONTHS_FULL [list \. "Ean\u00e1ir"\. "Feabhra"\. "M\u00e1rta"\. "Aibre\u00e1n"\. "M\u00ed na Bealtaine"\. "Meith"\. "I\u00fail"\. "L\u00fanasa"
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.7755422576113595
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmobHAyg0obHAqo+3vG5obHAqo+3v6X5obHAy9+3vnFDoAov:4EnLzu8s33vj3v6r3v9dy
              MD5:04452D43DA05A94414973F45CDD12869
              SHA1:AEEDCC2177B592A0025A1DBCFFC0EF3634DBF562
              SHA-256:2072E48C98B480DB5677188836485B4605D5A9D99870AC73B5BFE9DCC6DB46F4
              SHA-512:5A01156FD5AB662EE9D626518B4398A161BAF934E3A618B3A18839A944AEEAEE6FE1A5279D7750511B126DB3AD2CC992CDA067573205ACBC211C34C8A099305F
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ga_IE DATE_FORMAT "%d.%m.%y". ::msgcat::mcset ga_IE TIME_FORMAT "%T". ::msgcat::mcset ga_IE TIME_FORMAT_12 "%T". ::msgcat::mcset ga_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):950
              Entropy (8bit):4.037076523160125
              Encrypted:false
              SSDEEP:24:4azu8LpP8ihyz/ptFOBViNef9kekIsnyFo0:46J0i0zRtUB0c9dkVneo0
              MD5:B940E67011DDBAD6192E9182C5F0CCC0
              SHA1:83A284899785956ECB015BBB871E7E04A7C36585
              SHA-256:C71A07169CDBE9962616D28F38C32D641DA277E53E67F8E3A69EB320C1E2B88C
              SHA-512:28570CB14452CA5285D97550EA77C9D8F71C57DE6C1D144ADB00B93712F588AF900DA32C10C3A81C7A2DEE11A3DC843780D24218F53920AB72E90321677CC9E8
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gl DAYS_OF_WEEK_ABBREV [list \. "Dom"\. "Lun"\. "Mar"\. "M\u00e9r"\. "Xov"\. "Ven"\. "S\u00e1b"]. ::msgcat::mcset gl DAYS_OF_WEEK_FULL [list \. "Domingo"\. "Luns"\. "Martes"\. "M\u00e9rcores"\. "Xoves"\. "Venres"\. "S\u00e1bado"]. ::msgcat::mcset gl MONTHS_ABBREV [list \. "Xan"\. "Feb"\. "Mar"\. "Abr"\. "Mai"\. "Xu\u00f1"\. "Xul"\. "Ago"\. "Set"\. "Out"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset gl MONTHS_FULL [list \. "Xaneiro"\. "Febreiro"\. "Marzo"\. "Abril"\. "Maio"\. "Xu\u00f1o"\. "Xullo"\. "Agosto"\. "Setembro"\. "Outubro"\. "Novembro"\. "Decembro"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.839318757139709
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoPhkgvNLoPxsF3v6aZoPhk9+3vR6HK:4EnLzu8NrvNEK3v6a2J3voq
              MD5:3FCDF0FC39C8E34F6270A646A996F663
              SHA1:6999E82148E1D1799C389BCC6C6952D5514F4A4B
              SHA-256:BC2B0424CF27BEF67F309E2B6DFFEF4D39C46F15D91C15E83E070C7FD4E20C9C
              SHA-512:CDB9ED694A7E555EB321F559E9B0CC0998FD526ADEF33AD08C56943033351D70900CD6EC62D380E23AB9F65CCFB85F4EEEB4E17FA8CC05E56C2AC57FBEDE721E
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gl_ES DATE_FORMAT "%d %B %Y". ::msgcat::mcset gl_ES TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset gl_ES DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1037
              Entropy (8bit):4.13549698574103
              Encrypted:false
              SSDEEP:24:4azu81WjLHkFQSMnKIeCPHy3CAVfbku5SJ:460jwyLTySI4J
              MD5:3350E1228CF7157ECE68762F967F2F32
              SHA1:2D0411DA2F6E0441B1A8683687178E9EB552B835
              SHA-256:75AA686FF901C9E66E51D36E8E78E5154B57EE9045784568F6A8798EA9689207
              SHA-512:1D0B44F00A5E6D7B8CECB67EAF060C6053045610CF7246208C8E63E7271C7780587A184D38ECFDFDCFB976F9433FEFDA0BAF8981FCD197554D0874ED1E6B6428
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gv DAYS_OF_WEEK_ABBREV [list \. "Jed"\. "Jel"\. "Jem"\. "Jerc"\. "Jerd"\. "Jeh"\. "Jes"]. ::msgcat::mcset gv DAYS_OF_WEEK_FULL [list \. "Jedoonee"\. "Jelhein"\. "Jemayrt"\. "Jercean"\. "Jerdein"\. "Jeheiney"\. "Jesarn"]. ::msgcat::mcset gv MONTHS_ABBREV [list \. "J-guer"\. "T-arree"\. "Mayrnt"\. "Avrril"\. "Boaldyn"\. "M-souree"\. "J-souree"\. "Luanistyn"\. "M-fouyir"\. "J-fouyir"\. "M.Houney"\. "M.Nollick"\. ""]. ::msgcat::mcset gv MONTHS_FULL [list \. "Jerrey-geuree"\. "Toshiaght-arree"\. "Mayrnt"\. "Averil"\. "Boaldyn"\. "Mean-souree"\. "Jerrey-souree"\. "Luanistyn"\. "Mean-fouyir"\. "Jerrey-fouyir"\. "Mee Houney"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.890913756172577
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoQbtvvNLoQLE3v6aZoQbto+3vR6HK:4EnLzu8CbtvvNBLE3v6avbtF3voq
              MD5:A65040748621B18B1F88072883891280
              SHA1:4D0ED6668A99BAC9B273B0FA8BC74EB6BB9DDFC8
              SHA-256:823AF00F4E44613E929D32770EDB214132B6E210E872751624824DA5F0B78448
              SHA-512:16FFD4107C3B85619629B2CD8A48AB9BC3763FA6E4FE4AE910EDF3B42209CEEB8358D4E7E531C2417875D05E5F801BB19B10130FA8BF70E44CFD8F1BA06F6B6E
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gv_GB DATE_FORMAT "%d %B %Y". ::msgcat::mcset gv_GB TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset gv_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1938
              Entropy (8bit):4.234997703698801
              Encrypted:false
              SSDEEP:24:4azu8Hdd4CLxLtmCLoCLHCL3CLXLICLP1ptzLzCJCLt5LL53h5Lq+p5LcL3pLzCt:4655ftB9hMcGlhO8/n/0ecOfC3
              MD5:FFD5D8007D78770EA0E7E5643F1BD20A
              SHA1:40854EB81EE670086D0D0C0C2F0F9D8406DF6B47
              SHA-256:D27ADAF74EBB18D6964882CF931260331B93AE4B283427F9A0DB147A83DE1D55
              SHA-512:EFBDADE1157C7E1CB8458CBA89913FB44DC2399AD860FCAEDA588B99230B0934EDAAF8BAB1742E03F06FA8047D3605E8D63BB23EC4B32155C256D07C46ABBFEE
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset he DAYS_OF_WEEK_ABBREV [list \. "\u05d0"\. "\u05d1"\. "\u05d2"\. "\u05d3"\. "\u05d4"\. "\u05d5"\. "\u05e9"]. ::msgcat::mcset he DAYS_OF_WEEK_FULL [list \. "\u05d9\u05d5\u05dd \u05e8\u05d0\u05e9\u05d5\u05df"\. "\u05d9\u05d5\u05dd \u05e9\u05e0\u05d9"\. "\u05d9\u05d5\u05dd \u05e9\u05dc\u05d9\u05e9\u05d9"\. "\u05d9\u05d5\u05dd \u05e8\u05d1\u05d9\u05e2\u05d9"\. "\u05d9\u05d5\u05dd \u05d7\u05de\u05d9\u05e9\u05d9"\. "\u05d9\u05d5\u05dd \u05e9\u05d9\u05e9\u05d9"\. "\u05e9\u05d1\u05ea"]. ::msgcat::mcset he MONTHS_ABBREV [list \. "\u05d9\u05e0\u05d5"\. "\u05e4\u05d1\u05e8"\. "\u05de\u05e8\u05e5"\. "\u05d0\u05e4\u05e8"\. "\u05de\u05d0\u05d9"\. "\u05d9\u05d5\u05e0"\. "\u05d9\u05d5\u05dc"\. "\u05d0\u05d5\u05d2"\. "\u05e1\u05e4\u05d8"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1738
              Entropy (8bit):4.1505681803025185
              Encrypted:false
              SSDEEP:24:4azu8dVYe48VcOVcz1HtDVcqiVca4mGE18VcRBkEVcRfVcRMsVcqiVca4mGE18VI:465v4bNVO7GQbBkDuM4O7GQbBkDuh3x
              MD5:349823390798DF68270E4DB46C3CA863
              SHA1:814F9506FCD8B592C22A47023E73457C469B2F53
              SHA-256:FAFE65DB09BDCB863742FDA8705BCD1C31B59E0DD8A3B347EA6DEC2596CEE0E9
              SHA-512:4D12213EA9A3EAD6828E21D3B5B73931DC922EBE8FD2373E3A3E106DF1784E0BCE2C9D1FBEAE0D433449BE6D28A0F2F50F49AB8C208E69D413C6787ADF52915E
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hi DAYS_OF_WEEK_FULL [list \. "\u0930\u0935\u093f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0932\u0935\u093e\u0930"\. "\u092c\u0941\u0927\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset hi MONTHS_ABBREV [list \. "\u091c\u0928\u0935\u0930\u0940"\. "\u092b\u093c\u0930\u0935\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u0905\u092a\u094d\u0930\u0947\u0932"\. "\u092e\u0908"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u093e\u0908"\. "\u0905\u0917\u0938\u094d\u0924"\. "\u0938\u093f\u0924\u092e\u094d\u092c\u0930"\. "\u0905\u0915\u094d\u091f\u0942\u092c\u0930"\. "\u0928\u0935\u092e\u094d\u092c\u093
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.882853646266983
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmocv+9/Loz3v6rZoco+3v+6f6HK:4EnLzu8+vWq3v6rpF3vmq
              MD5:BC86C58492BCB8828489B871D2A727F0
              SHA1:22EEC74FC011063071A40C3860AE8EF38D898582
              SHA-256:29C7CA358FFFCAF94753C7CC2F63B58386234B75552FA3272C2E36F253770C3F
              SHA-512:ABFE093952144A285F7A86800F5933F7242CB224D917B4BAA4FD2CA48792BEFCBEE9AB7073472510B53D31083719EC68A77DD896410B3DC3C6E2CCD60C2E92F9
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hi_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset hi_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset hi_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1121
              Entropy (8bit):4.291836444825864
              Encrypted:false
              SSDEEP:24:4azu84VBVgqoLpYDThoLZDT25KNWg1gqNvEKvOAl:46nNYPSLZP2ZVqJTO+
              MD5:46FD3DF765F366C60B91FA0C4DE147DE
              SHA1:5E006D1ACA7BBDAC9B8A65EFB26FAFC03C6E9FDE
              SHA-256:9E14D8F7F54BE953983F198C8D59F38842C5F73419A5E81BE6460B3623E7307A
              SHA-512:3AC26C55FB514D9EA46EF57582A2E0B64822E90C889F4B83A62EE255744FEBE0A012079DD764E0F6C7338B3580421C5B6C8575E0B85632015E3689CF58D9EB77
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hr DAYS_OF_WEEK_ABBREV [list \. "ned"\. "pon"\. "uto"\. "sri"\. "\u010det"\. "pet"\. "sub"]. ::msgcat::mcset hr DAYS_OF_WEEK_FULL [list \. "nedjelja"\. "ponedjeljak"\. "utorak"\. "srijeda"\. "\u010detvrtak"\. "petak"\. "subota"]. ::msgcat::mcset hr MONTHS_ABBREV [list \. "sij"\. "vel"\. "o\u017eu"\. "tra"\. "svi"\. "lip"\. "srp"\. "kol"\. "ruj"\. "lis"\. "stu"\. "pro"\. ""]. ::msgcat::mcset hr MONTHS_FULL [list \. "sije\u010danj"\. "velja\u010da"\. "o\u017eujak"\. "travanj"\. "svibanj"\. "lipanj"\. "srpanj"\. "kolovoz"\. "rujan"\. "listopad"\. "studeni"\. "prosinac"\. ""]. ::msgcat::mcset hr DATE_FORMAT "
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1327
              Entropy (8bit):4.447184847972284
              Encrypted:false
              SSDEEP:24:4azu8Xjv5ZemNruwcVNtZHTE9wocxPvt9vq:46fBZemNqwIZHTEE3t5q
              MD5:0561E62941F6ED8965DFC4E2B424E028
              SHA1:C622B21C0DBA83F943FBD10C746E5FABE20235B2
              SHA-256:314F4180C05DE4A4860F65AF6460900FFF77F12C08EDD728F68CA0065126B9AE
              SHA-512:CAD01C963145463612BBAE4B9F5C80B83B228C0181C2500CE8CE1394E1A32CCA3587221F1406F6343029059F5AD47E8FD5514535DCEA45BBA6B2AE76993DFFBD
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hu DAYS_OF_WEEK_ABBREV [list \. "V"\. "H"\. "K"\. "Sze"\. "Cs"\. "P"\. "Szo"]. ::msgcat::mcset hu DAYS_OF_WEEK_FULL [list \. "vas\u00e1rnap"\. "h\u00e9tf\u0151"\. "kedd"\. "szerda"\. "cs\u00fct\u00f6rt\u00f6k"\. "p\u00e9ntek"\. "szombat"]. ::msgcat::mcset hu MONTHS_ABBREV [list \. "jan."\. "febr."\. "m\u00e1rc."\. "\u00e1pr."\. "m\u00e1j."\. "j\u00fan."\. "j\u00fal."\. "aug."\. "szept."\. "okt."\. "nov."\. "dec."\. ""]. ::msgcat::mcset hu MONTHS_FULL [list \. "janu\u00e1r"\. "febru\u00e1r"\. "m\u00e1rcius"\. "\u00e1prilis"\. "m\u00e1jus"\. "j\u00fanius"\. "j\u00falius"\. "augusztus"\. "szeptember"\. "okt\u00f3ber"\. "nove
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):914
              Entropy (8bit):3.9322448438499125
              Encrypted:false
              SSDEEP:24:4azu8acGEXctI9tdb/7579g6tdhUgQbVg:46GBEXKI9tdHtdwg
              MD5:CE834C7E0C3170B733122FF8BF38C28D
              SHA1:693ACC2A0972156B984106AFD07911AF14C4F19C
              SHA-256:1F1B0F5DEDE0263BD81773A78E98AF551F36361ACCB315B618C8AE70A5FE781E
              SHA-512:23BFC6E2CDB7BA75AAC3AA75869DF4A235E4526E8E83D73551B3BC2CE89F3675EBFA75BC94177F2C2BD6AC58C1B125BE65F8489BC4F85FA701415DB9768F7A80
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset id DAYS_OF_WEEK_ABBREV [list \. "Min"\. "Sen"\. "Sel"\. "Rab"\. "Kam"\. "Jum"\. "Sab"]. ::msgcat::mcset id DAYS_OF_WEEK_FULL [list \. "Minggu"\. "Senin"\. "Selasa"\. "Rabu"\. "Kamis"\. "Jumat"\. "Sabtu"]. ::msgcat::mcset id MONTHS_ABBREV [list \. "Jan"\. "Peb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Agu"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset id MONTHS_FULL [list \. "Januari"\. "Pebruari"\. "Maret"\. "April"\. "Mei"\. "Juni"\. "Juli"\. "Agustus"\. "September"\. "Oktober"\. "November"\. "Desember"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.857986813915644
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo0kGvNLo0F/W3v6aZo0kT+3vR6HK:4EnLzu8NGvNS3v6aQK3voq
              MD5:A285817AAABD5203706D5F2A34158C03
              SHA1:18FD0178051581C9F019604499BF91B16712CC91
              SHA-256:DB81643BA1FD115E9D547943A889A56DFC0C81B63F21B1EDC1955C6884C1B2F5
              SHA-512:0B6C684F2E5122681309A6212980C95C14172723F12D4864AF8A8A913DC7081BC42AC39CF087D29770B4A1F0B3B1F712856CBF05D1975FFFC008C16A91081A00
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset id_ID DATE_FORMAT "%d %B %Y". ::msgcat::mcset id_ID TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset id_ID DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1255
              Entropy (8bit):4.391152464169964
              Encrypted:false
              SSDEEP:24:4azu8qVXVDWpXMVmDz1ZVcWVzbQ1/xZ9b3eYXvhv3eT3:462hVW5JDz1ZVUbpfV83
              MD5:6695839F1C4D2A92552CB1647FD14DA5
              SHA1:04CB1976846A78EA9593CB3706C9D61173CE030C
              SHA-256:6767115FFF2DA05F49A28BAD78853FAC6FC716186B985474D6D30764E1727C40
              SHA-512:208766038A6A1D748F4CB2660F059AD355A5439EA6D8326F4F410B2DFBBDEECB55D4CE230C01C519B08CAB1CF5E5B3AC61E7BA86020A7BDA1AFEA624F3828521
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset is DAYS_OF_WEEK_ABBREV [list \. "sun."\. "m\u00e1n."\. "\u00feri."\. "mi\u00f0."\. "fim."\. "f\u00f6s."\. "lau."]. ::msgcat::mcset is DAYS_OF_WEEK_FULL [list \. "sunnudagur"\. "m\u00e1nudagur"\. "\u00feri\u00f0judagur"\. "mi\u00f0vikudagur"\. "fimmtudagur"\. "f\u00f6studagur"\. "laugardagur"]. ::msgcat::mcset is MONTHS_ABBREV [list \. "jan."\. "feb."\. "mar."\. "apr."\. "ma\u00ed"\. "j\u00fan."\. "j\u00fal."\. "\u00e1g\u00fa."\. "sep."\. "okt."\. "n\u00f3v."\. "des."\. ""]. ::msgcat::mcset is MONTHS_FULL [list \. "jan\u00faar"\. "febr\u00faar"\. "mars"\. "apr\u00edl"\. "ma\u00ed"\. "j\u00fan\u00ed"\. "j\u00fal\u00ed"\. "\u00e1g\u00fast"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1240
              Entropy (8bit):4.207511774275323
              Encrypted:false
              SSDEEP:24:4azu8iYJcc8jYShjLhQ6I3S68gvNvlNUhsFNlVGvNmv5svc:46Wi38jBJLhQ6I3EgFtNo4NlVGlw5Kc
              MD5:8E205D032206D794A681E2A994532FA6
              SHA1:47098672D339624474E8854EB0512D54A0CA49E7
              SHA-256:C7D84001855586A0BAB236A6A5878922D9C4A2EA1799BF18544869359750C0DF
              SHA-512:139219DBD014CCA15922C45C7A0468F62E864F18CC16C7B8506258D1ECD766E1EFF6EAE4DFDAF72898B9AF1A5E6CE8D7BB0F1A93A6604D2539F2645C9ED8D146
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset it DAYS_OF_WEEK_ABBREV [list \. "dom"\. "lun"\. "mar"\. "mer"\. "gio"\. "ven"\. "sab"]. ::msgcat::mcset it DAYS_OF_WEEK_FULL [list \. "domenica"\. "luned\u00ec"\. "marted\u00ec"\. "mercoled\u00ec"\. "gioved\u00ec"\. "venerd\u00ec"\. "sabato"]. ::msgcat::mcset it MONTHS_ABBREV [list \. "gen"\. "feb"\. "mar"\. "apr"\. "mag"\. "giu"\. "lug"\. "ago"\. "set"\. "ott"\. "nov"\. "dic"\. ""]. ::msgcat::mcset it MONTHS_FULL [list \. "gennaio"\. "febbraio"\. "marzo"\. "aprile"\. "maggio"\. "giugno"\. "luglio"\. "agosto"\. "settembre"\. "ottobre"\. "novembre"\. "dicembre"\. ""]. ::msgcat::mcset it BCE "aC". ::msgc
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):244
              Entropy (8bit):4.851375233848049
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoi5jLWNLoyJ+3vULoia+3vjLtA6:4EnLzu8m3WNJ+3v23v3t3
              MD5:8666E24230AED4DC76DB93BE1EA07FF6
              SHA1:7C688C8693C76AEE07FB32637CD58E47A85760F3
              SHA-256:2EE356FFA2491A5A60BDF7D7FEBFAC426824904738615A0C1D07AEF6BDA3B76F
              SHA-512:BCCE87FB94B28B369B9EE48D792A399DB8250D0D3D73FC05D053276A7475229EF1555D5E516D780092496F0E5F229A9912A45FB5A88C024FCEBF08E654D37B07
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset it_CH DATE_FORMAT "%e. %B %Y". ::msgcat::mcset it_CH TIME_FORMAT "%H:%M:%S". ::msgcat::mcset it_CH DATE_TIME_FORMAT "%e. %B %Y %H:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1664
              Entropy (8bit):4.88149888596689
              Encrypted:false
              SSDEEP:24:4azu8VcQHxbtVLKMwvtFwvQv4fTweLvDvTwS0Zu+jqgv:46RbItt4mCEebzES0njqq
              MD5:430DEB41034402906156D7E23971CD2C
              SHA1:0952FFBD241B5111714275F5CD8FB5545067FFEC
              SHA-256:38DCA9B656241884923C451A369B90A9F1D76F9029B2E98E04784323169C3251
              SHA-512:AE5DF1B79AE34DF4CC1EB00406FFF49541A95E2C732E3041CCE321F2F3FA6461BB45C6524A5FEB77E18577206CBD88A83FBF20B4B058BAE9B889179C93221557
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ja DAYS_OF_WEEK_ABBREV [list \. "\u65e5"\. "\u6708"\. "\u706b"\. "\u6c34"\. "\u6728"\. "\u91d1"\. "\u571f"]. ::msgcat::mcset ja DAYS_OF_WEEK_FULL [list \. "\u65e5\u66dc\u65e5"\. "\u6708\u66dc\u65e5"\. "\u706b\u66dc\u65e5"\. "\u6c34\u66dc\u65e5"\. "\u6728\u66dc\u65e5"\. "\u91d1\u66dc\u65e5"\. "\u571f\u66dc\u65e5"]. ::msgcat::mcset ja MONTHS_FULL [list \. "1\u6708"\. "2\u6708"\. "3\u6708"\. "4\u6708"\. "5\u6708"\. "6\u6708"\. "7\u6708"\. "8\u6708"\. "9\u6708"\. "10\u6708"\. "11\u6708"\. "12\u6708"]. ::msgcat::mcset ja BCE "\u7d00\u5143\u524d". ::msgcat::mcset ja CE "\u897f\u66a6". ::msgcat::mcset ja AM "\u5348\u524d". ::msgcat::mcset ja PM "\u5348\u5f8c". ::msgcat::mcset ja DATE_FORMAT "%Y/%m/%
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):978
              Entropy (8bit):4.013253613061898
              Encrypted:false
              SSDEEP:24:4azu83jGeo9sbjCjS3jCwjLj+zSsS9CfzTA2Qcl:46OOsJzTvl
              MD5:AE55E001BBE3272CE13369C836139EF3
              SHA1:D912A0AEBA08BC97D80E9B7A55CE146956C90BCC
              SHA-256:1B00229DF5A979A040339BBC72D448F39968FEE5CC24F07241C9F6129A9B53DD
              SHA-512:E53E8DB56AD367E832A121D637CA4755E6C8768C063E4BE43E6193C5F71ED7AA10F7223AC85750C0CAD543CF4A0BFE578CBA2877F176A5E58DCA2BAA2F7177FB
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kl DAYS_OF_WEEK_ABBREV [list \. "sab"\. "ata"\. "mar"\. "pin"\. "sis"\. "tal"\. "arf"]. ::msgcat::mcset kl DAYS_OF_WEEK_FULL [list \. "sabaat"\. "ataasinngorneq"\. "marlunngorneq"\. "pingasunngorneq"\. "sisamanngorneq"\. "tallimanngorneq"\. "arfininngorneq"]. ::msgcat::mcset kl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset kl MONTHS_FULL [list \. "januari"\. "februari"\. "martsi"\. "aprili"\. "maji"\. "juni"\. "juli"\. "augustusi"\. "septemberi"\. "oktoberi"\. "novemberi"\. "decemberi"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.83493357349932
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoEpb53FD/LoEpLE3vG5oEpLE3v6X5oEpba+3vnFDoAov:4EnLzu8KF3FD/1w3vMw3v6T/3v9dy
              MD5:4B8E5B6EB7C27A02DBC0C766479B068D
              SHA1:E97A948FFE6C8DE99F91987155DF0A81A630950E
              SHA-256:F99DA45138A8AEBFD92747FC28992F0C315C6C4AD97710EAF9427263BFFA139C
              SHA-512:D726494A6F4E1FB8C71B8B56E9B735C1837D8D22828D006EF386E41AD15CD1E4CF14DAC01966B9AFE41F7B6A44916EFC730CF038B4EC393043AE9021D11DACF2
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kl_GL DATE_FORMAT "%d %b %Y". ::msgcat::mcset kl_GL TIME_FORMAT "%T". ::msgcat::mcset kl_GL TIME_FORMAT_12 "%T". ::msgcat::mcset kl_GL DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1566
              Entropy (8bit):4.552910804130986
              Encrypted:false
              SSDEEP:24:4azu8cVBfHVnYgY+YGkYeY02Y7YkMXjDHMXjqKKyvtuvFd8vUPvwEq:46ojlmpYEY7XjDsXj+0t4zaU3wt
              MD5:A4C37AF81FC4AA6003226A95539546C1
              SHA1:A18A7361783896C691BD5BE8B3A1FCCCCB015F43
              SHA-256:F6E2B0D116D2C9AC90DDA430B6892371D87A4ECFB6955318978ED6F6E9D546A6
              SHA-512:FBE6BA258C250BD90FADCC42AC18A17CC4E7B040F160B94075AF1F42ECD43EEA6FE49DA52CF9B5BBB5D965D6AB7C4CC4053A78E865241F891E13F94EB20F0472
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ko DAYS_OF_WEEK_ABBREV [list \. "\uc77c"\. "\uc6d4"\. "\ud654"\. "\uc218"\. "\ubaa9"\. "\uae08"\. "\ud1a0"]. ::msgcat::mcset ko DAYS_OF_WEEK_FULL [list \. "\uc77c\uc694\uc77c"\. "\uc6d4\uc694\uc77c"\. "\ud654\uc694\uc77c"\. "\uc218\uc694\uc77c"\. "\ubaa9\uc694\uc77c"\. "\uae08\uc694\uc77c"\. "\ud1a0\uc694\uc77c"]. ::msgcat::mcset ko MONTHS_ABBREV [list \. "1\uc6d4"\. "2\uc6d4"\. "3\uc6d4"\. "4\uc6d4"\. "5\uc6d4"\. "6\uc6d4"\. "7\uc6d4"\. "8\uc6d4"\. "9\uc6d4"\. "10\uc6d4"\. "11\uc6d4"\. "12\uc6d4"\. ""]. ::msgcat::mcset ko MONTHS_FULL [list \. "1\uc6d4"\. "2\uc6d4"\. "3\uc6d4"\. "4\uc6d4"\. "5\uc6d4"\. "6\uc6d4"\. "7\uc6d4"\. "8\uc6d4"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):346
              Entropy (8bit):5.015790750376121
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo56SFZhjNo56m5Ybo56TGMZo56a/W3v6mfvLo56TT+3vOAEP:4EnLzu8r62vjs6m5YS6TGN6a+3v6o66J
              MD5:9C7E97A55A957AB1D1B5E988AA514724
              SHA1:592F8FF9FABBC7BF48539AF748DCFC9241AED82D
              SHA-256:31A4B74F51C584354907251C55FE5CE894D2C9618156A1DC6F5A979BC350DB17
              SHA-512:9D04DF2A87AFE24C339E1A0F6358FE995CBCAF8C7B08A1A7953675E2C2C1EDBCAF297B23C2B9BEC398DFEE6D1D75CE32E31389A7199466A38BC83C8DBBA67C77
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ko_KR BCE "\uae30\uc6d0\uc804". ::msgcat::mcset ko_KR CE "\uc11c\uae30". ::msgcat::mcset ko_KR DATE_FORMAT "%Y.%m.%d". ::msgcat::mcset ko_KR TIME_FORMAT_12 "%P %l:%M:%S". ::msgcat::mcset ko_KR DATE_TIME_FORMAT "%Y.%m.%d %P %l:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1958
              Entropy (8bit):4.1451019501109965
              Encrypted:false
              SSDEEP:24:4azu8Z448VcOVczWdSVcqVcR0q4vTqBBiXCVcqVcR0q4vTqBBiaMv:46u48h0qpBBaR0qpBBVu
              MD5:E7938CB3AF53D42B4142CB104AB04B3B
              SHA1:6205BD2336857F368CABF89647F54D94E093A77B
              SHA-256:D236D5B27184B1E813E686D901418117F22D67024E6944018FC4B633DF9FF744
              SHA-512:CE77CE2EC773F3A1A3CD68589C26F7089E8133ADE601CE899EEB0B13648051344A94E69AEC2C8C58349456E52B11EB7545C8926E3F08DB643EE551C641FF38DB
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kok DAYS_OF_WEEK_FULL [list \. "\u0906\u0926\u093f\u0924\u094d\u092f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u093e\u0930"\. "\u092c\u0941\u0927\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset kok MONTHS_ABBREV [list \. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u090f\u092a\u094d\u0930\u093f\u0932"\. "\u092e\u0947"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u0948"\. "\u0913\u0917\u0938\u094d\u091f"\. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\. "\u0913\u0915\u094d\u091f\u094b\u092c\u0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):254
              Entropy (8bit):4.8580653411441155
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo5VsNv+9/Lo5VsU3v6rZo5VsNo+3v+6f6HK:4EnLzu8rVsNvWiVsU3v6rAVsNF3vmq
              MD5:A3B27D44ED430AEC7DF2A47C19659CC4
              SHA1:700E4B9C395B540BFCE9ABDC81E6B9B758893DC9
              SHA-256:BEE07F14C7F4FC93B62AC318F89D2ED0DD6FF30D2BF21C2874654FF0292A6C4B
              SHA-512:79E9D8B817BDB6594A7C95991B2F6D7571D1C2976E74520D28223CF9F05EAA2128A44BC83A94089F09011FFCA9DB5E2D4DD74B59DE2BADC022E1571C595FE36C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kok_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset kok_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset kok_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):966
              Entropy (8bit):3.9734955453120504
              Encrypted:false
              SSDEEP:12:4EnLzu8z4md0eKwCW44mtls79cp32AqghoPx9ab43gWgw3SeWOdSyECYf5AQZ0eD:4azu806vCmgs7aB2seFkhq+9
              MD5:413A264B40EEBEB28605481A3405D27D
              SHA1:9C2EFA6326C62962DCD83BA8D16D89616D2C5B77
              SHA-256:F49F4E1C7142BF7A82FC2B9FC075171AE45903FE69131478C15219D72BBAAD33
              SHA-512:CF0559DB130B8070FEC93A64F5317A2C9CDE7D5EAFD1E92E76EAAE0740C6429B7AB7A60BD833CCA4ABCC0AADEBC6A68F854FF654E0707091023D275404172427
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kw DAYS_OF_WEEK_ABBREV [list \. "Sul"\. "Lun"\. "Mth"\. "Mhr"\. "Yow"\. "Gwe"\. "Sad"]. ::msgcat::mcset kw DAYS_OF_WEEK_FULL [list \. "De Sul"\. "De Lun"\. "De Merth"\. "De Merher"\. "De Yow"\. "De Gwener"\. "De Sadorn"]. ::msgcat::mcset kw MONTHS_ABBREV [list \. "Gen"\. "Whe"\. "Mer"\. "Ebr"\. "Me"\. "Evn"\. "Gor"\. "Est"\. "Gwn"\. "Hed"\. "Du"\. "Kev"\. ""]. ::msgcat::mcset kw MONTHS_FULL [list \. "Mys Genver"\. "Mys Whevrel"\. "Mys Merth"\. "Mys Ebrel"\. "Mys Me"\. "Mys Evan"\. "Mys Gortheren"\. "Mye Est"\. "Mys Gwyngala"\. "Mys Hedra"\. "Mys Du"\. "Mys Kevardhu"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.914818138642697
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoh6AvvNLoh633v6aZoh6Ao+3vR6HK:4EnLzu8z6AvvN6633v6aY6AF3voq
              MD5:D325ADCF1F81F40D7B5D9754AE0542F3
              SHA1:7A6BCD6BE5F41F84B600DF355CB00ECB9B4AE8C0
              SHA-256:7A8A539C8B990AEFFEA06188B98DC437FD2A6E89FF66483EF334994E73FD0EC9
              SHA-512:A05BBB3F80784B9C8BBA3FE618FEE154EE40D240ED4CFF7CD6EEE3D97BC4F065EFF585583123F1FFD8ABA1A194EB353229E15ED5CD43759D4D356EC5BE8DCD73
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kw_GB DATE_FORMAT "%d %B %Y". ::msgcat::mcset kw_GB TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset kw_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1255
              Entropy (8bit):4.4416408590245
              Encrypted:false
              SSDEEP:24:4azu8FHYI4/+HYZoNPW43VvJZb3lSuRnixx/x5JfbiMQeTVYkG2CvRksvQ:46hHNHhu43VxZb3lSuRwxZ5VbiMQeTVL
              MD5:73F0A9C360A90CB75C6DA7EF87EF512F
              SHA1:582EB224C9715C8336B4D1FCE7DDEC0D89F5AD71
              SHA-256:510D8EED3040B50AFAF6A3C85BC98847F1B4D5D8A685C5EC06ACC2491B890101
              SHA-512:B5482C7448BFC44B05FCF7EB0642B0C7393F4438082A507A94C13F56F12A115A5CE7F0744518BB0B2FAF759D1AD7744B0BEDB98F563C2A4AB11BC4619D7CEA22
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset lt DAYS_OF_WEEK_ABBREV [list \. "Sk"\. "Pr"\. "An"\. "Tr"\. "Kt"\. "Pn"\. "\u0160t"]. ::msgcat::mcset lt DAYS_OF_WEEK_FULL [list \. "Sekmadienis"\. "Pirmadienis"\. "Antradienis"\. "Tre\u010diadienis"\. "Ketvirtadienis"\. "Penktadienis"\. "\u0160e\u0161tadienis"]. ::msgcat::mcset lt MONTHS_ABBREV [list \. "Sau"\. "Vas"\. "Kov"\. "Bal"\. "Geg"\. "Bir"\. "Lie"\. "Rgp"\. "Rgs"\. "Spa"\. "Lap"\. "Grd"\. ""]. ::msgcat::mcset lt MONTHS_FULL [list \. "Sausio"\. "Vasario"\. "Kovo"\. "Baland\u017eio"\. "Gegu\u017e\u0117s"\. "Bir\u017eelio"\. "Liepos"\. "Rugpj\u016b\u010dio"\. "Rugs\u0117jo"\. "Spalio"\. "Lapkri\u010dio"\. "G
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1219
              Entropy (8bit):4.39393801727056
              Encrypted:false
              SSDEEP:24:4azu8lmZG0me3AEcGo49bJcpF9gT9PCbF5uld0vVcASAr8svJ5vk3:46TGAE8Q/PG5dv//Lk3
              MD5:D5DEB8EFFE6298858F9D1B9FAD0EA525
              SHA1:973DF40D0464BCE10EB5991806D9990B65AB0F82
              SHA-256:FD95B38A3BEBD59468BDC2890BAC59DF31C352E17F2E77C82471E1CA89469802
              SHA-512:F024E3D6D30E8E5C3316364A905C8CCAC87427BFC2EC10E72065F1DD114A112A61FDECDF1C4EC9C3D8BB9A54D18ED4AE9D57B07DA4AFFE480DE12F3D54BED928
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset lv DAYS_OF_WEEK_ABBREV [list \. "Sv"\. "P"\. "O"\. "T"\. "C"\. "Pk"\. "S"]. ::msgcat::mcset lv DAYS_OF_WEEK_FULL [list \. "sv\u0113tdiena"\. "pirmdiena"\. "otrdiena"\. "tre\u0161diena"\. "ceturdien"\. "piektdiena"\. "sestdiena"]. ::msgcat::mcset lv MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Maijs"\. "J\u016bn"\. "J\u016bl"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset lv MONTHS_FULL [list \. "janv\u0101ris"\. "febru\u0101ris"\. "marts"\. "apr\u012blis"\. "maijs"\. "j\u016bnijs"\. "j\u016blijs"\. "augusts"\. "septembris"\. "oktobris"\. "novembris"\. "decembris"\. ""]. ::msgcat
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2105
              Entropy (8bit):4.237536682442766
              Encrypted:false
              SSDEEP:48:46UcQdZnlcQfAQPWQEHKr9nGUeDjDpxpWQ1Q3QuQoQLX9TSQ2QIQPQHp7+8i:hNdR7cr9nMvXI0i7F89TSn1KX
              MD5:CD589758D4F4B522781A10003D3E1791
              SHA1:D953DD123D54B02BAF4B1AE0D36081CDFCA38444
              SHA-256:F384DD88523147CEF42AA871D323FC4CBEE338FF67CC5C95AEC7940C0E531AE3
              SHA-512:2EA1E71CD1E958F83277006343E85513D112CBB3C22CBFF29910CB1FC37F2389B3F1DCB2533EC59F9E642624869E5C61F289FDC010B55C6EECEF378F2D92DB0B
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mk DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0435\u0434."\. "\u043f\u043e\u043d."\. "\u0432\u0442."\. "\u0441\u0440\u0435."\. "\u0447\u0435\u0442."\. "\u043f\u0435\u0442."\. "\u0441\u0430\u0431."]. ::msgcat::mcset mk DAYS_OF_WEEK_FULL [list \. "\u043d\u0435\u0434\u0435\u043b\u0430"\. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0441\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0440\u0442\u043e\u043a"\. "\u043f\u0435\u0442\u043e\u043a"\. "\u0441\u0430\u0431\u043e\u0442\u0430"]. ::msgcat::mcset mk MONTHS_ABBREV [list \. "\u0458\u0430\u043d."\. "\u0444\u0435\u0432."\. "\u043c\u0430\u0440."\. "\u0430\u043f\u0440."\. "\u043c\u0430\u0458."\. "\u0458\u0443\u043d."\. "\u0458\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1807
              Entropy (8bit):4.160320823510059
              Encrypted:false
              SSDEEP:24:4azu8ocYe48VcOVczyVczoRSVcqVcR0q4vTqBBiPNVcqVcR0q4vTqBBil:46R48h0qpBBkI0qpBBe
              MD5:791408BAE710B77A27AD664EC3325E1C
              SHA1:E760B143A854838E18FFB66500F4D312DD80634E
              SHA-256:EB2E2B7A41854AF68CEF5881CF1FBF4D38E70D2FAB2C3F3CE5901AA5CC56FC15
              SHA-512:FE91EF67AB9313909FE0C29D5FBE2298EE35969A26A63D94A406BFDA7BCF932F2211F94C0E3C1D718DBC2D1145283C768C23487EEB253249ACFE76E8D1F1D1E5
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mr DAYS_OF_WEEK_FULL [list \. "\u0930\u0935\u093f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset mr MONTHS_ABBREV [list \. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u090f\u092a\u094d\u0930\u093f\u0932"\. "\u092e\u0947"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u0948"\. "\u0913\u0917\u0938\u094d\u091f"\. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\. "\u0913\u0915\u094d\u091f\u094b\u092c\u0930"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.847742455062573
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoGNv+9/LoGU3v6rZoGNo+3v+6f6HK:4EnLzu8GvWe3v6r5F3vmq
              MD5:899E845D33CAAFB6AD3B1F24B3F92843
              SHA1:FC17A6742BF87E81BBD4D5CB7B4DCED0D4DD657B
              SHA-256:F75A29BB323DB4354B0C759CB1C8C5A4FFC376DFFD74274CA60A36994816A75C
              SHA-512:99D05FCE8A9C9BE06FDA8B54D4DE5497141F6373F470B2AB24C2D00B9C56031350F5DCDA2283A0E6F5B09FF21218FC3C7E2A6AB8ECC5BB020546FD62BDC8FF99
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mr_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset mr_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset mr_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):910
              Entropy (8bit):3.9292866027924838
              Encrypted:false
              SSDEEP:12:4EnLzu82mCBuvFYcEfmt1qWjefjESRsToOqrlHvFguSixTRs1OAfC67:4azu82nBuHEfKxjeby7cl9gbZUAfCc
              MD5:441CC737D383D8213F64B62A5DBEEC3E
              SHA1:34FBE99FB25A0DCA2FDA2C008AC8127BA2BC273B
              SHA-256:831F611EE851A64BF1BA5F9A5441EC1D50722FA9F15B4227707FE1927F754DE4
              SHA-512:0474B2127890F63814CD9E77D156B5E4FC45EB3C17A57719B672AC9E3A6EEA9934F0BE158F76808B34A11DA844AB900652C18E512830278DFED2666CD005FBE5
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ms DAYS_OF_WEEK_ABBREV [list \. "Aha"\. "Isn"\. "Sei"\. "Rab"\. "Kha"\. "Jum"\. "Sab"]. ::msgcat::mcset ms DAYS_OF_WEEK_FULL [list \. "Ahad"\. "Isnin"\. "Selasa"\. "Rahu"\. "Khamis"\. "Jumaat"\. "Sabtu"]. ::msgcat::mcset ms MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mac"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Ogos"\. "Sep"\. "Okt"\. "Nov"\. "Dis"\. ""]. ::msgcat::mcset ms MONTHS_FULL [list \. "Januari"\. "Februari"\. "Mac"\. "April"\. "Mei"\. "Jun"\. "Julai"\. "Ogos"\. "September"\. "Oktober"\. "November"\. "Disember"\. ""].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):259
              Entropy (8bit):4.770028367699931
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoChFflD/LoChF+3v6xH5oCh++3vflm6PYv:4EnLzu8IPflD/ne3v6Tl3vflm6q
              MD5:8261689A45FB754158B10B044BDC4965
              SHA1:6FFC9B16A0600D9BC457322F1316BC175309C6CA
              SHA-256:D05948D75C06669ADDB9708BC5FB48E6B651D4E62EF1B327EF8A3F605FD5271C
              SHA-512:0321A5C17B3E33FDE9480AC6014B373D1663219D0069388920D277AA61341B8293883517C900030177FF82D65340E6C9E3ED051B27708DD093055E3BE64B2AF3
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ms_MY DATE_FORMAT "%A %d %b %Y". ::msgcat::mcset ms_MY TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset ms_MY DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):690
              Entropy (8bit):4.48913642143724
              Encrypted:false
              SSDEEP:12:4EnLzu8+YmWjjRgWfjxBTo4erxy1IGZzNN+3v6amK3vZsq:4azu8+YZjjRXbfNedy1IG5N6vjmsvGq
              MD5:CE7E67A03ED8C3297C6A5B634B55D144
              SHA1:3DA5ACC0F52518541810E7F2FE57751955E12BDA
              SHA-256:D115718818E3E3367847CE35BB5FF0361D08993D9749D438C918F8EB87AD8814
              SHA-512:3754AA7B7D27A813C6113D2AA834A951FED1B81E4DACE22C81E0583F29BBC73C014697F39A2067DEC622D98EACD70D26FD40F80CF6D09E1C949F01FADED52C74
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mt DAYS_OF_WEEK_ABBREV [list \. "\u0126ad"\. "Tne"\. "Tli"\. "Erb"\. "\u0126am"\. "\u0120im"]. ::msgcat::mcset mt MONTHS_ABBREV [list \. "Jan"\. "Fra"\. "Mar"\. "Apr"\. "Mej"\. "\u0120un"\. "Lul"\. "Awi"\. "Set"\. "Ott"\. "Nov"]. ::msgcat::mcset mt BCE "QK". ::msgcat::mcset mt CE "". ::msgcat::mcset mt DATE_FORMAT "%A, %e ta %B, %Y". ::msgcat::mcset mt TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset mt DATE_TIME_FORMAT "%A, %e ta %B, %Y %l:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1157
              Entropy (8bit):4.24006506188001
              Encrypted:false
              SSDEEP:24:4azu8CKEj4/xasSpfiTBtHQT1V/W3WNfvZv3l:46KU/0s2iTeVOiHN1
              MD5:D5509ABF5CBFB485C20A26FCC6B1783E
              SHA1:53A298FBBF09AE2E223B041786443A3D8688C9EB
              SHA-256:BC401889DD934C49D10D99B471441BE2B536B1722739C7B0AB7DE7629680F602
              SHA-512:BDAFBA46EF44151CFD9EF7BC1909210F6DB2BAC20C31ED21AE3BE7EAC785CD4F545C4590CF551C0D066F982E2050F5844BDDC569F32C5804DBDE657F4511A6FE
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nb DAYS_OF_WEEK_ABBREV [list \. "s\u00f8"\. "ma"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f8"]. ::msgcat::mcset nb DAYS_OF_WEEK_FULL [list \. "s\u00f8ndag"\. "mandag"\. "tirsdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f8rdag"]. ::msgcat::mcset nb MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset nb MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "april"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""]. ::msgcat::mcset nb BCE "f.Kr.". ::msgcat::mcset nb CE "e.Kr.".
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1079
              Entropy (8bit):4.158523842311663
              Encrypted:false
              SSDEEP:24:4azu84LFiS8LMKZoNfSZTNTQhFCNZvtWvg:46Oi5LMKZASZTEF2Ntgg
              MD5:98820DFF7E1C8A9EAB8C74B0B25DEB5D
              SHA1:5357063D5699188E544D244EC4AEFDDF7606B922
              SHA-256:49128B36B88E380188059C4B593C317382F32E29D1ADC18D58D14D142459A2BB
              SHA-512:26AB945B7BA00433BEC85ACC1D90D1D3B70CE505976CABE1D75A7134E00CD591AC27463987C515EEA079969DBCF200DA9C8538CAAF178A1EE17C9B0284260C45
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nl DAYS_OF_WEEK_ABBREV [list \. "zo"\. "ma"\. "di"\. "wo"\. "do"\. "vr"\. "za"]. ::msgcat::mcset nl DAYS_OF_WEEK_FULL [list \. "zondag"\. "maandag"\. "dinsdag"\. "woensdag"\. "donderdag"\. "vrijdag"\. "zaterdag"]. ::msgcat::mcset nl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mrt"\. "apr"\. "mei"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset nl MONTHS_FULL [list \. "januari"\. "februari"\. "maart"\. "april"\. "mei"\. "juni"\. "juli"\. "augustus"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset nl DATE_FORMAT "%e %B %Y". ::msgcat::mcset nl TIME_FORM
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.817188474504631
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmo4gPI5og9X3vG5og9X3v6X5o49+3vnFDoAov:4EnLzu8WgAhF3v8F3v6JI3v9dy
              MD5:B08E30850CA849068D06A99B4E216892
              SHA1:11B5E95FF4D822E76A1B9C28EEC2BC5E95E5E362
              SHA-256:9CD54EC24CBDBEC5E4FE543DDA8CA95390678D432D33201FA1C32B61F8FE225A
              SHA-512:9AF147C2F22B11115E32E0BFD0126FE7668328E7C67B349A781F42B0022A334E53DDF3FCCC2C34C91BFBB45602A002D0D7B569B5E1FE9F0EE6C4570400CB0B0C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nl_BE DATE_FORMAT "%d-%m-%y". ::msgcat::mcset nl_BE TIME_FORMAT "%T". ::msgcat::mcset nl_BE TIME_FORMAT_12 "%T". ::msgcat::mcset nl_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1148
              Entropy (8bit):4.207752506572597
              Encrypted:false
              SSDEEP:24:4azu8eNsP2/xhsSpf2TBtHQT15j63WN7v9v3l:46it/vs22Te5OiL51
              MD5:2266607EF358B632696C7164E61358B5
              SHA1:A380863A8320DAB1D5A2D60C22ED5F7DB5C7BAF7
              SHA-256:5EE93A8C245722DEB64B68EFF50C081F24DA5DE43D999C006A10C484E1D3B4ED
              SHA-512:2A8DEF754A25736D14B958D8B0CEA0DC41C402A9EFA25C9500BA861A7E8D74C79939C1969AC694245605C17D33AD3984F6B9ACCA4BE03EFC41A878772BB5FD86
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nn DAYS_OF_WEEK_ABBREV [list \. "su"\. "m\u00e5"\. "ty"\. "on"\. "to"\. "fr"\. "lau"]. ::msgcat::mcset nn DAYS_OF_WEEK_FULL [list \. "sundag"\. "m\u00e5ndag"\. "tysdag"\. "onsdag"\. "torsdag"\. "fredag"\. "laurdag"]. ::msgcat::mcset nn MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset nn MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "april"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""]. ::msgcat::mcset nn BCE "f.Kr.". ::msgcat::mcset nn CE "e.Kr.". ::msgca
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1211
              Entropy (8bit):4.392723231340452
              Encrypted:false
              SSDEEP:12:4EnLzu854moKR4mtPoTckd8EnO6z3K4jwxI1LRhtm3ni8FwxIBgdE4RsMZmB0CLs:4azu8yNgyJxPEyRhonO+AjTg0Okvpvn
              MD5:31A9133E9DCA7751B4C3451D60CCFFA0
              SHA1:FB97A5830965716E77563BE6B7EB1C6A0EA6BF40
              SHA-256:C39595DDC0095EB4AE9E66DB02EE175B31AC3DA1F649EB88FA61B911F838F753
              SHA-512:329EE7FE79783C83361A0C5FFFD7766B64B8544D1AD63C57AEAA2CC6A526E01D9C4D7765C73E88F86DAE57477459EA330A0C42F39E441B50DE9B0F429D01EAE8
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pl DAYS_OF_WEEK_ABBREV [list \. "N"\. "Pn"\. "Wt"\. "\u015ar"\. "Cz"\. "Pt"\. "So"]. ::msgcat::mcset pl DAYS_OF_WEEK_FULL [list \. "niedziela"\. "poniedzia\u0142ek"\. "wtorek"\. "\u015broda"\. "czwartek"\. "pi\u0105tek"\. "sobota"]. ::msgcat::mcset pl MONTHS_ABBREV [list \. "sty"\. "lut"\. "mar"\. "kwi"\. "maj"\. "cze"\. "lip"\. "sie"\. "wrz"\. "pa\u017a"\. "lis"\. "gru"\. ""]. ::msgcat::mcset pl MONTHS_FULL [list \. "stycze\u0144"\. "luty"\. "marzec"\. "kwiecie\u0144"\. "maj"\. "czerwiec"\. "lipiec"\. "sierpie\u0144"\. "wrzesie\u0144"\. "pa\u017adziernik"\. "listopad"\. "grudzie\u0144"\. ""]. ::msgcat::m
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1127
              Entropy (8bit):4.325163993882846
              Encrypted:false
              SSDEEP:24:4azu8pYpzzktTYyUgC0CIKjblie5f9kwAAs+CFsFoD6GADvtU6svO:46dCzWTh2AA9/2F4oD6GAztU6KO
              MD5:D827F76D1ED6CB89839CAC2B56FD7252
              SHA1:140D6BC1F6CEF5FD0A390B3842053BF54B54B4E2
              SHA-256:9F2BFFA3B4D8783B2CFB2CED9CC4319ACF06988F61829A1E5291D55B19854E88
              SHA-512:B662336699E23E371F0148EDD742F71874A7A28DFA81F0AFAE91C8C9494CEA1904FEA0C21264CF2A253E0FB1360AD35B28CFC4B74E4D7B2DBB0E453E96F7EB93
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pt DAYS_OF_WEEK_ABBREV [list \. "Dom"\. "Seg"\. "Ter"\. "Qua"\. "Qui"\. "Sex"\. "S\u00e1b"]. ::msgcat::mcset pt DAYS_OF_WEEK_FULL [list \. "Domingo"\. "Segunda-feira"\. "Ter\u00e7a-feira"\. "Quarta-feira"\. "Quinta-feira"\. "Sexta-feira"\. "S\u00e1bado"]. ::msgcat::mcset pt MONTHS_ABBREV [list \. "Jan"\. "Fev"\. "Mar"\. "Abr"\. "Mai"\. "Jun"\. "Jul"\. "Ago"\. "Set"\. "Out"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset pt MONTHS_FULL [list \. "Janeiro"\. "Fevereiro"\. "Mar\u00e7o"\. "Abril"\. "Maio"\. "Junho"\. "Julho"\. "Agosto"\. "Setembro"\. "Outubro"\. "Novembro"\. "Dezembro"\. ""]. ::msgcat::mcset pt DATE_FO
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):279
              Entropy (8bit):4.8127929329126085
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmofm6GPWHFLofAW3vG5ofAW3v6X5ofm6T+3vnFDoAov:4EnLzu8hNGgF493vr93v6uNK3v9dy
              MD5:4EE34960147173A12020A583340E92F8
              SHA1:78D91A80E2426A84BC88EE97DA28EC0E4BE8DE45
              SHA-256:E383B20484EE90C00054D52DD5AF473B2AC9DC50C14D459A579EF5F44271D256
              SHA-512:EDFF8FB9A86731FFF005AFBBBB522F69B2C6033F59ECCD5E35A8B6A9E0F9AF23C52FFDCC22D893915AD1854E8104C81DA8C5BD8C794C7E645AFB82001B4BFC24
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pt_BR DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset pt_BR TIME_FORMAT "%T". ::msgcat::mcset pt_BR TIME_FORMAT_12 "%T". ::msgcat::mcset pt_BR DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1172
              Entropy (8bit):4.279005910896047
              Encrypted:false
              SSDEEP:24:4azu8/0oFUBZNk1Mkp3pFukZEoVYfPcF+T1vWFMvUvWI3:46kNkKkpLEoSfPcFgvWFqSWI3
              MD5:0F5C8A7022DB1203442241ABEB5901FF
              SHA1:C54C8BF05E8E6C2C0901D3C88C89DDCF35A26924
              SHA-256:D2E14BE188350D343927D5380EB5672039FE9A37E9A9957921B40E4619B36027
              SHA-512:13ACF499FA803D4446D8EC67119BC8257B1F093084B83D854643CEA918049F96C8FA08DC5F896EECA80A5FD552D90E5079937B1A3894D89A589E468172856163
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ro DAYS_OF_WEEK_ABBREV [list \. "D"\. "L"\. "Ma"\. "Mi"\. "J"\. "V"\. "S"]. ::msgcat::mcset ro DAYS_OF_WEEK_FULL [list \. "duminic\u0103"\. "luni"\. "mar\u0163i"\. "miercuri"\. "joi"\. "vineri"\. "s\u00eemb\u0103t\u0103"]. ::msgcat::mcset ro MONTHS_ABBREV [list \. "Ian"\. "Feb"\. "Mar"\. "Apr"\. "Mai"\. "Iun"\. "Iul"\. "Aug"\. "Sep"\. "Oct"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset ro MONTHS_FULL [list \. "ianuarie"\. "februarie"\. "martie"\. "aprilie"\. "mai"\. "iunie"\. "iulie"\. "august"\. "septembrie"\. "octombrie"\. "noiembrie"\. "decembrie"\. ""]. ::msgcat::mcset ro BCE "d.C.". ::msgcat::mcset ro CE
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2039
              Entropy (8bit):4.225775794669275
              Encrypted:false
              SSDEEP:48:46CpQ7kvicQfAQPlQoBBCZAitBmZ/QhQoQaQPTeQgQonQ4FQEWFkt3Wd:hCpgkvzRo6QBw53weFHXFgIGd
              MD5:3A7181CE08259FF19D2C27CF8C6752B3
              SHA1:97DFFB1E224CEDB5427841C3B59F85376CD4423B
              SHA-256:C2A3A0BE5BC5A46A6A63C4DE34E317B402BAD40C22FB2936E1A4F53C1E2F625F
              SHA-512:CC9620BA4601E53B22CCFC66A0B53C26224158379DF6BA2D4704A2FE11222DFBDAE3CA9CF51576B4084B8CCA8DB13FDE81396E38F94BCD0C8EA21C5D77680394
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ru DAYS_OF_WEEK_ABBREV [list \. "\u0412\u0441"\. "\u041f\u043d"\. "\u0412\u0442"\. "\u0421\u0440"\. "\u0427\u0442"\. "\u041f\u0442"\. "\u0421\u0431"]. ::msgcat::mcset ru DAYS_OF_WEEK_FULL [list \. "\u0432\u043e\u0441\u043a\u0440\u0435\u0441\u0435\u043d\u044c\u0435"\. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a"\. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0441\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0435\u0440\u0433"\. "\u043f\u044f\u0442\u043d\u0438\u0446\u0430"\. "\u0441\u0443\u0431\u0431\u043e\u0442\u0430"]. ::msgcat::mcset ru MONTHS_ABBREV [list \. "\u044f\u043d\u0432"\. "\u0444\u0435\u0432"\. "\u043c\u0430\u0440"\. "\u0430\u043f\u0440"\. "\u043c\u0430\u0439"\. "\u0438\u044e\u043d"\. "\u0438\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):242
              Entropy (8bit):4.8961185447535
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoVAgWFLoVY9X3vtfNrFLoVA9+3vW6Q9:4EnLzu8DFWFgaX3vtNS/3vWH9
              MD5:E719F47462123A8E7DABADD2D362B4D8
              SHA1:332E4CC96E7A01DA7FB399EA14770A5C5185B9F2
              SHA-256:AE5D3DF23F019455F3EDFC3262AAC2B00098881F09B9A934C0D26C0AB896700C
              SHA-512:93C19D51B633A118AB0D172C5A0991E5084BD54B2E61469D800F80B251A57BD1392BA66FD627586E75B1B075A7C9C2C667654F5783C423819FBDEA640A210BFA
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ru_UA DATE_FORMAT "%d.%m.%Y". ::msgcat::mcset ru_UA TIME_FORMAT "%k:%M:%S". ::msgcat::mcset ru_UA DATE_TIME_FORMAT "%d.%m.%Y %k:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1160
              Entropy (8bit):4.287536872407747
              Encrypted:false
              SSDEEP:24:4azu8YYy/FY+Cnwj4EbJK5O9g+tQhgQmy/L6GWGvtlMsvWT9:46al4ETw/rWQtVWh
              MD5:C7BBD44BD3C30C6116A15C77B15F8E79
              SHA1:37CD1477A3318838E8D5C93D596A23F99C8409F2
              SHA-256:00F119701C9F3EBA273701A6A731ADAFD7B8902F6BCCF34E61308984456E193A
              SHA-512:DAFBDA53CF6AD57A4F6A078E9EF8ED3CACF2F8809DC2AEFB812A4C3ACCD51D954C52079FA26828D670BF696E14989D3FE3C249F1E612B7C759770378919D8BBC
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sh DAYS_OF_WEEK_ABBREV [list \. "Ned"\. "Pon"\. "Uto"\. "Sre"\. "\u010cet"\. "Pet"\. "Sub"]. ::msgcat::mcset sh DAYS_OF_WEEK_FULL [list \. "Nedelja"\. "Ponedeljak"\. "Utorak"\. "Sreda"\. "\u010cetvrtak"\. "Petak"\. "Subota"]. ::msgcat::mcset sh MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Maj"\. "Jun"\. "Jul"\. "Avg"\. "Sep"\. "Okt"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset sh MONTHS_FULL [list \. "Januar"\. "Februar"\. "Mart"\. "April"\. "Maj"\. "Juni"\. "Juli"\. "Avgust"\. "Septembar"\. "Oktobar"\. "Novembar"\. "Decembar"\. ""]. ::msgcat::mcset sh BCE "p. n. e.". ::msgcat::mcset sh CE "n. e."
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1203
              Entropy (8bit):4.335103779497533
              Encrypted:false
              SSDEEP:24:4azu834j4PV3sSAT3fk3TEJbAT3T1cPyF3eYuCvte/v3eG:46TUG3sPk3TEkcPyFpuEtenJ
              MD5:B2EF88014D274C8001B36739F5F566CE
              SHA1:1044145C1714FD44D008B13A31BC778DFBE47950
              SHA-256:043DECE6EA7C83956B3300B95F8A0E92BADAA8FC29D6C510706649D1D810679A
              SHA-512:820EB42D94BEE21FDB990FC27F7900CF676AFC59520F3EE78FB72D6D7243A17A234D4AE964E5D52AD7CBC7DD9A593F672BAD8A80EC48B25B344AA6950EF52ECF
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sk DAYS_OF_WEEK_ABBREV [list \. "Ne"\. "Po"\. "Ut"\. "St"\. "\u0160t"\. "Pa"\. "So"]. ::msgcat::mcset sk DAYS_OF_WEEK_FULL [list \. "Nede\u013ee"\. "Pondelok"\. "Utorok"\. "Streda"\. "\u0160tvrtok"\. "Piatok"\. "Sobota"]. ::msgcat::mcset sk MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "m\u00e1j"\. "j\u00fan"\. "j\u00fal"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sk MONTHS_FULL [list \. "janu\u00e1r"\. "febru\u00e1r"\. "marec"\. "apr\u00edl"\. "m\u00e1j"\. "j\u00fan"\. "j\u00fal"\. "august"\. "september"\. "okt\u00f3ber"\. "november"\. "december"\. ""]. ::msgcat::mcset sk BCE
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1164
              Entropy (8bit):4.26110325084843
              Encrypted:false
              SSDEEP:24:4azu8PyUpd4+RfscasS9CErTByism1KSCvt1vJo6:462U/ENsqrTtVEtRx
              MD5:2566BDE28B17C526227634F1B4FC7047
              SHA1:BE6940EC9F4C5E228F043F9D46A42234A02F4A03
              SHA-256:BD488C9D791ABEDF698B66B768E2BF24251FFEAF06F53FB3746CAB457710FF77
              SHA-512:CC684BFC82CA55240C5B542F3F63E0FF43AEF958469B3978E414261BC4FADB50A0AE3554CF2468AC88E4DDB70D2258296C0A2FBB69312223EED56C7C03FEC17C
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sl DAYS_OF_WEEK_ABBREV [list \. "Ned"\. "Pon"\. "Tor"\. "Sre"\. "\u010cet"\. "Pet"\. "Sob"]. ::msgcat::mcset sl DAYS_OF_WEEK_FULL [list \. "Nedelja"\. "Ponedeljek"\. "Torek"\. "Sreda"\. "\u010cetrtek"\. "Petek"\. "Sobota"]. ::msgcat::mcset sl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "avg"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sl MONTHS_FULL [list \. "januar"\. "februar"\. "marec"\. "april"\. "maj"\. "junij"\. "julij"\. "avgust"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset sl BCE "pr.n.\u0161.". ::msgcat::mcset sl CE "p
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1267
              Entropy (8bit):4.339253133089184
              Encrypted:false
              SSDEEP:24:4azu82qJw7W5wO6jwbNU7FtHhoJCLov4v2:46iWrvGtBo6+O2
              MD5:931A009F7E8A376972DE22AD5670EC88
              SHA1:44AEF01F568250851099BAA8A536FBBACD3DEBBB
              SHA-256:CB27007E138315B064576C17931280CFE6E6929EFC3DAFD7171713D204CFC3BF
              SHA-512:47B230271CD362990C581CD6C06B0BCEA23E10E03D927C7C28415739DB3541D69D1B87DF554E9B4F00ECCAAB0F6AC0565F9EB0DEA8B75C54A90B2D53C928D379
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sq DAYS_OF_WEEK_ABBREV [list \. "Die"\. "H\u00ebn"\. "Mar"\. "M\u00ebr"\. "Enj"\. "Pre"\. "Sht"]. ::msgcat::mcset sq DAYS_OF_WEEK_FULL [list \. "e diel"\. "e h\u00ebn\u00eb"\. "e mart\u00eb"\. "e m\u00ebrkur\u00eb"\. "e enjte"\. "e premte"\. "e shtun\u00eb"]. ::msgcat::mcset sq MONTHS_ABBREV [list \. "Jan"\. "Shk"\. "Mar"\. "Pri"\. "Maj"\. "Qer"\. "Kor"\. "Gsh"\. "Sht"\. "Tet"\. "N\u00ebn"\. "Dhj"\. ""]. ::msgcat::mcset sq MONTHS_FULL [list \. "janar"\. "shkurt"\. "mars"\. "prill"\. "maj"\. "qershor"\. "korrik"\. "gusht"\. "shtator"\. "tetor"\. "n\u00ebntor"\. "dhjetor"\. ""]. ::msgcat::mcset sq BCE "p.e.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2035
              Entropy (8bit):4.24530896413441
              Encrypted:false
              SSDEEP:48:46qoQCSdQqQP4QSsIVKP10NupiuQxQaQLlKnM28nGtfR:hjIX15VKP6NmBU3YKnFbp
              MD5:5CA16D93718AAA813ADE746440CF5CE6
              SHA1:A142733052B87CA510B8945256399CE9F873794C
              SHA-256:313E8CDBBC0288AED922B9927A7331D0FAA2E451D4174B1F5B76C5C9FAEC8F9B
              SHA-512:4D031F9BA75D45EC89B2C74A870CCDA41587650D7F9BC91395F68B70BA3CD7A7105E70C19D139D20096533E06F5787C00EA850E27C4ADCF5A28572480D39B639
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sr DAYS_OF_WEEK_ABBREV [list \. "\u041d\u0435\u0434"\. "\u041f\u043e\u043d"\. "\u0423\u0442\u043e"\. "\u0421\u0440\u0435"\. "\u0427\u0435\u0442"\. "\u041f\u0435\u0442"\. "\u0421\u0443\u0431"]. ::msgcat::mcset sr DAYS_OF_WEEK_FULL [list \. "\u041d\u0435\u0434\u0435\u0459\u0430"\. "\u041f\u043e\u043d\u0435\u0434\u0435\u0459\u0430\u043a"\. "\u0423\u0442\u043e\u0440\u0430\u043a"\. "\u0421\u0440\u0435\u0434\u0430"\. "\u0427\u0435\u0442\u0432\u0440\u0442\u0430\u043a"\. "\u041f\u0435\u0442\u0430\u043a"\. "\u0421\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset sr MONTHS_ABBREV [list \. "\u0408\u0430\u043d"\. "\u0424\u0435\u0431"\. "\u041c\u0430\u0440"\. "\u0410\u043f\u0440"\. "\u041c\u0430\u0458"\. "\u0408\u0443\u043d"\. "\u0408\u0443\u043b"\.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1167
              Entropy (8bit):4.2825791311526515
              Encrypted:false
              SSDEEP:24:4azu8JLmAQVm/xTsS9CfxTlijQkcjKxFvivn:46hVQc/psJxT8kyhkn
              MD5:496D9183E2907199056CA236438498E1
              SHA1:D9C3BB4AEBD9BFD942593694E796A8C2FB9217B8
              SHA-256:4F32E1518BE3270F4DB80136FAC0031C385DD3CE133FAA534F141CF459C6113A
              SHA-512:FA7FDEDDC42C36D0A60688CDBFE9A2060FE6B2644458D1EBFC817F1E5D5879EB3E3C78B5E53E9D3F42E2E4D84C93C4A7377170986A437EFF404F310D1D72F135
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sv DAYS_OF_WEEK_ABBREV [list \. "s\u00f6"\. "m\u00e5"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f6"]. ::msgcat::mcset sv DAYS_OF_WEEK_FULL [list \. "s\u00f6ndag"\. "m\u00e5ndag"\. "tisdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f6rdag"]. ::msgcat::mcset sv MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sv MONTHS_FULL [list \. "januari"\. "februari"\. "mars"\. "april"\. "maj"\. "juni"\. "juli"\. "augusti"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset sv BCE "f.Kr.". ::msgcat::mcset sv C
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):991
              Entropy (8bit):4.024338627988864
              Encrypted:false
              SSDEEP:12:4EnLzu8r4mc4Go/4mtVfqRvodJ3fjESBToOqe3lHvFgdF6A3ixTZ6OM5mSYoC6Vy:4azu88kGDiq1qhbJ75V9gZSpgmSm9
              MD5:4DB24BA796D86ADF0441D2E75DE0C07E
              SHA1:9935B36FF2B1C6DFDE3EC375BC471A0E93D1F7E3
              SHA-256:6B5AB8AE265DB436B15D32263A8870EC55C7C0C07415B3F9BAAC37F73BC704E5
              SHA-512:BE7ED0559A73D01537A1E51941ED19F0FEC3F14F9527715CB119E89C97BD31CC6102934B0349D8D0554F5EDD9E3A02978F7DE4919C000A77BD353F7033A4A95B
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sw DAYS_OF_WEEK_ABBREV [list \. "Jpi"\. "Jtt"\. "Jnn"\. "Jtn"\. "Alh"\. "Iju"\. "Jmo"]. ::msgcat::mcset sw DAYS_OF_WEEK_FULL [list \. "Jumapili"\. "Jumatatu"\. "Jumanne"\. "Jumatano"\. "Alhamisi"\. "Ijumaa"\. "Jumamosi"]. ::msgcat::mcset sw MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Ago"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset sw MONTHS_FULL [list \. "Januari"\. "Februari"\. "Machi"\. "Aprili"\. "Mei"\. "Juni"\. "Julai"\. "Agosti"\. "Septemba"\. "Oktoba"\. "Novemba"\. "Desemba"\. ""]. ::msgcat::mcset sw BCE "KK". ::msgcat::mcset sw CE "BK".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1835
              Entropy (8bit):4.018233695396
              Encrypted:false
              SSDEEP:24:4azu83w0xn8dnzhmmlmYgtg+CKf6CO5ztFSLt8tCtGtv+CKf6CO5ztFSLt8tCtNu:46k0dgmmlmYgtE/t1H
              MD5:2D9C969318D1740049D28EBBD4F62C1D
              SHA1:121665081AFC33DDBCF679D7479BF0BC47FEF716
              SHA-256:30A142A48E57F194ECC3AA9243930F3E6E1B4E8B331A8CDD2705EC9C280DCCBB
              SHA-512:7C32907C39BFB89F558692535041B2A7FA18A64E072F5CF9AB95273F3AC5A7C480B4F953B13484A07AA4DA822613E27E78CC7B02ACE7A61E58FDB5507D7579C3
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ta DAYS_OF_WEEK_FULL [list \. "\u0b9e\u0bbe\u0baf\u0bbf\u0bb1\u0bc1"\. "\u0ba4\u0bbf\u0b99\u0bcd\u0b95\u0bb3\u0bcd"\. "\u0b9a\u0bc6\u0bb5\u0bcd\u0bb5\u0bbe\u0baf\u0bcd"\. "\u0baa\u0bc1\u0ba4\u0ba9\u0bcd"\. "\u0bb5\u0bbf\u0baf\u0bbe\u0bb4\u0ba9\u0bcd"\. "\u0bb5\u0bc6\u0bb3\u0bcd\u0bb3\u0bbf"\. "\u0b9a\u0ba9\u0bbf"]. ::msgcat::mcset ta MONTHS_ABBREV [list \. "\u0b9c\u0ba9\u0bb5\u0bb0\u0bbf"\. "\u0baa\u0bc6\u0baa\u0bcd\u0bb0\u0bb5\u0bb0\u0bbf"\. "\u0bae\u0bbe\u0bb0\u0bcd\u0b9a\u0bcd"\. "\u0b8f\u0baa\u0bcd\u0bb0\u0bb2\u0bcd"\. "\u0bae\u0bc7"\. "\u0b9c\u0bc2\u0ba9\u0bcd"\. "\u0b9c\u0bc2\u0bb2\u0bc8"\. "\u0b86\u0b95\u0bb8\u0bcd\u0b9f\u0bcd"\. "\u0b9a\u0bc6\u0baa\u0bcd\u0b9f\u0bae\u0bcd\u0baa\u0bb0\u0bcd"\. "\u0b85\u0b95\u0bcd\u0b9f\u0bcb\u0baa\u0bb0\u0bcd"\. "\u0ba8\u0bb
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):251
              Entropy (8bit):4.815592015875268
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmosDv+9/LosK3v6rZosDo+3v+6f6HK:4EnLzu8eDvWbK3v6r5DF3vmq
              MD5:293456B39BE945C55536A5DD894787F0
              SHA1:94DEF0056C7E3082E58266BCE436A61C045EA394
              SHA-256:AA57D5FB5CC3F59EC6A3F99D7A5184403809AA3A3BC02ED0842507D4218B683D
              SHA-512:AB763F2932F2FF48AC18C8715F661F7405607E1818B53E0D0F32184ABE67714F03A39A9D0637D0D93CE43606C3E1D702D2A3F8660C288F61DFE852747B652B59
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ta_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset ta_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset ta_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2102
              Entropy (8bit):4.034298184367717
              Encrypted:false
              SSDEEP:48:46x9mcib30Rgu1je5YdnULEP8l1je5YdnULEPt:hnIb39ufbufV
              MD5:0B9B124076C52A503A906059F7446077
              SHA1:F43A0F6CCBDDBDD5EA140C7FA55E9A82AB910A03
              SHA-256:42C34D02A6079C4D0D683750B3809F345637BC6D814652C3FB0B344B66B70C79
              SHA-512:234B9ACA1823D1D6B82583727B4EA68C014D59916B410CB9B158FA1954B6FC3767A261BD0B9F592AF0663906ADF11C2C9A3CC0A325CB1FF58F42A884AF7CB015
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset te DAYS_OF_WEEK_ABBREV [list \. "\u0c06\u0c26\u0c3f"\. "\u0c38\u0c4b\u0c2e"\. "\u0c2e\u0c02\u0c17\u0c33"\. "\u0c2c\u0c41\u0c27"\. "\u0c17\u0c41\u0c30\u0c41"\. "\u0c36\u0c41\u0c15\u0c4d\u0c30"\. "\u0c36\u0c28\u0c3f"]. ::msgcat::mcset te DAYS_OF_WEEK_FULL [list \. "\u0c06\u0c26\u0c3f\u0c35\u0c3e\u0c30\u0c02"\. "\u0c38\u0c4b\u0c2e\u0c35\u0c3e\u0c30\u0c02"\. "\u0c2e\u0c02\u0c17\u0c33\u0c35\u0c3e\u0c30\u0c02"\. "\u0c2c\u0c41\u0c27\u0c35\u0c3e\u0c30\u0c02"\. "\u0c17\u0c41\u0c30\u0c41\u0c35\u0c3e\u0c30\u0c02"\. "\u0c36\u0c41\u0c15\u0c4d\u0c30\u0c35\u0c3e\u0c30\u0c02"\. "\u0c36\u0c28\u0c3f\u0c35\u0c3e\u0c30\u0c02"]. ::msgcat::mcset te MONTHS_ABBREV [list \. "\u0c1c\u0c28\u0c35\u0c30\u0c3f"\. "\u0c2b\u0c3f\u0c2c\u0c4d\u0c30\u0c35\u0c30\u0c3f"\. "\u0c2e\u0c3e\u0c30\u0c4d\u0c1a\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):411
              Entropy (8bit):5.01781242466238
              Encrypted:false
              SSDEEP:12:4EnLzu8CjZWsn0sEjoD0sLvUFS3v6r5F3vMq:4azu84Z1nnEjoDnLvUFEvS5NvMq
              MD5:443E34E2E2BC7CB64A8BA52D99D6B4B6
              SHA1:D323C03747FE68E9B73F7E5C1E10B168A40F2A2F
              SHA-256:88BDAF4B25B684B0320A2E11D3FE77DDDD25E3B17141BD7ED1D63698C480E4BA
              SHA-512:5D8B267530EC1480BF3D571AABC2DA7B4101EACD7FB03B49049709E39D665DD7ACB66FD785BA2B5203DDC54C520434219D2D9974A1E9EE74C659FFAEA6B694E0
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset te_IN AM "\u0c2a\u0c42\u0c30\u0c4d\u0c35\u0c3e\u0c39\u0c4d\u0c28". ::msgcat::mcset te_IN PM "\u0c05\u0c2a\u0c30\u0c3e\u0c39\u0c4d\u0c28". ::msgcat::mcset te_IN DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset te_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset te_IN DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2305
              Entropy (8bit):4.324407451316591
              Encrypted:false
              SSDEEP:48:46P4QX/wQT0H/u3rPc8JD57XWWND8QM70xJi53Ljtef:hQ556rVDWZcLOO
              MD5:D145F9DF0E339A2538662BD752F02E16
              SHA1:AFD97F8E8CC14D306DEDD78F8F395738E38A8569
              SHA-256:F9641A6EBE3845CE5D36CED473749F5909C90C52E405F074A6DA817EF6F39867
              SHA-512:E17925057560462F730CF8288856E46FA1F1D2A10B5D4D343257B7687A3855014D5C65B6C85AC55A7C77B8B355DB19F053C74B91DFA7BE7E9F933D9D4DA117F7
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset th DAYS_OF_WEEK_ABBREV [list \. "\u0e2d\u0e32."\. "\u0e08."\. "\u0e2d."\. "\u0e1e."\. "\u0e1e\u0e24."\. "\u0e28."\. "\u0e2a."]. ::msgcat::mcset th DAYS_OF_WEEK_FULL [list \. "\u0e27\u0e31\u0e19\u0e2d\u0e32\u0e17\u0e34\u0e15\u0e22\u0e4c"\. "\u0e27\u0e31\u0e19\u0e08\u0e31\u0e19\u0e17\u0e23\u0e4c"\. "\u0e27\u0e31\u0e19\u0e2d\u0e31\u0e07\u0e04\u0e32\u0e23"\. "\u0e27\u0e31\u0e19\u0e1e\u0e38\u0e18"\. "\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e1a\u0e14\u0e35"\. "\u0e27\u0e31\u0e19\u0e28\u0e38\u0e01\u0e23\u0e4c"\. "\u0e27\u0e31\u0e19\u0e40\u0e2a\u0e32\u0e23\u0e4c"]. ::msgcat::mcset th MONTHS_ABBREV [list \. "\u0e21.\u0e04."\. "\u0e01.\u0e1e."\. "\u0e21\u0e35.\u0e04."\. "\u0e40\u0e21.\u0e22."\. "\u0e1e.\u0e04."\. "\u0e21\u0e34.\u0e22."\. "\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1133
              Entropy (8bit):4.32041719596907
              Encrypted:false
              SSDEEP:24:4azu80VAFVsNTib5vk5CfYTnGk65GmogWFLNvoKvWI3:46j8NTgwVTnlSJWFLJvWI3
              MD5:3AFAD9AD82A9C8B754E2FE8FC0094BAB
              SHA1:4EE3E2DF86612DB314F8D3E7214D7BE241AA1A32
              SHA-256:DF7C4BA67457CB47EEF0F5CA8E028FF466ACDD877A487697DC48ECAC7347AC47
              SHA-512:79A6738A97B7DB9CA4AE9A3BA1C3E56BE9AC67E71AE12154FD37A37D78892B6414A49E10E007DE2EB314942DC017B87FAB7C64B74EC9B889DAEBFF9B3B78E644
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset tr DAYS_OF_WEEK_ABBREV [list \. "Paz"\. "Pzt"\. "Sal"\. "\u00c7ar"\. "Per"\. "Cum"\. "Cmt"]. ::msgcat::mcset tr DAYS_OF_WEEK_FULL [list \. "Pazar"\. "Pazartesi"\. "Sal\u0131"\. "\u00c7ar\u015famba"\. "Per\u015fembe"\. "Cuma"\. "Cumartesi"]. ::msgcat::mcset tr MONTHS_ABBREV [list \. "Oca"\. "\u015eub"\. "Mar"\. "Nis"\. "May"\. "Haz"\. "Tem"\. "A\u011fu"\. "Eyl"\. "Eki"\. "Kas"\. "Ara"\. ""]. ::msgcat::mcset tr MONTHS_FULL [list \. "Ocak"\. "\u015eubat"\. "Mart"\. "Nisan"\. "May\u0131s"\. "Haziran"\. "Temmuz"\. "A\u011fustos"\. "Eyl\u00fcl"\. "Ekim"\. "Kas\u0131m"\. "Aral\u0131k"\. ""]. ::msgcat::mcset tr D
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2113
              Entropy (8bit):4.227105489438195
              Encrypted:false
              SSDEEP:48:46+ytFoQAQPHUKPo6eQ4QBuQ0WbQcJeyFQDWZlQD1QbS7XQn1Q7mDaSAJQ7GMLzM:hIpP5tzYhTUhAgEAE+
              MD5:458A38F894B296C83F85A53A92FF8520
              SHA1:CE26187875E334C712FDAB73E6B526247C6FE1CF
              SHA-256:CF2E78EF3322F0121E958098EF5F92DA008344657A73439EAC658CB6BF3D72BD
              SHA-512:3B8730C331CF29EF9DEDBC9D5A53C50D429931B8DA01EE0C20DAE25B995114966DB9BC576BE0696DEC088DB1D88B50DE2C376275AB5251F49F6544E546BBC531
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset uk DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0434"\. "\u043f\u043d"\. "\u0432\u0442"\. "\u0441\u0440"\. "\u0447\u0442"\. "\u043f\u0442"\. "\u0441\u0431"]. ::msgcat::mcset uk DAYS_OF_WEEK_FULL [list \. "\u043d\u0435\u0434\u0456\u043b\u044f"\. "\u043f\u043e\u043d\u0435\u0434\u0456\u043b\u043e\u043a"\. "\u0432\u0456\u0432\u0442\u043e\u0440\u043e\u043a"\. "\u0441\u0435\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0435\u0440"\. "\u043f'\u044f\u0442\u043d\u0438\u0446\u044f"\. "\u0441\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset uk MONTHS_ABBREV [list \. "\u0441\u0456\u0447"\. "\u043b\u044e\u0442"\. "\u0431\u0435\u0440"\. "\u043a\u0432\u0456\u0442"\. "\u0442\u0440\u0430\u0432"\. "\u0447\u0435\u0440\u0432"\. "\u043b\u0438\u043f"\. "\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1421
              Entropy (8bit):4.382223858419589
              Encrypted:false
              SSDEEP:24:4azu8pNu9UT5xDHy2W82yGWnf/oxHFBSWWS1D/avSv16:46Oixzy2IyhwZ17cU16
              MD5:3BD0AB95976D1B80A30547E4B23FD595
              SHA1:B3E5DC095973E46D8808326B2A1FC45046B5267F
              SHA-256:9C69094C0BD52D5AE8448431574EAE8EE4BE31EC2E8602366DF6C6BF4BC89A58
              SHA-512:2A68A7ADC385EDEA02E4558884A24DCC6328CC9F7D459CC03CC9F2D2F58CF6FF2103AD5B45C6D05B7E13F28408C6B05CDDF1DF60E822E5095F86A49052E19E59
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset vi DAYS_OF_WEEK_ABBREV [list \. "Th 2"\. "Th 3"\. "Th 4"\. "Th 5"\. "Th 6"\. "Th 7"\. "CN"]. ::msgcat::mcset vi DAYS_OF_WEEK_FULL [list \. "Th\u01b0\u0301 hai"\. "Th\u01b0\u0301 ba"\. "Th\u01b0\u0301 t\u01b0"\. "Th\u01b0\u0301 n\u0103m"\. "Th\u01b0\u0301 s\u00e1u"\. "Th\u01b0\u0301 ba\u0309y"\. "Chu\u0309 nh\u00e2\u0323t"]. ::msgcat::mcset vi MONTHS_ABBREV [list \. "Thg 1"\. "Thg 2"\. "Thg 3"\. "Thg 4"\. "Thg 5"\. "Thg 6"\. "Thg 7"\. "Thg 8"\. "Thg 9"\. "Thg 10"\. "Thg 11"\. "Thg 12"\. ""]. ::msgcat::mcset vi MONTHS_FULL [list \. "Th\u00e1ng m\u00f4\u0323t"\. "Th\u00e1ng hai"\. "Th\u00e1ng ba"\. "Th\u00e1ng t\u01b0"\. "Th\u00e1ng n\u0103m"\. "Th\u00e1ng s\
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3330
              Entropy (8bit):4.469203967086526
              Encrypted:false
              SSDEEP:48:468jDI/Tw71xDqwPqDa8c3FLbYmhyvMDKbW0YGLuoEyzag29dL:hn7wRdNL
              MD5:9C33FFDD4C13D2357AB595EC3BA70F04
              SHA1:A87F20F7A331DEFC33496ECDA50D855C8396E040
              SHA-256:EF81B41EC69F67A394ECE2B3983B67B3D0C8813624C2BFA1D8A8C15B21608AC9
              SHA-512:E31EEE90660236BCD958F3C540F56B2583290BAD6086AE78198A0819A92CF2394C62DE3800FDDD466A8068F4CABDFBCA46A648D419B1D0103381BF428D721B13
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh DAYS_OF_WEEK_ABBREV [list \. "\u661f\u671f\u65e5"\. "\u661f\u671f\u4e00"\. "\u661f\u671f\u4e8c"\. "\u661f\u671f\u4e09"\. "\u661f\u671f\u56db"\. "\u661f\u671f\u4e94"\. "\u661f\u671f\u516d"]. ::msgcat::mcset zh DAYS_OF_WEEK_FULL [list \. "\u661f\u671f\u65e5"\. "\u661f\u671f\u4e00"\. "\u661f\u671f\u4e8c"\. "\u661f\u671f\u4e09"\. "\u661f\u671f\u56db"\. "\u661f\u671f\u4e94"\. "\u661f\u671f\u516d"]. ::msgcat::mcset zh MONTHS_ABBREV [list \. "\u4e00\u6708"\. "\u4e8c\u6708"\. "\u4e09\u6708"\. "\u56db\u6708"\. "\u4e94\u6708"\. "\u516d\u6708"\. "\u4e03\u6708"\. "\u516b\u6708"\. "\u4e5d\u6708"\. "\u5341\u6708"\. "\u5341\u4e00\u6708"\. "\u5341\u4e8c\u6708"\. ""]. ::msgcat::mcset zh MONTHS_FULL [list \.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):312
              Entropy (8bit):5.1281364096481665
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoX5HoHJ+3vtfNrFLoHJ+3v6MY+oXa+3vYq9:4EnLzu8d5eJ+3vtNEJ+3v6L1L3vYq9
              MD5:EB94B41551EAAFFA5DF4F406C7ACA3A4
              SHA1:B0553108BDE43AA7ED362E2BFFAF1ABCA1567491
              SHA-256:85F91CF6E316774AA5D0C1ECA85C88E591FD537165BB79929C5E6A1CA99E56C8
              SHA-512:A0980A6F1AD9236647E4F18CC104999DB2C523153E8716FD0CFE57320E906DF80378A5C0CDE132F2C53F160F5304EAF34910D7D1BB5753987D74AFBC0B6F75F3
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_CN DATE_FORMAT "%Y-%m-%e". ::msgcat::mcset zh_CN TIME_FORMAT "%k:%M:%S". ::msgcat::mcset zh_CN TIME_FORMAT_12 "%P%I\u65f6%M\u5206%S\u79d2". ::msgcat::mcset zh_CN DATE_TIME_FORMAT "%Y-%m-%e %k:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):752
              Entropy (8bit):4.660158381384211
              Encrypted:false
              SSDEEP:12:4EnLzu8qmDBHZLX+TyW4OU5yPgM9Lz+SC3WwLNMW3v6G3v3Ww+:4azu8qyFOw3WwLrvTv3Ww+
              MD5:D8C6BFBFCE44B6A8A038BA44CB3DB550
              SHA1:FBD609576E65B56EDA67FD8A1801A27B43DB5486
              SHA-256:D123E0B4C2614F680808B58CCA0C140BA187494B2C8BCF8C604C7EB739C70882
              SHA-512:3455145CF5C77FC847909AB1A283452D0C877158616C8AA7BDFFC141B86B2E66F9FF45C3BB6A4A9D758D2F8FFCB1FE919477C4553EFE527C0EDC912EBBCAABCD
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_HK DAYS_OF_WEEK_ABBREV [list \. "\u65e5"\. "\u4e00"\. "\u4e8c"\. "\u4e09"\. "\u56db"\. "\u4e94"\. "\u516d"]. ::msgcat::mcset zh_HK MONTHS_ABBREV [list \. "1\u6708"\. "2\u6708"\. "3\u6708"\. "4\u6708"\. "5\u6708"\. "6\u6708"\. "7\u6708"\. "8\u6708"\. "9\u6708"\. "10\u6708"\. "11\u6708"\. "12\u6708"\. ""]. ::msgcat::mcset zh_HK DATE_FORMAT "%Y\u5e74%m\u6708%e\u65e5". ::msgcat::mcset zh_HK TIME_FORMAT_12 "%P%I:%M:%S". ::msgcat::mcset zh_HK DATE_TIME_FORMAT "%Y\u5e74%m\u6708%e\u65e5 %P%I:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):339
              Entropy (8bit):5.020358587042703
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoOpxoPpSocvNLohX3v6ZhLoh+3v6fJ:4EnLzu8WvNo3v6b3vu
              MD5:E0BC93B8F050D6D80B8173FF4FA4D7B7
              SHA1:231FF1B6F859D0261F15D2422DF09E756CE50CCB
              SHA-256:2683517766AF9DA0D87B7A862DE9ADEA82D9A1454FC773A9E3C1A6D92ABA947A
              SHA-512:8BA6EAC5F71167B83A58B47123ACF7939C348FE2A0CA2F092FE9F60C0CCFB901ADA0E8F2101C282C39BAE86C918390985731A8F66E481F8074732C37CD50727F
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_SG AM "\u4e0a\u5348". ::msgcat::mcset zh_SG PM "\u4e2d\u5348". ::msgcat::mcset zh_SG DATE_FORMAT "%d %B %Y". ::msgcat::mcset zh_SG TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset zh_SG DATE_TIME_FORMAT "%d %B %Y %P %I:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):346
              Entropy (8bit):5.08314435797197
              Encrypted:false
              SSDEEP:6:SlSyEtJLlpuoo6dmoAykaRULH/XRxvBoAyjZRULH5oAyU/G0OZoAyxW3v6ZhLoAR:4EnLzu8I5xEOKRWW3v6w3v8AC
              MD5:9CD17E7F28186E0E71932CC241D1CBB1
              SHA1:AF1EE536AABB8198BA88D3474ED49F76A37E89FF
              SHA-256:D582406C51A3DB1EADF6507C50A1F85740FDA7DA8E27FC1438FEB6242900CB12
              SHA-512:4712DD6A27A09EA339615FC3D17BC8E4CD64FF12B2B8012E01FD4D3E7789263899FA05EDDB77044DC7B7D32B3DC55A52B8320D93499DF9A6799A8E4D07174525
              Malicious:false
              Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_TW BCE "\u6c11\u570b\u524d". ::msgcat::mcset zh_TW CE "\u6c11\u570b". ::msgcat::mcset zh_TW DATE_FORMAT "%Y/%m/%e". ::msgcat::mcset zh_TW TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset zh_TW DATE_TIME_FORMAT "%Y/%m/%e %P %I:%M:%S %z".}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):32718
              Entropy (8bit):4.5415166585248645
              Encrypted:false
              SSDEEP:768:UczgW5gzrui4sKDt9C7sGbHMmjJbuQH8A2Q:VgTrrvf7sGbHDFSQH8/Q
              MD5:1A7DF33BC47D63F9CE1D4FF70A974FA3
              SHA1:513EC2215E2124D9A6F6DF2549C1442109E117C0
              SHA-256:C5D74E1C927540A3F524E6B929D0956EFBA0797FB8D55918EF69D27DF57DEDA3
              SHA-512:F671D5A46382EDFBDA49A6EDB9E6CF2D5CEBD83CE4ADD6B717A478D52748332D41DA3743182D4555B801B96A318D29DFC6AC36B32983ADB32D329C24F8A3D713
              Malicious:false
              Preview:# optparse.tcl --.#.# (private) Option parsing package.# Primarily used internally by the safe:: code..#.#.WARNING: This code will go away in a future release.#.of Tcl. It is NOT supported and you should not rely.#.on it. If your code does rely on this package you.#.may directly incorporate this code into your application...package require Tcl 8.2.# When this version number changes, update the pkgIndex.tcl file.# and the install directory in the Makefiles..package provide opt 0.4.6..namespace eval ::tcl {.. # Exported APIs. namespace export OptKeyRegister OptKeyDelete OptKeyError OptKeyParse \. OptProc OptProcArgGiven OptParse \.. Lempty Lget \. Lassign Lvarpop Lvarpop1 Lvarset Lvarincr \. SetMax SetMin...################# Example of use / 'user documentation' ###################.. proc OptCreateTestProc {} {...# Defines ::tcl::OptParseTest as a test proc with parsed arguments..# (can't be defined before the code below is
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):607
              Entropy (8bit):4.652658850873767
              Encrypted:false
              SSDEEP:12:jHxJRuMopS42wyGlTajUA43KXks4L1GbyvX6VxQ+pBbX:bvRmS42wyGlTah9XkbL7X6VxBB
              MD5:92FF1E42CFC5FECCE95068FC38D995B3
              SHA1:B2E71842F14D5422A9093115D52F19BCCA1BF881
              SHA-256:EB9925A8F0FCC7C2A1113968AB0537180E10C9187B139C8371ADF821C7B56718
              SHA-512:608D436395D055C5449A53208F3869B8793DF267B8476AD31BCDD9659A222797814832720C495D938E34BF7D253FFC3F01A73CC0399C0DFB9C85D2789C7F11C0
              Malicious:false
              Preview:# Tcl package index file, version 1.1.# This file is generated by the "pkg_mkIndex -direct" command.# and sourced either when an application starts up or.# by a "package unknown" script. It invokes the.# "package ifneeded" command to set up package-related.# information so that packages will be loaded automatically.# in response to "package require" commands. When this.# script is sourced, the variable $dir must contain the.# full path name of this file's directory...if {![package vsatisfies [package provide Tcl] 8.2]} {return}.package ifneeded opt 0.4.6 [list source [file join $dir optparse.tcl]].
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):22959
              Entropy (8bit):4.836555290409911
              Encrypted:false
              SSDEEP:384:I72oQXm9jcLyBLWueSzvAXMiow90l3NhETrh4NLTluYhoNL3ZAqYi:I72oQXmgyBCqvAcFw2dhOrh4NZVhoN3F
              MD5:55E2DB5DCF8D49F8CD5B7D64FEA640C7
              SHA1:8FDC28822B0CC08FA3569A14A8C96EDCA03BFBBD
              SHA-256:47B6AF117199B1511F6103EC966A58E2FD41F0ABA775C44692B2069F6ED10BAD
              SHA-512:824C210106DE7EAE57A480E3F6E3A5C8FB8AC4BBF0A0A386D576D3EB2A3AC849BDFE638428184056DA9E81767E2B63EFF8E18068A1CF5149C9F8A018F817D3E5
              Malicious:false
              Preview:# package.tcl --.#.# utility procs formerly in init.tcl which can be loaded on demand.# for package management..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval tcl::Pkg {}..# ::tcl::Pkg::CompareExtension --.#.# Used internally by pkg_mkIndex to compare the extension of a file to a given.# extension. On Windows, it uses a case-insensitive comparison because the.# file system can be file insensitive..#.# Arguments:.# fileName.name of a file whose extension is compared.# ext..(optional) The extension to compare against; you must.#..provide the starting dot..#..Defaults to [info sharedlibextension].#.# Results:.# Returns 1 if the extension matches, 0 otherwise..proc tcl::Pkg::CompareExtension {fileName {ext {}}} {. global tcl_platform. if {$ext eq ""} {set ext
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):816
              Entropy (8bit):4.833285375693491
              Encrypted:false
              SSDEEP:12:TcS2n1RBbgZKaNHaeYFSxYmXqt9IGUafZwXgEImK7k35IpbdELS8/McjbPgnE:TcHn5sZKGkwa/JxfJmRGNc93j7CE
              MD5:FCDAF75995F2CCE0A5D5943E9585590D
              SHA1:A0B1BD4E68DCE1768D3C5E0D3C7B31E28021D3BA
              SHA-256:EBE5A2B4CBBCD7FD3F7A6F76D68D7856301DB01B350C040942A7B806A46E0014
              SHA-512:A632D0169EE3B6E6B7EF73F5FBA4B7897F9491BDB389D78165E297252424546EFB43895D3DD530864B9FCF2ECF5BCE7DA8E55BA5B4F20E23E1E45ADDAF941C11
              Malicious:false
              Preview:# parray:.# Print the contents of a global array on stdout..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..proc parray {a {pattern *}} {. upvar 1 $a array. if {![array exists array]} {..return -code error "\"$a\" isn't an array". }. set maxl 0. set names [lsort [array names array $pattern]]. foreach name $names {..if {[string length $name] > $maxl} {.. set maxl [string length $name]..}. }. set maxl [expr {$maxl + [string length $a] + 2}]. foreach name $names {..set nameString [format %s(%s) $a $name]..puts stdout [format "%-*s = %s" $maxl $nameString $array($name)]. }.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):33439
              Entropy (8bit):4.750571844372246
              Encrypted:false
              SSDEEP:768:OovFcXxzYqZ1//L2J4lb77BvnthiV0EnoQI4MnNhGQmzY3wKIYkA:OovFcqqZF2J4lb7Rrg0EnoQI4INhGrzu
              MD5:325A573F30C9EA70FD891E85664E662C
              SHA1:6EC3F21EBCFD269847C43891DAD96189FACF20E4
              SHA-256:89B74D2417EB27FEEA32B8666B08D28BC1FFE5DCF1652DBD8799F7555D79C71F
              SHA-512:149FE725A3234A2F8C3EE1B03119440E3CB16586F04451B6E62CED0097B1AD227C97B55F5A66631033A888E860AB61CAF7DDD014696276BC9226D87F15164E2F
              Malicious:false
              Preview:# safe.tcl --.#.# This file provide a safe loading/sourcing mechanism for safe interpreters..# It implements a virtual path mecanism to hide the real pathnames from the.# slave. It runs in a master interpreter and sets up data structure and.# aliases that will be invoked when used from a slave interpreter..#.# See the safe.n man page for details..#.# Copyright (c) 1996-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...#.# The implementation is based on namespaces. These naming conventions are.# followed:.# Private procs starts with uppercase..# Public procs are exported and starts with lowercase.#..# Needed utilities package.package require opt 0.4.1..# Create the safe namespace.namespace eval ::safe {. # Exported API:. namespace export interpCreate interpInit interpConfigure interpDelete \..interpAddToAccessPath interpFindInAccessPath setLogCmd.}..# Helper function to
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5415
              Entropy (8bit):4.701682771925196
              Encrypted:false
              SSDEEP:96:esataNULULUVUhU5U1UIUZUJeUpgURUFD15Q0AkU6PkrBkGUjZKspDzmK5SMFTub:eNtEACkiwM3g4ePOiD15Q0AkU6PkrBko
              MD5:E127196E9174B429CC09C040158F6AAB
              SHA1:FF850F5D1BD8EFC1A8CB765FE8221330F0C6C699
              SHA-256:ABF7D9D1E86DE931096C21820BFA4FD70DB1F55005D2DB4AA674D86200867806
              SHA-512:C4B98EBC65E25DF41E6B9A93E16E608CF309FA0AE712578EE4974D84F7F33BCF2A6ED7626E88A343350E13DA0C5C1A88E24A87FCBD44F7DA5983BB3EF036A162
              Malicious:false
              Preview:# Tcl autoload index file, version 2.0.# -*- tcl -*-.# This file is generated by the "auto_mkindex" command.# and sourced to set up indexing information for one or.# more commands. Typically each line is a command that.# sets an element in the auto_index array, where the.# element name is the name of a command and the value is.# a script that loads the command...set auto_index(auto_reset) [list source [file join $dir auto.tcl]].set auto_index(tcl_findLibrary) [list source [file join $dir auto.tcl]].set auto_index(auto_mkindex) [list source [file join $dir auto.tcl]].set auto_index(auto_mkindex_old) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::init) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::cleanup) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::mkindex) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::hook) [list source [file join $dir auto.tcl]].set auto_in
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11633
              Entropy (8bit):4.706526847377957
              Encrypted:false
              SSDEEP:192:CnjVD6gOGFpvXKPrzYkWo55z3ovPvKvaWZPZ9W6TV9ujpZw7K3mQ4auPltqQvu9:CGQvX+XYkn59YvPSvDJTV9174zuPltBC
              MD5:F9ED2096EEA0F998C6701DB8309F95A6
              SHA1:BCDB4F7E3DB3E2D78D25ED4E9231297465B45DB8
              SHA-256:6437BD7040206D3F2DB734FA482B6E79C68BCC950FBA80C544C7F390BA158F9B
              SHA-512:E4FB8F28DC72EA913F79CEDF5776788A0310608236D6607ADC441E7F3036D589FD2B31C446C187EF5827FD37DCAA26D9E94D802513E3BF3300E94DD939695B30
              Malicious:false
              Preview:# -*- tcl -*-.#.# Searching for Tcl Modules. Defines a procedure, declares it as the primary.# command for finding packages, however also uses the former 'package unknown'.# command as a fallback..#.# Locates all possible packages in a directory via a less restricted glob. The.# targeted directory is derived from the name of the requested package, i.e..# the TM scan will look only at directories which can contain the requested.# package. It will register all packages it found in the directory so that.# future requests have a higher chance of being fulfilled by the ifneeded.# database without having to come to us again..#.# We do not remember where we have been and simply rescan targeted directories.# when invoked again. The reasoning is this:.#.# - The only way we get back to the same directory is if someone is trying to.# [package require] something that wasn't there on the first scan..#.# Either.# 1) It is there now: If we rescan, you get it; if not you don't..#.# This co
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):141
              Entropy (8bit):4.951583909886815
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52DcsG/kXGm2OHnFvpsYvUdSalHFLd:SlSWB9X52DBGTm2OHnFvmYValHf
              MD5:6FB79707FD3A183F8A3C780CA2669D27
              SHA1:E703AB552B4231827ACD7872364C36C70988E4C0
              SHA-256:A5DC7BFB4F569361D438C8CF13A146CC2641A1A884ACF905BB51DA28FF29A900
              SHA-512:CDD3AD9AFFD246F4DFC40C1699E368FB2924E73928060B1178D298DCDB11DBD0E88BC10ED2FED265F7F7271AC5CCE14A60D65205084E9249154B8D54C2309E52
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Abidjan) {. {-9223372036854775808 -968 0 LMT}. {-1830383032 0 0 GMT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1393
              Entropy (8bit):3.9087586646312253
              Encrypted:false
              SSDEEP:12:MBp52DUsmdHvdDZxdCjFaEu3MEANKSgI3u2VuTSr0l+pU4Y4Y0gK:cQ9elDZxdCwEu3MEANKSgsrVkvY64Y4
              MD5:FFEDB06126D6DA9F3BECA614428F51E9
              SHA1:2C549D1CF8636541D42BDC56D8E534A222E4642C
              SHA-256:567A0AD3D2C9E356A2E38A76AF4D5C4B8D5B950AF7B648A027FE816ACAE455AE
              SHA-512:E057EA59A47C881C60B2196554C9B24C00CB26345CA7E311B5409F6FBB31EBEDD13C41A4C3B0B68AE8B93F4819158D94610DE795112E77209F391AC31332BA2A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Accra) {. {-9223372036854775808 -52 0 LMT}. {-1640995148 0 0 GMT}. {-1556841600 1200 1 GMT}. {-1546388400 0 0 GMT}. {-1525305600 1200 1 GMT}. {-1514852400 0 0 GMT}. {-1493769600 1200 1 GMT}. {-1483316400 0 0 GMT}. {-1462233600 1200 1 GMT}. {-1451780400 0 0 GMT}. {-1430611200 1200 1 GMT}. {-1420158000 0 0 GMT}. {-1399075200 1200 1 GMT}. {-1388622000 0 0 GMT}. {-1367539200 1200 1 GMT}. {-1357086000 0 0 GMT}. {-1336003200 1200 1 GMT}. {-1325550000 0 0 GMT}. {-1304380800 1200 1 GMT}. {-1293927600 0 0 GMT}. {-1272844800 1200 1 GMT}. {-1262391600 0 0 GMT}. {-1241308800 1200 1 GMT}. {-1230855600 0 0 GMT}. {-1209772800 1200 1 GMT}. {-1199319600 0 0 GMT}. {-1178150400 1200 1 GMT}. {-1167697200 0 0 GMT}. {-1146614400 1200 1 GMT}. {-1136161200 0 0 GMT}. {-1115078400 1200 1 GMT}. {-1104625200 0 0 GMT}. {-1083542400 1200 1 GMT}. {-1073
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.766991307890532
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DczqIVDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DnaDkr
              MD5:C203A97FC500E408AC841A6A5B21E14E
              SHA1:ED4C4AA578A16EB83220F37199460BFE207D2B44
              SHA-256:3EBC66964609493524809AD0A730FFFF036C38D9AB3770412841F80DFFC717D5
              SHA-512:2F1A4500F49AFD013BCA70089B1E24748D7E45D41F2C9D3D9AFDCC1778E750FFB020D34F622B071E80F80CC0FEFF080E8ACC1E7A8ABE8AD12C0F1A1DAA937FE5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Addis_Ababa) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1041
              Entropy (8bit):4.110061823095588
              Encrypted:false
              SSDEEP:12:MBp52D7AmdHh5PMybVSqSFvvqXFaLSaSxmvWo/fmvCkQ6eW6Xs8QQB1r5Q:cQIefMyb8BF6XFaLSxktf1PW6X4q1K
              MD5:8221A83520B1D3DE02E886CFB1948DE3
              SHA1:0806A0898FDE6F5AE502C64515A1345D71B1F7D2
              SHA-256:5EE3B25676E813D89ED866D03B5C3388567D8307A2A60D1C4A34D938CBADF710
              SHA-512:2B8A837F7CF6DE43DF4072BF4A54226235DA8B8CA78EF55649C7BF133B2E002C614FE7C693004E3B17C25FBCECAAD5CD9B0A8CB0A5D32ADF68EA019203EE8704
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Algiers) {. {-9223372036854775808 732 0 LMT}. {-2486679072 561 0 PMT}. {-1855958961 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1531443600 0 0 WET}. {-956365200 3600 1 WEST}. {-950486400 0 0 WET}. {-942012000 3600 0 CET}. {-812502000 7200 1 CEST}. {-796262400 3600 0 CET}. {-781052400 7200 1 CEST}. {-766630800 3600 0 CET}. {-733280400 0 0 WET}. {-439430400 3600 0 CET}. {-212029200 0 0 WET}. {41468400 3600 1 WEST}. {54774000 0 0 WET}. {231724800 3600 1 WEST}. {246240000 3600 0 CET}. {259545600 7200 1 CEST}. {275274000 3600 0 CET}. {309740400 0 0 WET}. {325468800 3600 1 WEST}. {3418020
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.750118730136804
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcjEUEH+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DGs+Dkr
              MD5:F8CEC826666174899C038EC9869576ED
              SHA1:4CAA32BB070F31BE919F5A03141711DB22072E2C
              SHA-256:D9C940B3BE2F9E424BC6F69D665C21FBCA7F33789E1FE1D27312C0B38B75E097
              SHA-512:DA890F5A6806AE6774CFC061DFD4AE069F78212AB063287146245692383022AABB3637DEB49C1D512DA3499DC4295541962DAC05729302B3314E7BF306E6CB41
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Asmara) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.755468133981916
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcjAWDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2D8Dkr
              MD5:8B5DCBBDB2309381EAA8488E1551655F
              SHA1:65065868620113F759C5D37B89843A334E64D210
              SHA-256:F7C8CEE9FA2A4BF9F41ABA18010236AC4CCD914ACCA9E568C87EDA0503D54014
              SHA-512:B8E61E6D5057CD75D178B292CD19CBCED2A127099D95046A7448438BCC035DE4066FDD637E9055AC3914E4A8EAA1B0123FA0E90E4F7042B2C4551BB009F1D2E9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Asmera) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.83500517532947
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcxAQDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DwNDBP
              MD5:FCBE668127DFD81CB0F730C878EB2F1A
              SHA1:F27C9D96A04A12AC7423A60A756732B360D6847D
              SHA-256:6F462C2C5E190EFCA68E882CD61D5F3A8EF4890761376F22E9905B1B1B6FDE9F
              SHA-512:B0E6E4F5B46A84C2D02A0519831B98F336AA79079FF2CB9F290D782335FB4FB39A3453520424ED3761D801B9FBE39228B1D045C40EDD70B29801C26592F9805A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Bamako) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.834042129935993
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcx2m/2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dw/2D4v
              MD5:7A017656AB8048BD67250207CA265717
              SHA1:F2BB86BC7B7AB886738A33ADA37C444D6873DB94
              SHA-256:E31F69E16450B91D79798C1064FEA18DE89D5FE343D2DE4A5190BCF15225E69D
              SHA-512:695FA7369341F1F4BC1B629CDAB1666BEFE2E7DB32D75E5038DC17526A3CCE293DB36AFEB0955B06F5834D43AEF140F7A66EC52598444DBE8C8B70429DBE5FC5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Bangui) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.839691887198201
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcx79FHp4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dw7J4V
              MD5:149DD4375235B088386A2D187ED03FFB
              SHA1:5E879B778E2AB110AC7815D3D62A607A76AAB93B
              SHA-256:1769E15721DAFF477E655FF7A8491F4954FB2F71496287C6F9ED265FE5588E00
              SHA-512:4F997EDE6F04A89240E0950D605BB43D6814DCCA433F3A75F330FA13EE8729A10D20E9A0AAD6E6912370E350ABD5A65B878B914FCC9A5CA8503E3A5485E57B3E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Banjul) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):169
              Entropy (8bit):4.797400281087303
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52Dc5ixXGm2OHGVkevUdSaw7FFFkhSVPVFd:SlSWB9X52D4fm2OHCkeVawBFF2mh
              MD5:BA4959590575031330280A4ADC7017D1
              SHA1:34FBC2AFD2E13575D286062050D98ABC4BF7C7A6
              SHA-256:2C06A94A43AC7F0079E6FE371F0D5A06A7BF23A868AC3B10135BFC4266CD2D4E
              SHA-512:65E6161CB6AF053B53C7ABE1E4CAAD4F40E350D52BADCB95EB37138268D17CF48DDB0CA771F450ECD8E6A57C99BE2E8C2227A28B5C4AF3DE7F6D74F255118F04
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Bissau) {. {-9223372036854775808 -3740 0 LMT}. {-1830380400 -3600 0 -01}. {157770000 0 0 GMT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.856245693637169
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62Dc8ycXp75h4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DAmp1T
              MD5:3F6E187410D0109D05410EFC727FB5E5
              SHA1:CAB54D985823218E01EDF9165CABAB7A984EE93E
              SHA-256:9B2EEB0EF36F851349E254E1745D11B65CB30A16A2EE4A87004765688A5E0452
              SHA-512:E12D6DBEA8DE9E3FB236011B962FFE1AEB95E3353B13303C343565B60AA664508D51A011C66C3CE2460C52A901495F46D0500C9B74E19399AE66231E5D6200A0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Blantyre) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.853052123353996
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DciE0TMJZp4DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2D4qGp4e
              MD5:4F5159996C16A171D9B011C79FDDBF63
              SHA1:51BCA6487762E42528C845CCA33173B3ED707B3F
              SHA-256:E73ADC4283ECA7D8504ABC6CB28D98EB071ED867F77DE9FADA777181533AD1D0
              SHA-512:6E5D4DF903968395DFDB834FBD4B2A0294E945A9939D05BED8533674EA0ACE8393731DDCDFACF7F2C9A00D38DC8F5EDB173B4025CF05122B0927829D07ED203F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Brazzaville) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.900915013374923
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DclbDcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DkbDE/
              MD5:9E81B383C593422481B5066CF23B8CE1
              SHA1:8DD0408272CBE6DF1D5051CB4D9319B5A1BD770E
              SHA-256:9ADCD7CB6309049979ABF8D128C1D1BA35A02F405DB8DA8C39D474E8FA675E38
              SHA-512:9939ED703EC26350DE9CC59BF7A8C76B6B3FE3C67E47CCDDE86D87870711224ADEEC61D93AC7926905351B8333AD01FF235276A5AB766474B5884F8A0329C2CB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Bujumbura) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3720
              Entropy (8bit):3.687670811431724
              Encrypted:false
              SSDEEP:48:5hRg1oCSY0WF6yU0yWZVYbZ0F0ZeTvc0jDlSBFX84aKqITVuV09ONWHr0L0335Kw:Fu0oVy0FUeLIvQV8c0OvOakCUUO
              MD5:1B38D083FC54E17D82935D400051F571
              SHA1:AE34C08176094F4C4BFEB4E1BBAE6034BCD03A11
              SHA-256:11283B69DE0D02EAB1ECF78392E3A4B32288CCFEF946F0432EC83327A51AEDDC
              SHA-512:581161079EC0F77EEB119C96879FD586AE49997BAD2C5124C360BCACF9136FF0A6AD70AE7D4C88F96BC94EEB87F628E8890E65DB9B0C96017659058D35436307
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Cairo) {. {-9223372036854775808 7509 0 LMT}. {-2185409109 7200 0 EET}. {-929844000 10800 1 EEST}. {-923108400 7200 0 EET}. {-906170400 10800 1 EEST}. {-892868400 7200 0 EET}. {-875844000 10800 1 EEST}. {-857790000 7200 0 EET}. {-844308000 10800 1 EEST}. {-825822000 7200 0 EET}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EET}. {-779853600 10800 1 EEST}. {-762663600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 72
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1567
              Entropy (8bit):3.593430930151928
              Encrypted:false
              SSDEEP:48:5qSFbS4PUuMfMSAdZXfSGjX6JAzS26WZrW0SKQYXRWXpSjv:YmG0HZPcOQy1p
              MD5:9DB3A6EB1162C5D814B98265FB58D004
              SHA1:63ACAD6C18B49EF6794610ADED9865C8600A4D5C
              SHA-256:EF30CFFD1285339F4CC1B655CB4CB8C5D864C4B575D66F18919A35C084AA4E5F
              SHA-512:0581F6640BDDD8C33E82983F2186EB0952946C70A4B3F524EC78D1BE3EC1FA10BC3672A99CBA3475B28C0798D62A14F298207160F04EE0861EDDA352DA2BCCA0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Casablanca) {. {-9223372036854775808 -1820 0 LMT}. {-1773012580 0 0 +00}. {-956361600 3600 1 +00}. {-950490000 0 0 +00}. {-942019200 3600 1 +00}. {-761187600 0 0 +00}. {-617241600 3600 1 +00}. {-605149200 0 0 +00}. {-81432000 3600 1 +00}. {-71110800 0 0 +00}. {141264000 3600 1 +00}. {147222000 0 0 +00}. {199756800 3600 1 +00}. {207702000 0 0 +00}. {231292800 3600 1 +00}. {244249200 0 0 +00}. {265507200 3600 1 +00}. {271033200 0 0 +00}. {448243200 3600 0 +01}. {504918000 0 0 +00}. {1212278400 3600 1 +00}. {1220223600 0 0 +00}. {1243814400 3600 1 +00}. {1250809200 0 0 +00}. {1272758400 3600 1 +00}. {1281222000 0 0 +00}. {1301788800 3600 1 +00}. {1312066800 0 0 +00}. {1335664800 3600 1 +00}. {1342749600 0 0 +00}. {1345428000 3600 1 +00}. {1348970400 0 0 +00}. {1367114400 3600 1 +00}. {1373162400 0 0 +00}. {1376100000 3600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7277
              Entropy (8bit):3.744402699283941
              Encrypted:false
              SSDEEP:96:/N8d9VA1URbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:/AHAiRNH4Mn82rlo6XIZ9ALeBO
              MD5:261E339A2575F28099CD783B52F0980C
              SHA1:F7EB8B3DAE9C07382D5123225B3EAA4B5BFD47D6
              SHA-256:9C7D0E75AFC5681579D1018D7259733473EEDFFAF7313016B60159CB2A4DCAB5
              SHA-512:8E622174CB6DB4D0172DBC2E408867F03EBB7D1D54AA51D99C4465945CFF369AAFAF17D1D0F9277E69CBE3AD6AAF9A0C6EE056017474DF171E94BD28BBA9C04A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Ceuta) {. {-9223372036854775808 -1276 0 LMT}. {-2177452800 0 0 WET}. {-1630112400 3600 1 WEST}. {-1616810400 0 0 WET}. {-1451692800 0 0 WET}. {-1442451600 3600 1 WEST}. {-1427673600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316390400 3600 1 WEST}. {-1301270400 0 0 WET}. {-1293840000 0 0 WET}. {-94694400 0 0 WET}. {-81432000 3600 1 WEST}. {-71110800 0 0 WET}. {141264000 3600 1 WEST}. {147222000 0 0 WET}. {199756800 3600 1 WEST}. {207702000 0 0 WET}. {231292800 3600 1 WEST}. {244249200 0 0 WET}. {265507200 3600 1 WEST}. {271033200 0 0 WET}. {448243200 3600 0 CET}. {504918000 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.832452688412801
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcmMM1+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DCM1+V
              MD5:DC007D4B9C02AAD2DBD48E73624B893E
              SHA1:9BEE9D21566D6C6D4873EFF9429AE3D3F85BA4E4
              SHA-256:3BF37836C9358EC0ABD9691D8F59E69E8F6084A133A50650239890C458D4AA41
              SHA-512:45D3BC383A33F7079A6D04079112FD73DB2DDBB7F81BFF8172FABCAA949684DC31C8B156E647F77AF8BA26581D3812D510C250CDC4D7EEEC788DDB2B77CD47E8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Conakry) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.8075658510312484
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcXXMFBx/2DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DKXEB4
              MD5:CDA180DB8DF825268DB06298815C96F0
              SHA1:20B082082CFA0DF49C0DF4FD698EBD061280A2BB
              SHA-256:95D31A4B3D9D9977CBDDD55275492A5A954F431B1FD1442C519255FBC0DBA615
              SHA-512:2D35698DE3BF1E90AB37C84ED4E3D0B57F02555A8AEB98659717EEC1D5EED17044D446E12B5AAC12A9721A3F9667343C5CACD7AB00BF986285B8084FF9384654
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Dakar) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):186
              Entropy (8bit):4.795449330458551
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2Dc8bEH+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DJbVDkr
              MD5:AF8E3E86312E3A789B82CECEDDB019CE
              SHA1:6B353BAB18E897151BF274D6ACF410CDFF6F00F0
              SHA-256:F39E4CABE33629365C2CEF6037871D698B942F0672F753212D768E865480B822
              SHA-512:9891AA26C4321DD5C4A9466F2EE84B14F18D3FFD71D6E8D2DE5CAFE4DC563D85A934B7B4E55926B30181761EF8C9B6C97746F522718BAE9DCBE4BDDE70C42B53
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Dar_es_Salaam) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.779330261863059
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcRHKQ1BQDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DOrkDkr
              MD5:1440C37011F8F31213AE5833A3FCD5E1
              SHA1:9EEE9D7BB3A1E29EDDE90D7DBE63ED50513A909B
              SHA-256:A4E0E775206EDBA439A454649A7AC94AE3AFEADC8717CBD47FD7B8AC41ADB06F
              SHA-512:D82FF9C46C8845A6F15DC96AF8D98866C601EF0B4F7F5F0260AD571DD46931E90443FFEB5910D5805C5A43F6CC8866116066565646AE2C96E1D260999D1641F0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Djibouti) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.800219030063992
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcnKe2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dml2D4v
              MD5:18C0C9E9D5154E20CC9301D5012066B9
              SHA1:8395E917261467EC5C27034C980EDD05F2242F40
              SHA-256:0595C402B8499FC1B67C196BEE24BCA4DE14D3E10B8DBBD2840D2B4C88D9DF28
              SHA-512:C53540E25B76DF8EC3E2A5F27B473F1D6615BFBD043E133867F3391B057D8552350F912DF55DD11C1357765EF76D8E286BBBE839F28295D09751243DC0201BDF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Douala) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1281
              Entropy (8bit):3.6551425401331312
              Encrypted:false
              SSDEEP:24:cQbe5T7pkNUSMSA7ZXgUSGjX6JAWqS26WZrW0SKQYJZRWXpSjv:5opMfMSA7ZXfSGjX6JAzS26WZrW0SKQm
              MD5:8E9FF3CB18879B1C69A04F45715D24BB
              SHA1:EF391BF1C3E1DEC08D8158B82B2FB0ED3E69866E
              SHA-256:A6CFC4359B7E2D650B1851D805FF5CD4562D0D1253793EA0978819B9A2FCC0E2
              SHA-512:6BFF03EE8973E2204181967987930EECDD39789DB353DB2EFC786027A8013CFF4835FAB9E3F0AF935D2A2D49CCEBE565FD481BA230EDF4D22A7848D4781C877C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/El_Aaiun) {. {-9223372036854775808 -3168 0 LMT}. {-1136070432 -3600 0 -01}. {198291600 0 0 +00}. {199756800 3600 1 +00}. {207702000 0 0 +00}. {231292800 3600 1 +00}. {244249200 0 0 +00}. {265507200 3600 1 +00}. {271033200 0 0 +00}. {1212278400 3600 1 +00}. {1220223600 0 0 +00}. {1243814400 3600 1 +00}. {1250809200 0 0 +00}. {1272758400 3600 1 +00}. {1281222000 0 0 +00}. {1301788800 3600 1 +00}. {1312066800 0 0 +00}. {1335664800 3600 1 +00}. {1342749600 0 0 +00}. {1345428000 3600 1 +00}. {1348970400 0 0 +00}. {1367114400 3600 1 +00}. {1373162400 0 0 +00}. {1376100000 3600 1 +00}. {1382839200 0 0 +00}. {1396144800 3600 1 +00}. {1403920800 0 0 +00}. {1406944800 3600 1 +00}. {1414288800 0 0 +00}. {1427594400 3600 1 +00}. {1434247200 0 0 +00}. {1437271200 3600 1 +00}. {1445738400 0 0 +00}. {1459044000 3600 1 +00}. {146509200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.817633094200984
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcu5sp4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dk4DBP
              MD5:035B36DF91F67179C8696158F58D0CE8
              SHA1:E43BFF33090324110048AC19CBA16C4ED8D8B3FE
              SHA-256:3101942D9F3B2E852C1D1EA7ED85826AB9EA0F8953B9A0E6BAC32818A2EC9EDD
              SHA-512:A7B52154C6085E5D234D6D658BA48D2C8EC093A429C3907BE7D16654F6EE9EBE8E3100187650956E5164B18340AB0C0979C1F4FA90EFE0CC423FBA5F14F45215
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Freetown) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.8512443534123255
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcHK0o/4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DAV+4G
              MD5:BA2C7443CFCB3E29DB84FEC16B3B3843
              SHA1:2BA7D68C48A79000B1C27588A20A751AA04C5779
              SHA-256:28C1453496C2604AA5C42A88A060157BDFE22F28EDD1FBC7CC63B02324ED8445
              SHA-512:B275ABAADA7352D303EFEAD66D897BE3099A33B80EA849F9F1D98D522AA9A3DC44E1D979C0ABF2D7886BACF2F86D25837C971ECE6B2AF731BE2EE0363939CBDE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Gaborone) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.835896095919456
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62Dc0B5h4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62Dlfh4G
              MD5:59137CFDB8E4B48599FB417E0D8A4A70
              SHA1:F13F9932C0445911E395377FB51B859E4F72862A
              SHA-256:E633C6B619782DA7C21D548E06E6C46A845033936346506EA0F2D4CCCDA46028
              SHA-512:2DCEB9A9FA59512ADCDE4946F055718A8C8236A912F6D521087FC348D52FFF462B5712633FDA5505876C500F5FD472381B3AC90CF1AEDF0C96EA08E0A0D3B7BA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Harare) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):298
              Entropy (8bit):4.638948195674004
              Encrypted:false
              SSDEEP:6:SlSWB9X52DWbAm2OHePP1mXs0//HF20706VcF206KsF:MBp52DWkmdHePP1mcUvFxJVcFEKsF
              MD5:256740512DCB35B4743D05CC24C636DB
              SHA1:1FD418712B3D7191549BC0808CF180A682AF7FC1
              SHA-256:768E9B2D9BE96295C35120414522FA6DD3EDA4500FE86B6D398AD452CAF6FA4B
              SHA-512:DCFF6C02D1328297BE24E0A640F5823BFD23BDE67047671AC18EB0B1F450C717E273B27A48857F54A18D6877AB8132AAED94B2D87D2F962DA43FE473FC3DDC94
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Johannesburg) {. {-9223372036854775808 6720 0 LMT}. {-2458173120 5400 0 SAST}. {-2109288600 7200 0 SAST}. {-860976000 10800 1 SAST}. {-845254800 7200 0 SAST}. {-829526400 10800 1 SAST}. {-813805200 7200 0 SAST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1059
              Entropy (8bit):3.9545766161038602
              Encrypted:false
              SSDEEP:24:cQresZkn0Vb0iluy8pLXeKXhCvN9U0TlW50qCPR8jYJRFp0Q8SdAri/8+u8Wb2:5on010ilux1XeKXhCvN9U0TMGqCp8jYH
              MD5:79FCA072C6AABA65FB2DC83F33BFA17E
              SHA1:AC86AA9B0EAACAB1E4FDB14AECD8D884F8329A5A
              SHA-256:C084565CC6C217147C00DCA7D885AC917CFC8AF4A33CBA146F28586AD6F9832C
              SHA-512:9F19DEA8E21CE3D3DCA0AFC5588203DBB6F5A13BBE10CFDA0CEBE4A417384B85DB3BFFC48687EF7AD27268715FC154E235C106EC91875BA646C6759D285F1027
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Juba) {. {-9223372036854775808 7588 0 LMT}. {-1230775588 7200 0 CAT}. {10360800 10800 1 CAST}. {24786000 7200 0 CAT}. {41810400 10800 1 CAST}. {56322000 7200 0 CAT}. {73432800 10800 1 CAST}. {87944400 7200 0 CAT}. {104882400 10800 1 CAST}. {119480400 7200 0 CAT}. {136332000 10800 1 CAST}. {151016400 7200 0 CAT}. {167781600 10800 1 CAST}. {182552400 7200 0 CAT}. {199231200 10800 1 CAST}. {214174800 7200 0 CAT}. {230680800 10800 1 CAST}. {245710800 7200 0 CAT}. {262735200 10800 1 CAST}. {277246800 7200 0 CAT}. {294184800 10800 1 CAST}. {308782800 7200 0 CAT}. {325634400 10800 1 CAST}. {340405200 7200 0 CAT}. {357084000 10800 1 CAST}. {371941200 7200 0 CAT}. {388533600 10800 1 CAST}. {403477200 7200 0 CAT}. {419983200 10800 1 CAST}. {435013200 7200 0 CAT}. {452037600 10800 1 CAST}. {466635600 7200 0 CAT}. {483487200 10800 1 CAST
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.787605387034664
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcJEl2DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DIEl2Dkr
              MD5:8CF1CA04CD5FC03D3D96DC49E98D42D4
              SHA1:4D326475E9216089C872D5716C54DEB94590FCDE
              SHA-256:A166E17E3A4AB7C5B2425A17F905484EBFDBA971F88A221155BCA1EC5D28EA96
              SHA-512:1301B9469ED396198A2B87CBA254C66B148036C0117D7D4A8286CB8729296AD735DF16581AEF0715CEE24213E91970F181824F3A64BCF91435FDAD85DCD78C84
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Kampala) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1091
              Entropy (8bit):3.9616554773567083
              Encrypted:false
              SSDEEP:24:cQWe9hXn0Vb0iluy8pLXeKXhCvN9U0TlW50qCPR8jYJRFp0Q8SdAri/8+u8WbVgM:5vn010ilux1XeKXhCvN9U0TMGqCp8jYs
              MD5:A00B0C499DE60158C9990CFE9628FEA4
              SHA1:44B768C63E170331396B4B81ABF0E3EDD8B0D864
              SHA-256:FCFF440D525F3493447C0ACFE32BB1E8BCDF3F1A20ADC3E0F5D2B245E2DB10E9
              SHA-512:30BF22857AA4C26FC6178C950AB6EAB472F2AC77D2D8EB3A209DCDEF2DDC8312B0AB6DA3428936CA16225ABE652DDB8536D870DB1905027AD7BD7FF245871556
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Khartoum) {. {-9223372036854775808 7808 0 LMT}. {-1230775808 7200 0 CAT}. {10360800 10800 1 CAST}. {24786000 7200 0 CAT}. {41810400 10800 1 CAST}. {56322000 7200 0 CAT}. {73432800 10800 1 CAST}. {87944400 7200 0 CAT}. {104882400 10800 1 CAST}. {119480400 7200 0 CAT}. {136332000 10800 1 CAST}. {151016400 7200 0 CAT}. {167781600 10800 1 CAST}. {182552400 7200 0 CAT}. {199231200 10800 1 CAST}. {214174800 7200 0 CAT}. {230680800 10800 1 CAST}. {245710800 7200 0 CAT}. {262735200 10800 1 CAST}. {277246800 7200 0 CAT}. {294184800 10800 1 CAST}. {308782800 7200 0 CAT}. {325634400 10800 1 CAST}. {340405200 7200 0 CAT}. {357084000 10800 1 CAST}. {371941200 7200 0 CAT}. {388533600 10800 1 CAST}. {403477200 7200 0 CAT}. {419983200 10800 1 CAST}. {435013200 7200 0 CAT}. {452037600 10800 1 CAST}. {466635600 7200 0 CAT}. {483487200 10800 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.8623059127375585
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcCJRx+DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DRX+Da
              MD5:32AE0D7A7E7F0DF7AD0054E959A53B09
              SHA1:AE455C96401EBB1B2BDE5674A71A182D9E12D7BD
              SHA-256:7273FA039D250CABAE2ACCE926AB483B0BF16B0D77B9C2A7B499B9BDFB9E1CBB
              SHA-512:DC8E89A75D7212D398A253E6FF3D10AF72B7E14CBC07CA53C6CB01C8CE40FB12375E50AD4291C973C872566F8D875D1E1A2CF0A38F02C91355B957095004563E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Kigali) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.816805447465336
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcqQFeDcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DdD4v
              MD5:90EC372D6C8677249C8C2841432F0FB7
              SHA1:5D5E549496962420F56897BC01887B09EC863D78
              SHA-256:56F7CA006294049FA92704EDEAD78669C1E9EABE007C41F722E972BE2FD58A37
              SHA-512:93FD7C8F5C6527DCCFBF21043AB5EED21862A22DA1FDB3ED7635723060C9252D76541DAD3A76EBF8C581A82A6DBEF2766DD428ACE3A9D6A45954A787B686B1CA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Kinshasa) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):141
              Entropy (8bit):4.965079502032549
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52DcGemFFkXGm2OHWTdvUQDWTFWZRYvCn:SlSWB9X52D4mFJm2OHWTdRDWTGRLn
              MD5:51D7AC832AE95CFDE6098FFA6FA2B1C7
              SHA1:9DA61FDA03B4EFDA7ACC3F83E8AB9495706CCEF1
              SHA-256:EEDA5B96968552C12B916B39217005BF773A99CA17996893BC87BCC09966B954
              SHA-512:128C8D3A0AA7CF4DFAE326253F236058115028474BF122F14AB9461D910A03252FEEB420014CA91ACFBF94DF05FBFCADE98217FC59A86A2581BB68CDC83E88C8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Lagos) {. {-9223372036854775808 816 0 LMT}. {-1588464816 3600 0 WAT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.816649832558406
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcr7bp4DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dgfp4Di
              MD5:D1387B464CFCFE6CB2E10BA82D4EEE0E
              SHA1:F672B694551AB4228D4FC938D0CC2DA635EB8878
              SHA-256:BEE63E4DF9D03D2F5E4100D0FCF4E6D555173083A4470540D4ADC848B788A2FC
              SHA-512:DEB95AAB852772253B60F83DA9CE5E24144386DFBFB1F1E9A77905511181EC84FD13B00200602D6C276820527206EE0078DDE81CC0F1B1276B8BF4360C2CDB1E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Libreville) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.813464796454866
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcih4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DNh4DB
              MD5:D2AA823E78DD8E0A0C83508B6378DE5D
              SHA1:C26E03EF84C3C0B6001F0D4471907A94154E6850
              SHA-256:345F3F9422981CC1591FBC1B5B17A96F2F00F0C191DF23582328D44158041CF0
              SHA-512:908F8D096DA6A336703E7601D03477CECBCDC8D404C2410C7F419986379A14943BB61B0D92D87160D5F1EF5B229971B2B9D122D2B3F70746CED0D4D6B10D7412
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Lome) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.807298951345495
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DccLtBQDcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DXQD4v
              MD5:E851465BCA70F325B0B07E782D6A759E
              SHA1:3B3E0F3FD7AF99F941A3C70A2A2564C9301C8CFB
              SHA-256:F7E1DCBAE881B199F2E2BF18754E145DDED230518C691E7CB34DAE3C922A6063
              SHA-512:5F655B45D7A16213CE911EDAD935C1FEE7A947C0F5157CE20712A00B2A12A34AE51D5C05A392D2FF3A0B2DA7787D6C614FF100DDE7788CA01AAE21F10DD1CC3A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Luanda) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.893308860167744
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcfpT0DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62D8pT0G
              MD5:CD638B7929FB8C474293D5ECF1FE94D3
              SHA1:149AD0F3CF8AC1795E84B97CFF5CEB1FD26449C4
              SHA-256:41D32824F28AE235661EE0C959E0F555C44E3E78604D6D2809BBA2254FD47258
              SHA-512:D762C49B13961A01526C0DD9D7A55E202448E1B46BA64F701FB2E0ABE0F44B2C3DF743864B9E62DC07FD6CEA7197945CE246C89CDACB1FEC0F924F3ECC46B170
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Lubumbashi) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.857012096036922
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcOf+DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DkDE/
              MD5:3769866ADC24DA6F46996E43079C3545
              SHA1:546FA9C76A1AE5C6763B31FC7214B8A2B18C3C52
              SHA-256:5BAF390EA1CE95227F586423523377BABD141F0B5D4C31C6641E59C6E29FFAE0
              SHA-512:DEA8CAB330F6321AD9444DB9FEC58E2CBCC79404B9E5539EABB52DBC9C3AC01BA1E8A3E1EC32906F02E4E4744271D84B626A5C32A8CD8B22210C42DD0E774A9C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Lusaka) $TZData(:Africa/Maputo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.807416212132411
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcn2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2D42D4v
              MD5:37C13E1D11C817BA70DDC84E768F8891
              SHA1:0765A45CC37EB71F4A5D2B8D3359AEE554C647FF
              SHA-256:8F4F0E1C85A33E80BF7C04CF7E0574A1D829141CC949D2E38BDCC174337C5BAE
              SHA-512:1E31BBA68E85A8603FBDD27DA68382CBC6B0E1AB0763E86516D3EFD15CFF106DE02812756F504AEE799BF6742423DF5732352D488B3F05B889BE5E48594F558D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Malabo) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):143
              Entropy (8bit):4.906945970372021
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52DcfKUXGm2OHoVvXdSF2iv:SlSWB9X52DESm2OHoVPdM
              MD5:5497C01E507E7C392944946FCD984852
              SHA1:4C3FD215E931CE36FF095DD9D23165340D6EECFE
              SHA-256:C87A6E7B3B84CFFA4856C4B6C37C5C8BA5BBB339BDDCD9D2FD34CF17E5553F5D
              SHA-512:83A2AA0ED1EB22056FFD3A847FB63DD09302DA213FE3AB660C41229795012035B5EA64A3236D3871285A8E271458C2DA6FCD599E5747F2F842E742C11222671A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Maputo) {. {-9223372036854775808 7820 0 LMT}. {-2109291020 7200 0 CAT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):194
              Entropy (8bit):4.91873415322653
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7HbsvFVAIgNTzbDJL2DZQs+DWbBn:MBaIMaHw4NHnJL2DZiDWt
              MD5:71A4197C8062BBFCCC62DCEFA87A25F9
              SHA1:7490FAA5A0F5F20F456E71CBF51AA6DEB1F1ACC8
              SHA-256:4B33414E2B59E07028E9742FA4AE34D28C08FD074DDC6084EDB1DD179198B3C1
              SHA-512:A71CCB957FB5102D493320F48C94ADB642CCAA5F7F28BDDE05D1BB175C29BCBAC4D19DBC481AC0C80CE48F8E3840746C126CBC9CE511CA48D4E53DE22B3D66E7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Johannesburg)]} {. LoadTimeZoneFile Africa/Johannesburg.}.set TZData(:Africa/Maseru) $TZData(:Africa/Johannesburg).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):195
              Entropy (8bit):4.911369740193625
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7HbsvFVAIgNTzbDJL2DzjEHp4DWbBn:MBaIMaHw4NHnJL2DzjEJ4DWt
              MD5:8F4C02CE326FAEEBD926F94B693BFF9E
              SHA1:9E8ABB12E4CFE341F24F5B050C75DDE3D8D0CB53
              SHA-256:029AD8C75A779AED71FD233263643DADE6DF878530C47CF140FC8B7755DDA616
              SHA-512:4B7D2D1D8DA876ABCD1E44FD5E4C992287F2B62B7C7BC3D6FD353E6312053F6762DBD11C0F27056EF8E37C8A2AF8E5111CF09D4EB6BB32EC1FF77F4C0C37917B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Johannesburg)]} {. LoadTimeZoneFile Africa/Johannesburg.}.set TZData(:Africa/Mbabane) $TZData(:Africa/Johannesburg).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.828470940863702
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcBEBXCEeDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DFSVDkr
              MD5:B686E9408AB6EC58F3301D954A068C7E
              SHA1:C1259C31F93EB776F0F401920F076F162F3FFB2D
              SHA-256:79DB89294DAE09C215B9F71C61906E49AFAA5F5F27B4BC5B065992A45B2C183D
              SHA-512:CF96C687D33E68EB498A63EC262FC968858504410F670C6F492532F7C22F507BEACD41888B0A7527C30974DC545CCA9C015898E2D7C0C6D14C14C88F8BBED5C5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Mogadishu) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):200
              Entropy (8bit):4.81604007062907
              Encrypted:false
              SSDEEP:6:SlSWB9X52D3NwTm2OHrFGxYPlHIgafTwG5B:MBp52D3NwTmdHhmYPdIgar5B
              MD5:8F9D1916FF86E2F8C5C9D4ABCC405D53
              SHA1:286BFEC8F7CE6729F84FD6CFEE6A40B7277A4DFF
              SHA-256:182F2608422FF14C53DC8AC1EDFFE054AE011275C1B5C2423E286AD95910F44C
              SHA-512:7EEF6840E54313EF1127694F550986BF97BB1C8BD51DED0AB6D5842B74B5BF0406C65B293F1106E69DDFA0B01AD46756492DEDD9ECCBD077BB75FDA95A9E1912
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Monrovia) {. {-9223372036854775808 -2588 0 LMT}. {-2776979812 -2588 0 MMT}. {-1604359012 -2670 0 MMT}. {63593070 0 0 GMT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):235
              Entropy (8bit):4.70181156382821
              Encrypted:false
              SSDEEP:6:SlSWB9X52DkWJm2OHsvT5X26V/7VVpVCgekKB9TQ4U/w:MBp52DdJmdHsvVXHVVnmQ4U/w
              MD5:B6562D5A53E05FAAD80671C88A9E01D3
              SHA1:0014B14CFDDE47E603962935F8297C4C46533084
              SHA-256:726980DCC13E0596094E01B8377E17029A2FCCE6FE93538C61E61BA620DD0971
              SHA-512:D9C2838C89B0537C7F7A7319600D69D09AC004BD72358B452425A3B4861140246F71A94F004C2EF739620E81062F37ED9DA6D518F74956630006DD5674925A63
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Nairobi) {. {-9223372036854775808 8836 0 LMT}. {-1309746436 10800 0 EAT}. {-1262314800 9000 0 +0230}. {-946780200 9900 0 +0245}. {-315629100 10800 0 EAT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):200
              Entropy (8bit):4.8064239600480985
              Encrypted:false
              SSDEEP:6:SlSWB9X52DjXm2OHNseVaxCXGFaS1HkFWTvLn:MBp52DjXmdHPVX8aS2yzn
              MD5:459DA3ECBE5C32019D1130DDEAB10BAA
              SHA1:DD1F6653A7B7B091A57EC59E271197CEC1892594
              SHA-256:F36F8581755E1B40084442C43C60CC904C908285C4D719708F2CF1EADB778E2E
              SHA-512:FF74D540157DE358E657E968C9C040B8FE5C806D22782D878575BFAC68779303E6071DC84D6773BC06D299AC971B0EB6B38CA50439161574B5A50FF6F1704046
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Ndjamena) {. {-9223372036854775808 3612 0 LMT}. {-1830387612 3600 0 WAT}. {308703600 7200 1 WAST}. {321314400 3600 0 WAT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.822255424633636
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcdhA9Ff2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dsh2f2e
              MD5:3142A6EAC3F36C872E7C32F8AF43A0F8
              SHA1:0EACF849944A55D4AB8198DDD0D3C5494D1986DA
              SHA-256:1704A1A82212E6DB71DA54E799D81EFA3279CD53A6BFA980625EE11126603B4C
              SHA-512:BB3DADC393D0CF87934629BBFAFAD3AD9149B80843FC5447670812357CC4DFBCAF71F7104EBF743C06517BB42111B0DB9028B22F401A50E17085431C9200DAB2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Niamey) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.862257004762335
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcboGb+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dqbb+V
              MD5:6849FA8FFC1228286B08CE0950FEB4DD
              SHA1:7F8E8069BA31E2E549566011053DA01DEC5444E9
              SHA-256:2071F744BC880E61B653E2D84CED96D0AD2485691DDE9FFD38D3063B91E4F41F
              SHA-512:30211297C2D8255D4B5195E9781931861A4DF55C431FFC6F83FE9C00A0089ED56179C07D33B1376C5DE8C0A9ABF2CFE473EF32AD14239DFD9599EA66BC286556
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Nouakchott) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.872638989714255
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcXCZDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2D1DBP
              MD5:7FF39BAAF47859EE3CD60F3E2C6DFC7D
              SHA1:5CFC8B14222554156985031C7E9507CE3311F371
              SHA-256:47E40BDBAC36CDB847C2E533B9D58D09FE1DBA2BED49C49BC75DD9086A63C6EB
              SHA-512:DEEA0982593AE7757E70BD2E933B20B65CD9613891DC734AA4E6EC14D12AD119D2C69BA38E6FA4AE836C6CE14E57F35AE7F53345ACA4CF70AD67680E49BC6B7C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Ouagadougou) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.845403930433216
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcyTKM0DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DQD4v
              MD5:9A4C8187E8AC86B1CF4177702A2D933A
              SHA1:6B54BBBE6D7ABC780EE11922F3AC50CDE3740A1F
              SHA-256:6292CC41FE34D465E3F38552BDE22F456E16ABCBAC0E0B813AE7566DF3725E83
              SHA-512:8008DB5E6F4F8144456021BB6B112B24ADB1194B1D544BBCB3E101E0684B63F4673F06A264C651A4BC0296CB81F7B4D73D47EAC7E1EC98468908E8B0086B2DDD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Porto-Novo) $TZData(:Africa/Lagos).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):200
              Entropy (8bit):4.8463501042309645
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52DcOFwFkXGm2OHzT5vXbeaFnvUdSa5FF1IEvWZvZYvCn:SlSWB9X52DIJm2OHH5PzdVacbLn
              MD5:D28C0D0628DE3E5D9662A3376B20D5B4
              SHA1:464351F257655F10732CA9A1E59CF6587B33F8A1
              SHA-256:B9F317EAA504A195BD658BA7EE9EE22D816BF46A1FFDB8D8DA573D311A5FF78A
              SHA-512:B056E7A16CE8E5CC420F88AF26E893348117306D66ED2DF4C6A6C2CA9F48783714E08AACF94BC646A1B4A2B3FB2080A4E53EDF4633C9AE259BBBA3F8ABE4DEE3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Sao_Tome) {. {-9223372036854775808 1616 0 LMT}. {-2713912016 -2205 0 LMT}. {-1830384000 0 0 GMT}. {1514768400 3600 0 WAT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.85737401659099
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcHdDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DwdDBP
              MD5:AF295B9595965712D77952D692F02C6B
              SHA1:BC6737BD9BFD52FE538376A1441C59FB4FC1A038
              SHA-256:13A06D69AEB38D7A2D35DF3802CEE1A6E15FA1F5A6648328A9584DD55D11E58C
              SHA-512:E47C5EA2DFBC22CF9EAC865F67D01F5593D3CDDB51FDE24CDD13C8957B70F50111675D8E94CA859EC9B6FAA109B3EFA522C3985A69FE5334156FEE66B607006E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Timbuktu) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):920
              Entropy (8bit):4.074538534246205
              Encrypted:false
              SSDEEP:12:MBp52D0mdHrjWC+fGZni8hRSUNvoTC3yJ/Z9vPdq8UwLVFoBZdEthEK7st5kS1R:cQIevhR5FNgTbJ3b3D0WeXR
              MD5:A53F5CD6FE7C2BDD8091E38F26EEA4D1
              SHA1:90FB5EE343FCC78173F88CA59B35126CC8C07447
              SHA-256:D2FCC1AD3BFE20954795F2CDFFFE96B483E1A82640B79ADAA6062B96D143E3C7
              SHA-512:965E42972994AE79C9144323F87C904F393BA0CDF75186C346DA77CFAA1A2868C68AF8F2F1D63D5F06C5D1D4B96BA724DD4BC0DF7F5C4BD77E379AA674AE12DA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Tripoli) {. {-9223372036854775808 3164 0 LMT}. {-1577926364 3600 0 CET}. {-574902000 7200 1 CEST}. {-512175600 7200 1 CEST}. {-449888400 7200 1 CEST}. {-347158800 7200 0 EET}. {378684000 3600 0 CET}. {386463600 7200 1 CEST}. {402271200 3600 0 CET}. {417999600 7200 1 CEST}. {433807200 3600 0 CET}. {449622000 7200 1 CEST}. {465429600 3600 0 CET}. {481590000 7200 1 CEST}. {496965600 3600 0 CET}. {512953200 7200 1 CEST}. {528674400 3600 0 CET}. {544230000 7200 1 CEST}. {560037600 3600 0 CET}. {575852400 7200 1 CEST}. {591660000 3600 0 CET}. {607388400 7200 1 CEST}. {623196000 3600 0 CET}. {641775600 7200 0 EET}. {844034400 3600 0 CET}. {860108400 7200 1 CEST}. {875919600 7200 0 EET}. {1352505600 3600 0 CET}. {1364515200 7200 1 CEST}. {1382662800 7200 0 EET}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1072
              Entropy (8bit):4.074604685883076
              Encrypted:false
              SSDEEP:12:MBp52DgmdHjPbwSRjneMVyDKCNFWLFyBXS9/3S3K/CBmvyncSuZSqLS2C6oPwVFD:cQUejbwSRyS2Uyc+FcJLKgzmcx9b
              MD5:1899EDCB30CDDE3A13FB87C026CD5D87
              SHA1:4C7E25A36E0A62F3678BCD720FCB8911547BAC8D
              SHA-256:F0E01AA40BB39FE64A2EB2372E0E053D59AA65D64496792147FEFBAB476C4EC3
              SHA-512:FD22A2A7F9F8B66396152E27872CCBA6DA967F279BAF21BC91EF76E86B59505B3C21D198032B853427D9FFAB394FBB570F849B257D6F6821916C9AB29E7C37A1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Tunis) {. {-9223372036854775808 2444 0 LMT}. {-2797202444 561 0 PMT}. {-1855958961 3600 0 CET}. {-969242400 7200 1 CEST}. {-950493600 3600 0 CET}. {-941940000 7200 1 CEST}. {-891136800 3600 0 CET}. {-877827600 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-842918400 3600 0 CET}. {-842223600 7200 1 CEST}. {-828230400 3600 0 CET}. {-812502000 7200 1 CEST}. {-796269600 3600 0 CET}. {-781052400 7200 1 CEST}. {-766634400 3600 0 CET}. {231202800 7200 1 CEST}. {243903600 3600 0 CET}. {262825200 7200 1 CEST}. {276044400 3600 0 CET}. {581122800 7200 1 CEST}. {591145200 3600 0 CET}. {606870000 7200 1 CEST}. {622594800 3600 0 CET}. {641516400 7200 1 CEST}. {654649200 3600 0 CET}. {1114902000 7200 1 CEST}. {1128038400 3600 0 CET}. {1143334800 7200 1 CEST}. {1162083600 3600 0 CET}. {1174784400 7200 1 CEST}. {1193533200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1591
              Entropy (8bit):3.915421470240155
              Encrypted:false
              SSDEEP:48:5qtCmcMxTFD9nJivm/8ySy/tnwfn8OIxJJSV1AnNlKQmX0UTjJx2MgXgprKfks1/:QCj6tXww023zn/
              MD5:18BD78EB14E153DAAAAE70B0A6A2510C
              SHA1:A91BA216A2AB62B138B1F0247D75FBA14A5F05C0
              SHA-256:639A57650A4EA5B866EAAA2EEC0562233DC92CF9D6955AC387AD954391B850B1
              SHA-512:88F34732F843E95F2A2AD4FAA0B5F945DD69B65FDDB4BB7DD957B95283B7AE995F52050B45A6332864C1C5CC4611390F6827D82569D343B5E1B9DDFE0AE5A633
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Windhoek) {. {-9223372036854775808 4104 0 LMT}. {-2458170504 5400 0 +0130}. {-2109288600 7200 0 SAST}. {-860976000 10800 1 SAST}. {-845254800 7200 0 SAST}. {637970400 7200 0 CAT}. {764200800 3600 1 WAT}. {778640400 7200 0 CAT}. {796780800 3600 1 WAT}. {810090000 7200 0 CAT}. {828835200 3600 1 WAT}. {841539600 7200 0 CAT}. {860284800 3600 1 WAT}. {873594000 7200 0 CAT}. {891734400 3600 1 WAT}. {905043600 7200 0 CAT}. {923184000 3600 1 WAT}. {936493200 7200 0 CAT}. {954633600 3600 1 WAT}. {967942800 7200 0 CAT}. {986083200 3600 1 WAT}. {999392400 7200 0 CAT}. {1018137600 3600 1 WAT}. {1030842000 7200 0 CAT}. {1049587200 3600 1 WAT}. {1062896400 7200 0 CAT}. {1081036800 3600 1 WAT}. {1094346000 7200 0 CAT}. {1112486400 3600 1 WAT}. {1125795600 7200 0 CAT}. {1143936000 3600 1 WAT}. {1157245200 7200 0 CAT}. {1175385600 3600 1 WAT}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8171
              Entropy (8bit):3.783938143940452
              Encrypted:false
              SSDEEP:96:DGWQm82ctfc/TVu7pAmKABmAlJD1NPaTsrEe50IC:DGWQm67pAmKABmiD1R2sG
              MD5:DD838D2C8CF84B775BBCBA7868E7FFB5
              SHA1:509CFC15E2CBFC2F183B4A3CDEC42C8427EBA825
              SHA-256:01A88ADE038DDD264B74ED921441642CAA93830CEF9594F70188CCF6D19C4664
              SHA-512:9D520CADC0134E7812B5643311246CED011A22D50240A03260478C90B69EC325AE5BD7548BA266E00253AC3288605A912C5DBB026EA1516CB2030F302BFCDF0E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Adak) {. {-9223372036854775808 44002 0 LMT}. {-3225223727 -42398 0 LMT}. {-2188944802 -39600 0 NST}. {-883573200 -39600 0 NST}. {-880196400 -36000 1 NWT}. {-769395600 -36000 1 NPT}. {-765374400 -39600 0 NST}. {-757342800 -39600 0 NST}. {-86878800 -39600 0 BST}. {-31496400 -39600 0 BST}. {-21466800 -36000 1 BDT}. {-5745600 -39600 0 BST}. {9982800 -36000 1 BDT}. {25704000 -39600 0 BST}. {41432400 -36000 1 BDT}. {57758400 -39600 0 BST}. {73486800 -36000 1 BDT}. {89208000 -39600 0 BST}. {104936400 -36000 1 BDT}. {120657600 -39600 0 BST}. {126709200 -36000 1 BDT}. {152107200 -39600 0 BST}. {162392400 -36000 1 BDT}. {183556800 -39600 0 BST}. {199285200 -36000 1 BDT}. {215611200 -39600 0 BST}. {230734800 -36000 1 BDT}. {247060800 -39600 0 BST}. {262789200 -36000 1 BDT}. {278510400 -39600 0 BST}. {294238800 -36000 1 BDT}. {309960000 -3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8410
              Entropy (8bit):3.882284820226162
              Encrypted:false
              SSDEEP:96:RWFxXw34N+YXSUKC8aaIqDPRs/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:Rsd6M/4h5sBPy+CMt/ElALLVuAH
              MD5:30468928CFDD0B6AAC8EA5BF84956E21
              SHA1:0B146D4D789CD49F0A7FEDFFE85FFD31C0926D9C
              SHA-256:202A45DEBFD6E92EF21E2FFF37281C1DE5B4AF4C79DC59A642013EBB37FE5AF0
              SHA-512:721049A2C751BC3F90B0D757C85F59971B46C70942B2F8A20B0E0E0834B89BBE9A5F16D20AEB5F58C1B6268D71DD5F39F9135C60FDE692E3E472598E054C1D96
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Anchorage) {. {-9223372036854775808 50424 0 LMT}. {-3225223727 -35976 0 LMT}. {-2188951224 -36000 0 AST}. {-883576800 -36000 0 AST}. {-880200000 -32400 1 AWT}. {-769395600 -32400 1 APT}. {-765378000 -36000 0 AST}. {-86882400 -36000 0 AHST}. {-31500000 -36000 0 AHST}. {-21470400 -32400 1 AHDT}. {-5749200 -36000 0 AHST}. {9979200 -32400 1 AHDT}. {25700400 -36000 0 AHST}. {41428800 -32400 1 AHDT}. {57754800 -36000 0 AHST}. {73483200 -32400 1 AHDT}. {89204400 -36000 0 AHST}. {104932800 -32400 1 AHDT}. {120654000 -36000 0 AHST}. {126705600 -32400 1 AHDT}. {152103600 -36000 0 AHST}. {162388800 -32400 1 AHDT}. {183553200 -36000 0 AHST}. {199281600 -32400 1 AHDT}. {215607600 -36000 0 AHST}. {230731200 -32400 1 AHDT}. {247057200 -36000 0 AHST}. {262785600 -32400 1 AHDT}. {278506800 -36000 0 AHST}. {294235200 -32400 1 AHDT}. {309956400 -360
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):203
              Entropy (8bit):4.9101657646476164
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290/8J5290e/:MBaIMY9QpI290/8m90O
              MD5:F7D915076ABE4FF032E13F8769D38433
              SHA1:F930A8943E87105EE8523F640EA6F65BD4C9CE78
              SHA-256:9D368458140F29D95CAB9B5D0259DE27B52B1F2E987B4FA1C12F287082F4FE56
              SHA-512:63C99FFA65F749B7637D0DF5A73A21AC34DFEAD364479DE992E215258A82B9C15AB0D45AAF29BD2F259766346FDB901412413DD44C5D45BB8DF6B582C34F48B3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Anguilla) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):202
              Entropy (8bit):4.90033942341457
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290//MFe90e/:MBaIMY9QpI290//V90O
              MD5:25CA3996DDB8F1964D3008660338BA72
              SHA1:B66D73B5B38C2CCCA78232ADC3572BBBEB79365D
              SHA-256:A2ABBD9BCFCE1DB1D78C99F4993AC0D414A08DB4AC5CE915B81119E17C4DA76F
              SHA-512:A25AFE4FD981F458FE194A5D87C35BE5FC7D4426C1EEE8311AE655BB53364CD4AAC0710C0D7E6A91C0F248E2A6916902F4FD43A220CFF7A6474B77D93CF35C81
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Antigua) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1722
              Entropy (8bit):3.6435096006301833
              Encrypted:false
              SSDEEP:48:5s4h19U2dBUGrmO7XGtN3kh0VKnNIVkHZU7WWhKRWRN:Cm19U2zUGrpzGtVE0VKnyVkHZWWWhKRG
              MD5:6349567E3ED0FD11DD97056D2CFF11EE
              SHA1:404F1B311D7072A6372351366BA15BB94F3AC7D2
              SHA-256:41C816E9C0217A01D9288014013CD1D315B2CEB719F8BB310670D02B664A4462
              SHA-512:782910DFA0FF8FEDB94D622271FA0FF983BC50A4FEE95FFC8EC3E89FB123B82C26701D81A994A8248F1C1CA0B1EF49C2752C4D7B498A0A623D79E2B6753DA432
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Araguaina) {. {-9223372036854775808 -11568 0 LMT}. {-1767214032 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1981
              Entropy (8bit):3.6790048972731686
              Encrypted:false
              SSDEEP:48:5Wcap0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTP:vC0ZB9yRwhS+/po/lKENURMo8XvCWvX1
              MD5:93B8CF61EDC7378C39BE33A77A4222FC
              SHA1:8A01D2B22F8FC163B0FDCED4305C3FA08336AF7D
              SHA-256:35E05545A12E213DCBC0C2F7FDCA5C79CD522E7D2684EDF959E8A0A991BEF3C8
              SHA-512:68333AB0C9348AF0994DB26FB6D34FF67ABF56AF1FBABB77F2C9EFF20E9A2DB2B59C5B81DF0C42299DE459B03DF13E07071B84576E62597920D1848F1E1FC9E3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Buenos_Aires) {. {-9223372036854775808 -14028 0 LMT}. {-2372097972 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2009
              Entropy (8bit):3.6543367491742913
              Encrypted:false
              SSDEEP:48:5f4p0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTK+:No0ZB9yRwhS+/po/lKENURMo8XvCWg7r
              MD5:7FCA355F863158D180B3179782A6E8C8
              SHA1:CDFBC98923F7315388009F22F9C37626B677321F
              SHA-256:C3FE34E5BE68503D78D63A2AFB5C970584D0854C63648D7FE6E2412A4E5B008F
              SHA-512:6C2F9598C714BEBA7A538AAB7FA68C1962001C426C80B21F2A9560C72BCEA87B956821E68AF30B4576C1ECDB07E33D616934BD49943DA2E45841B10D483833C5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Catamarca) {. {-9223372036854775808 -15788 0 LMT}. {-2372096212 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378080
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):237
              Entropy (8bit):4.672788403288451
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MMXAIVAIgp/MMXs290/MquQ90/MMXAv:MBaIMY/Mhp/MP290/MquQ90/MH
              MD5:42D568B6100D68F9E5698F301F4EC136
              SHA1:E0A5F43A80EB0FAAFBD45127DCAF793406A4CF3A
              SHA-256:D442E5BBB801C004A7903F6C217149FCDA521088705AC9FECB0BC3B3058981BF
              SHA-512:99580239B40247AF75FFAA44E930CDECB71F6769E3597AC85F19A8816F7D0859F6A0D5499AFAC2FA35C32BA05B75B27C77F36DE290DD0D442C0769D6F41E96DA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Catamarca)]} {. LoadTimeZoneFile America/Argentina/Catamarca.}.set TZData(:America/Argentina/ComodRivadavia) $TZData(:America/Argentina/Catamarca).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1976
              Entropy (8bit):3.659938468164974
              Encrypted:false
              SSDEEP:48:5zxpp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTP:1xT0ZB9yRwhS+/po/lKENURMo8XvCWgJ
              MD5:C6A4EED52A2829671089F9E84D986BFB
              SHA1:F5BBDD0C3347C7519282249AA48543C01DA95B7A
              SHA-256:50541A1FBACAD2C93F08CD402A609C4984AF66E27DB9FAA7F64FDA93DDC57939
              SHA-512:52EA5BB27C91C753275EAC90E082EEBE98B5997B830D8DD579174558355E3FED0AAF4AA02679B0866591951F04F358AFB113423872D57820143E75FEB4415B60
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Cordoba) {. {-9223372036854775808 -15408 0 LMT}. {-2372096592 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1974
              Entropy (8bit):3.659895575974408
              Encrypted:false
              SSDEEP:48:5rCp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCfSWnzydhSR:FK0ZB9yRwhS+/po/lKENURMo8XvCfbzD
              MD5:A7F2318729F0B4B04C9176CB5257691E
              SHA1:0EAD91CBDC640DB67F64A34209359674AC47062A
              SHA-256:E33962F99E6022ED1825898990B38C10F505DE6EC44DAFB00C75E3A7C1A61C8A
              SHA-512:CB80580383309CCA4837556ED0444F2B931E1B3B13582023BFB715393C94C4F1279D8EC18CACB06BB13E3D32A535495DF2D093E225DF7B6DFFD3571A3B3573B2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Jujuy) {. {-9223372036854775808 -15672 0 LMT}. {-2372096328 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800 -1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2037
              Entropy (8bit):3.655968476161033
              Encrypted:false
              SSDEEP:48:5J6p0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWXXydhSTK+:Hi0ZB9yRwhS+/po/lKENURMo8XvCWXXr
              MD5:49BB6DAD5560E7C6EAEA6F3CF9EB1F67
              SHA1:56E0D9DD4E6B12522A75F0ABFEBB6AE019614CB5
              SHA-256:13CBECD826DD5DE4D8576285FC6C4DE39F2E9CF03F4A61F75316776CAED9F878
              SHA-512:CA7EF1A94A6635EAB644C5EAAC2B890E7401745CFA97609BDA410D031B990C87EB2F97160731A45B5A8ADE48D883EAB529AE2379406852129102F0FDF92247D8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/La_Rioja) {. {-9223372036854775808 -16044 0 LMT}. {-2372095956 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2009
              Entropy (8bit):3.649537276151328
              Encrypted:false
              SSDEEP:48:5Yep0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCpSGSldhSTS:C+0ZB9yRwhS+/po/lKENURMo8XvCpVap
              MD5:69F8A1AC33BE03C008EC5FEBD1CE4CAA
              SHA1:858362EFEA0C68C1EC9295A9FCE647B41DBF429D
              SHA-256:B02DDE8DCF8E68B2B1DBF66ADF5B247E9833FEC347DFBC487C391FADA5706AD3
              SHA-512:8373EAEEBF5EA028CC0673B10E9DFE84F4DFC2F9E9E8320D59E6CE6125643B31F5E61FC894E420A8D7E9C2FF242617DF911ABF0884AF5B32316A098C8524772D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Mendoza) {. {-9223372036854775808 -16516 0 LMT}. {-2372095484 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2012
              Entropy (8bit):3.6703415662732746
              Encrypted:false
              SSDEEP:48:5mpp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTK+:oT0ZB9yRwhS+/po/lKENURMo8XvCWvXr
              MD5:AC8E561F7573280594BDD898324E9442
              SHA1:7DC6248ED29719700189FF3A69D06AAC7B54EB6B
              SHA-256:0833962C0DE220BC601D764EE14442E98F83CB581816B74E5867540348227250
              SHA-512:2FDD23ABA891EBEF01944F3C8F1A9E6844C182B0EB2CBEC0F942F268BAE51F0D7775370E262B500FE7151210F8849DD54BA5CEB2160AE03A5747A48A10933F05
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Rio_Gallegos) {. {-9223372036854775808 -16612 0 LMT}. {-2372095388 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1945
              Entropy (8bit):3.653135248071002
              Encrypted:false
              SSDEEP:48:5Vgp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTQO:7w0ZB9yRwhS+/po/lKENURMo8XvCWg7D
              MD5:70FB90E24FEEF5211C9488C938295F02
              SHA1:5C903A669B51A1635284AD80877E0C6789D8EB26
              SHA-256:FBDACFA5D82DC23ECDD9D9F8A4EF71F7DBB579BF4A621C545062A7AE0296141D
              SHA-512:4C36B34B2203F6D4C78CC6F0E061BF35C4B98121D50096C8015EBA6DBEFA989DD2F2E32436EEE3055F1CF466BC3D4FD787A89873EEE4914CB51B273E335C90C3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Salta) {. {-9223372036854775808 -15700 0 LMT}. {-2372096300 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800 -1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2037
              Entropy (8bit):3.6597750686514887
              Encrypted:false
              SSDEEP:48:5jXup0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWXXydhSTH:1+0ZB9yRwhS+/po/lKENURMo8XvCWXXh
              MD5:BBB4D4B341E7FEC2E5A937267AADCD0F
              SHA1:9AB509F97DCBAAE5ACA7F67853E86429438ED8DC
              SHA-256:BAC6CC41865DD3D4F042FE6106176279F3DEB9127BE0146AF75AE1E47098AF43
              SHA-512:49E32BD5BDBA773D99C883080660B431E8D4C806164C0354C848CF3AB0042797DBE7F6226BA234634A1DF254B0464ED5F714B054454520263536B0A77D7053D9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/San_Juan) {. {-9223372036854775808 -16444 0 LMT}. {-2372095556 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2013
              Entropy (8bit):3.6516068215670687
              Encrypted:false
              SSDEEP:48:58kp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCp1ESWn0SK4:K80ZB9yRwhS+/po/lKENURMo8XvCpmTr
              MD5:767F99822C382327A318EAC0779321F3
              SHA1:1352B21F20C7F742D57CB734013143C9B58DA221
              SHA-256:B4590DF5AC1993E10F508CC5183809775F5248B565400BA05AE5F87B69D4E26B
              SHA-512:C8FF21DC573DE5CB327DDA536391071012A038B8266C4E39922EC0F0EC975000E5D7AFBBE81D1C28DB8733E8B01E1E4D6BE0968D9EFCFC50DB102CC09BDABEA6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/San_Luis) {. {-9223372036854775808 -15924 0 LMT}. {-2372096076 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2036
              Entropy (8bit):3.653313944168433
              Encrypted:false
              SSDEEP:48:5yM9Ep0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSU:b9c0ZB9yRwhS+/po/lKENURMo8XvCWgi
              MD5:892E23EEB82C4EF52CB830C607E3DD6D
              SHA1:9A9334DC1F9FBA0152C1B5CAA954F2FF1775B78C
              SHA-256:F3D19E51463B4D04BE1CD4F36CD9DD5E3954B6186ADD6A176B78C3C4F399CCA1
              SHA-512:4FCC3F61E261D57788756921AE21E54D387AB533ACF56182579B9082EC0791CD655D50BEDDAF996233CDBDE549F743855C191BCB581EF3D7877C4CE26B14EEC2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Tucuman) {. {-9223372036854775808 -15652 0 LMT}. {-2372096348 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2007
              Entropy (8bit):3.6562927023582197
              Encrypted:false
              SSDEEP:48:56Yp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTHd:QI0ZB9yRwhS+/po/lKENURMo8XvCWvXz
              MD5:EA31C60D08FFE56504DEC62A539F51D9
              SHA1:79F31368AC9C141B5F0F5804A0D903C12B75A386
              SHA-256:4E3A4539FE0D8E0401C8304E5A79F40C420333C92BF1227BCBB5DB242444ECD6
              SHA-512:EB58A3122DE8FC7887622D3716E1D9D615625FC47C30BA0BD8112894B595263F04B37D43E142C43251C48D2CD703BB6F56966B965C5475DA83F2C290B6F564E8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Ushuaia) {. {-9223372036854775808 -16392 0 LMT}. {-2372095608 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.760006229014668
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGE/nVIAcGE9Cvju:SlSWB9IZaM3y79CzVAIgp9CE290/V90J
              MD5:84605CB5AC93D51FF8C0C3D46B6A566F
              SHA1:8B56DBDAD33684743E5828EFBD638F082E9AA20D
              SHA-256:680651D932753C9F9E856018B7C1B6D944536111900CB56685ABA958DE9EC9C1
              SHA-512:A5FA747C4743130308A8D8832AD33CF10B2DA2F214DEE129CAC9543D6F88FF232B4387026976578D037DF7816D0F4177835866A35F497438DD2526FEBACA2AF6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Aruba) $TZData(:America/Curacao).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7685
              Entropy (8bit):3.4198614734785875
              Encrypted:false
              SSDEEP:192:57TOr5dwtvNJZWDQ2eBTVSZKnb0Yg6f5xgTK5IQPyP8D3rVPe9DptTkhXXkbCkCg:5P7J1A
              MD5:625A707182C6E0027D49F0FFD775AC51
              SHA1:6423A50DB875051656A1C3C5B6C6AF556F8FBE0A
              SHA-256:CD884C5C99949F5723DC94FBFF011B97AE0989EF2EDE089B30C2CD4893AFCE08
              SHA-512:C5787953997D7D1B583AEE7F68FCC255AC1FAC5C9A7025C8093F274206A0C8163DE221B4823F7750B5B30AF32D673F88D5956C0E510851EBA72CC2360AC35D18
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Asuncion) {. {-9223372036854775808 -13840 0 LMT}. {-2524507760 -13840 0 AMT}. {-1206389360 -14400 0 -04}. {86760000 -10800 0 -03}. {134017200 -14400 0 -04}. {162878400 -14400 0 -04}. {181368000 -10800 1 -04}. {194497200 -14400 0 -04}. {212990400 -10800 1 -04}. {226033200 -14400 0 -04}. {244526400 -10800 1 -04}. {257569200 -14400 0 -04}. {276062400 -10800 1 -04}. {291783600 -14400 0 -04}. {307598400 -10800 1 -04}. {323406000 -14400 0 -04}. {339220800 -10800 1 -04}. {354942000 -14400 0 -04}. {370756800 -10800 1 -04}. {386478000 -14400 0 -04}. {402292800 -10800 1 -04}. {418014000 -14400 0 -04}. {433828800 -10800 1 -04}. {449636400 -14400 0 -04}. {465451200 -10800 1 -04}. {481172400 -14400 0 -04}. {496987200 -10800 1 -04}. {512708400 -14400 0 -04}. {528523200 -10800 1 -04}. {544244400 -14400 0 -04}. {560059200 -10800 1 -04}. {57586
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):332
              Entropy (8bit):4.582750266902939
              Encrypted:false
              SSDEEP:6:SlSWB9X5290/qlfbm2OHvcFGxYP329V/uFn/TUs/uFn/lHIs8/kRm5/uFb/C/iin:MBp5290/emdHLYP323/uFn/9/uFn/dBs
              MD5:66777BB05E04E030FABBC70649290851
              SHA1:97118A1C4561FC1CC9B7D18EE2C7D805778970B8
              SHA-256:2C6BBDE21C77163CD32465D773F6EBBA3332CA1EAEEF88BB95F1C98CBCA1562D
              SHA-512:B00F01A72A5306C71C30B1F0742E14E23202E03924887B2418CA6F5513AE59E12BC45F62B614716BBE50A7BEA8D62310E1B67BB39B84F7B1B40C5D2D19086B7C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Atikokan) {. {-9223372036854775808 -21988 0 LMT}. {-2366733212 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-923248800 -18000 1 CDT}. {-880214400 -18000 0 CWT}. {-769395600 -18000 1 CPT}. {-765388800 -18000 0 EST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):172
              Entropy (8bit):4.761501750421919
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/yO5pVAIg20/yOvYvt2IAcGE/ol7x+IAcGE/yOun:SlSWB9IZaM3y7/ykVAIgp/y9F290/ola
              MD5:E641C6615E1EF015427202803761AADD
              SHA1:E254129517335E60D82DFE00C6D5AF722D36565A
              SHA-256:9C546927B107BB4AB345F618A91C0F8C03D8A366028B2F0FCBF0A3CE29E6588E
              SHA-512:B7D34B1EA0D6722D7BFCD91F082D79EE009B97A2B5684D76A3F04CB59079637134275CF9A0306B9F4423A03CC0C2AB43994207D1B209161C893C2C6F3F3B6311
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Adak)]} {. LoadTimeZoneFile America/Adak.}.set TZData(:America/Atka) $TZData(:America/Adak).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1944
              Entropy (8bit):3.6123892296166242
              Encrypted:false
              SSDEEP:48:534h19U2dBUGrmO7XGtN3kh0OjmimtnNIVkHZU7WWhw5N:Nm19U2zUGrpzGtVE0OjmicnyVkHZWWWK
              MD5:E52095DB1E77EC4553A0AF56665CDE51
              SHA1:CED0966E8D89443F2CCBBE9F44DA683F7D2D688B
              SHA-256:30A4658BD46F88A1585ACABB9EB6BA03DB929EAF7D2F430BC4864D194A6CC0DD
              SHA-512:D6F3D51393F9D8F6414023A8435213EC6BD4FCAA5084B664B828CCDE8D57821E3E284B3D5A27414B4C2AB0B71E31D775D1F924C926C849F591D361DAA8681D8A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bahia) {. {-9223372036854775808 -9244 0 LMT}. {-1767216356 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {602
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6625
              Entropy (8bit):3.791871111929614
              Encrypted:false
              SSDEEP:192:NqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOVEmbwBlhcCLfYkNRfsNz:NqZL/1dCYDDCxyH4RxGIJkYWXsWwav7S
              MD5:6A18936EC3AA0FCEC8A230ADAF90FF1E
              SHA1:B13B8BF1FD2EEED44F63A0DC71F0BCE8AC15C783
              SHA-256:974481F867DEA51B6D8C6C21432F9F6F7D6A951EC1C34B49D5445305A6FB29B7
              SHA-512:75AA7A3AE63ED41AFF6CF0F6DC3CA649786A86A64293E715962B003383D31A8AD2B99C72CE6B788EC4DFF1AF7820F011B3F1FD353B37C326EF02289CE4A061BF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bahia_Banderas) {. {-9223372036854775808 -25260 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):413
              Entropy (8bit):4.429320498710922
              Encrypted:false
              SSDEEP:12:MBp5290eNJmdH9Gcvm/uFkCFP/K/uFkCFks/v/h/uFkCFFoI/qZ/uFkCF3dX/r:cQT7enmSkC9/KSkCT/BSkCLl/wSkCj/r
              MD5:49EED111AB16F289E7D2D145A2641720
              SHA1:2F0A37524209FC26421C2951F169B4352250ED9E
              SHA-256:E7415944397EF395DDBD8EACB6D68662908A25E2DB18E4A3411016CBB6B8AFC6
              SHA-512:3AD4511798BA763C4E4A549340C807FE2FDF6B107C74A977E425734BBADDFF44ADAA68B5AE1F96170902A10208BC4BBF551C596EB1A3E292071549B8F3012A35
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Barbados) {. {-9223372036854775808 -14309 0 LMT}. {-1451678491 -14309 0 BMT}. {-1199217691 -14400 0 AST}. {234943200 -10800 1 ADT}. {244616400 -14400 0 AST}. {261554400 -10800 1 ADT}. {276066000 -14400 0 AST}. {293004000 -10800 1 ADT}. {307515600 -14400 0 AST}. {325058400 -10800 1 ADT}. {338706000 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):996
              Entropy (8bit):3.799419505060255
              Encrypted:false
              SSDEEP:24:cQYe3wc4h1u80V2dBUGphmC17ewGtN3kN:5VB4h19U2dBUGrmO7XGtN3kN
              MD5:2F3314B71810C1AC0280F292F09F37BE
              SHA1:B8702125A9768AE530354CE2A765BC07BABAEF34
              SHA-256:9ECA949D328915C6CB02A2E6084F3E0730D49F1C53C6D6AA12751F852C51BF02
              SHA-512:C4E1ADD2E580BFD4100EE776305530BCEA017D57A65205881536A1CDDA3A299816C133B5B1F4B40A99E47BB94AE2A7E727F3D24D06131705818CC0C1AA12E5BD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Belem) {. {-9223372036854775808 -11636 0 LMT}. {-1767213964 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {590032800 -10800 0 -03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1854
              Entropy (8bit):3.8463726575443573
              Encrypted:false
              SSDEEP:24:cQMeVyJOCSSVTSuWcLwX1QIXVlXco0bKdTu/pUHQGyUrROSTgltVJyODrUSn/mJO:5hxKj4jDMtVpIM/mjM/sQ
              MD5:1BFD01ECF77E031C23BDA5ED371E061F
              SHA1:7A38C5665A834B812613E4D10FE4D1E45F606407
              SHA-256:BDF09D97876E3A3C0422C655562252806B4EF914679FDCAB6DD78BD2B84DD932
              SHA-512:D7A2C2645129C4BAB1F0170A29A084396AD8CF07237DE339512C3A5C7227B017BF1D4B78EBD5A7274CAF1D172ECB2DB6F912887BFF1C6AC73E9D645E333A75A3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Belize) {. {-9223372036854775808 -21168 0 LMT}. {-1822500432 -21600 0 CST}. {-1616954400 -19800 1 -0530}. {-1606069800 -21600 0 CST}. {-1585504800 -19800 1 -0530}. {-1574015400 -21600 0 CST}. {-1554055200 -19800 1 -0530}. {-1542565800 -21600 0 CST}. {-1522605600 -19800 1 -0530}. {-1511116200 -21600 0 CST}. {-1490551200 -19800 1 -0530}. {-1479666600 -21600 0 CST}. {-1459101600 -19800 1 -0530}. {-1448217000 -21600 0 CST}. {-1427652000 -19800 1 -0530}. {-1416162600 -21600 0 CST}. {-1396202400 -19800 1 -0530}. {-1384713000 -21600 0 CST}. {-1364752800 -19800 1 -0530}. {-1353263400 -21600 0 CST}. {-1333303200 -19800 1 -0530}. {-1321813800 -21600 0 CST}. {-1301248800 -19800 1 -0530}. {-1290364200 -21600 0 CST}. {-1269799200 -19800 1 -0530}. {-1258914600 -21600 0 CST}. {-1238349600 -19800 1 -0530}. {-1226860200 -21600 0 CST}. {-1206900000 -1980
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):331
              Entropy (8bit):4.599775510303771
              Encrypted:false
              SSDEEP:6:SlSWB9X5290Am2OHff4YPawmX/bVVFUFkCFVUP/GH6/XVVFUFkIZVVFUFkeF3k/g:MBp5290AmdHff4YPawY/b/uFkCFVUP/L
              MD5:5ACBD50E1CB87B4E7B735A8B5281917B
              SHA1:3E92C60B365C7E1F9BF5F312B007CBFD4175DB8F
              SHA-256:E61F3762B827971147772A01D51763A18CC5BED8F736000C64B4BDFF32973803
              SHA-512:9284FFDF115C7D7E548A06A6513E3591F88EE3E5197106B71B54CD82F27890D12773381218BCA69720F074A6762282F25830422DFA402FF19301D6834FD9FF7D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Blanc-Sablon) {. {-9223372036854775808 -13708 0 LMT}. {-2713896692 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {14400 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1159
              Entropy (8bit):3.7116873200926586
              Encrypted:false
              SSDEEP:24:cQETmex8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSjx:5EqSaSwXS4SqSbS3JSySxSxcSESAlSQE
              MD5:0858FCA5A59C9C6EE38B7E8A61307412
              SHA1:685597A5FD8BFEBF3EC558DB8ABF11903F63E05E
              SHA-256:825E89E4B35C9BA92CF53380475960C36307BF11FD87057891DF6EEBA984A88D
              SHA-512:7369EE42CD73CFD635505BF784E16A36C9BBDE0BDAAAB405CB8401EBC508F4CE0B0155206756C1905E915756F1D3CDC381C6B9C357A01EAE0ECC4C448978844A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Boa_Vista) {. {-9223372036854775808 -14560 0 LMT}. {-1767211040 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):237
              Entropy (8bit):4.649012348678967
              Encrypted:false
              SSDEEP:6:SlSWB9X5290bJqm2OHDgPcuknTEXPKV93kR/uFeEV/KV9C:MBp5290bUmdHDgPcukT8O93Y/uF7/O9C
              MD5:4B3B0F66FB3BC69A5AB5DA79D02F7E34
              SHA1:79B84C0578BBB0E4C07E99977D02EDE45F11CC8A
              SHA-256:E7C45CA67F1BA913E7DC1632C166973FDA8DA4734F8BCF3AB1157A45454C8D7B
              SHA-512:96289B4D179F146D6C5FB5DDAA4336CBCB60CF27BABCC20B9691387920897B293903DF41F5D9DE7237A689013A9266134B32AB4B4656796419B46E8378D84358
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bogota) {. {-9223372036854775808 -17776 0 LMT}. {-2707671824 -17776 0 BMT}. {-1739041424 -18000 0 -05}. {704869200 -14400 1 -05}. {733896000 -18000 0 -05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8324
              Entropy (8bit):3.772029913040983
              Encrypted:false
              SSDEEP:96:e45eG5cnWsGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:xGnWdVUC2mWBNwWTxyWR
              MD5:239425659E7345C757E6A44ABF258A22
              SHA1:9659217B4D55795333DFA5E08451B69D17F514AD
              SHA-256:6D6D377DDF237B1C5AB012DDDEB5F4FAA39D1D51240AA5C4C34EE96556D2D2F4
              SHA-512:3891D7BC1F84FF6B01B6C2DF6F0413C9E168E5B84CE445030F1B871766DD38B2FF7418501AB7C0DCEAB8381E538D65DF4E7708502EE924546A28DF1AC9BB7129
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Boise) {. {-9223372036854775808 -27889 0 LMT}. {-2717640000 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-1471788000 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126255600 -25200 0 MST}. {129114000 -21600 0 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {2307
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):234
              Entropy (8bit):4.775296176809929
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MQA+zJFVAIgp/MQA+z2L290BFzk5h490/MQA+zq:MBaIMY/MV+z6p/MV+z2L290rzy490/Mz
              MD5:861DAA3C2FFF1D3E9F81FB5C63EA71F1
              SHA1:8E219E63E6D7E702FD0644543E05778CE786601A
              SHA-256:1D32F22CF50C7586CB566E45988CA05538E61A05DF09FD8F824D870717832307
              SHA-512:71B47C369DF1958C560E71B114616B999FB4B091FAA6DD203B29D2555FFE419D6FC5EF82FA810DC56E6F00722E13B03BFBED2516B4C5C2321F21E03F0198B91B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Buenos_Aires)]} {. LoadTimeZoneFile America/Argentina/Buenos_Aires.}.set TZData(:America/Buenos_Aires) $TZData(:America/Argentina/Buenos_Aires).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7487
              Entropy (8bit):3.787618233072156
              Encrypted:false
              SSDEEP:96:OGoGm+4ILQzXN+C2mWBNQMsmNTxf6AeO+cblX:P7YUC2mWBNwWTxyWR
              MD5:839C797E403B4C102D466B1E759A6CC4
              SHA1:D95864FF269AD16B35CDAAC95AE03D8306B8DE1F
              SHA-256:37E219C4C7AEBCC8919293114280A247E8072F2760E69F083E9FDD6BE460B9BC
              SHA-512:A74F3B3C83815F62F6BDF4199EA471872AE539D6C0C595BA41E6D2DF033075D74CC00995C8F99C3ADD4B1E5E04A12D663BE9BED4CE600FC5F067D7CDDED4D7F5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cambridge_Bay) {. {-9223372036854775808 0 0 -00}. {-1577923200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-147891600 -18000 1 MDDT}. {-131562000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {688550400 -25200 0 MST}. {
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7652
              Entropy (8bit):3.4267759764212906
              Encrypted:false
              SSDEEP:192:ylD7ZYOtu7D/fVLF5H1RuSFuY66DCM/rDAWicDqRp5RepgK3i8kmmkniko1Kg+R7:n4jF17vArp
              MD5:87CB052D17717B696F3D9158B237E4FB
              SHA1:79B3947A50ED15C908CFC2D699D2B7F11468E7B2
              SHA-256:113E8ADCECE14A96261A59E0C26073EA5CFF864C4FF2DA6FAB5C61129A549043
              SHA-512:2BF788FD51E7268A1989F1C564E7B81B002B876381AEC561564D4BCE8D76C9D3F621A2F1AB26C1EAB5E5C64A3C41A536A1E21A5322D678CB11CB608333515144
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Campo_Grande) {. {-9223372036854775808 -13108 0 LMT}. {-1767212492 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {592977600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1365
              Entropy (8bit):3.9551252054637245
              Encrypted:false
              SSDEEP:24:cQseeRb/uyV3XVP/upG/u/yRXiSn/Q8Sn/mfSn/yISn/PSn/zI3Sn/RSn/lfSn/A:5i7XEaRyM/BM/mfM/1M/PM/zmM/RM/l/
              MD5:2EC91D30699B64FA8199004F97C63645
              SHA1:4C4E00857B1FB3970E7C16C4EFAA9347ED2C3629
              SHA-256:4EB4C729FF11E170D683310422D8F10BCE78992CF13DACCB06662308C76CCA3B
              SHA-512:D7811C32E4D2B3B9FAEE730D580BC813EC41B63765DE34BB3A30A0D9BBEF2F090E2DA59C6D9A4D8FC91885DDEA2B6E3B1FD3FD434E42D805AF66E578E66AE6FE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cancun) {. {-9223372036854775808 -20824 0 LMT}. {-1514743200 -21600 0 CST}. {377935200 -18000 0 EST}. {828860400 -14400 1 EDT}. {846396000 -18000 0 EST}. {860310000 -14400 1 EDT}. {877845600 -18000 0 EST}. {891759600 -14400 1 EDT}. {902041200 -18000 0 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 CDT}. {1225004400 -21600 0 CST}. {1238918400 -18000 1 CD
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):274
              Entropy (8bit):4.527582804527589
              Encrypted:false
              SSDEEP:6:SlSWB9X52909+ET2m2OHXP8Hk4lvFVFQVgIUF/R/OGWnVVFQVg2vR/O9:MBp5290QmdHXPy/ltvAYFZ/OGqVvA9/K
              MD5:D47486658B408AAF7F91569435B49D19
              SHA1:C69EDC17F2E77723A5C711342822BF21ECCB9C8E
              SHA-256:555A66624909220ACCCB35D852079D44944E188A81DF6A07CBA7433AC2478E5E
              SHA-512:35A4AF702405BD36F6EF7E42F1E1AEAD841A5710D04306C1C3390B3CC134E88F1221F284F489F6926C58E8FD50BD7E6BE0E5904AAE2ACBEA817EFCE0AAE61169
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Caracas) {. {-9223372036854775808 -16064 0 LMT}. {-2524505536 -16060 0 CMT}. {-1826739140 -16200 0 -0430}. {-157750200 -14400 0 -04}. {1197183600 -16200 0 -0430}. {1462086000 -14400 0 -04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):222
              Entropy (8bit):4.615632762186706
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MMXAIVAIgp/MMXs29094SXAFB5290/MMXAv:MBaIMY/Mhp/MP290mh5290/MH
              MD5:359226FA8A7EAFCA0851F658B4EBBCDC
              SHA1:611A24C24462DF5994B5D043E65770B778A6443B
              SHA-256:F2782781F1FB7FD12FF85D36BB244887D1C2AD52746456B3C3FEAC2A63EC2157
              SHA-512:6F9DD2D1662103EC5A34A8858BDFA69AC9F74D3337052AB47EA61DC4D76216886A0644CF1284940E8862A09CBA3E0A87784DFDB6414434C92E45004AAF312614
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Catamarca)]} {. LoadTimeZoneFile America/Argentina/Catamarca.}.set TZData(:America/Catamarca) $TZData(:America/Argentina/Catamarca).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.781235086647991
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52IAcGE91pkXGm2OHEFvpoevUdR4FIUPvGDUwXvp3VVFVGHC:SlSWB9X52909zm2OHEdGeG4vOIw/ZVVF
              MD5:1FFD7817EE1DC55EF72AD686749AE9CE
              SHA1:AE972D5395F3562F052780AD014BA2C0767943B6
              SHA-256:9CE77C0A01BFDA002EE3B2DCEF316DB7C9AC80B270DFC3A0D7769021E731D849
              SHA-512:480D8D56F7B8829F6E82D8AFF1A0A161C3C45402D85A588027E98F2FA20C6E6F35549FFC5F38F0EEA9C4190A70B334066FCD406D39FF06EE7B7855AF75CD0FC3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cayenne) {. {-9223372036854775808 -12560 0 LMT}. {-1846269040 -14400 0 -04}. {-71092800 -10800 0 -03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.723325073771884
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0u55DdVAIg20u5AF2IAcGE91mr4IAcGEu5un:SlSWB9IZaM3y7oDdVAIgpX2909Yr490/
              MD5:E03755B574F4962030DB1E21D1317963
              SHA1:5B5FA4787DA7AE358EFEA81787EB2AB48E4D7247
              SHA-256:8E85F05135DB89CB304689081B22535002DBD184D5DCDBF6487CD0A2FBE4621E
              SHA-512:8B85E51BD8DC04AE768A4D42F8DF0E0D60F23FAB2607E3DCAD4E10695E50C2A3F2124DA7E3A87E97DB7AF090EF70C9A5B5C2D34F7D1B6F74FEFEA9148FEB15AB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Panama)]} {. LoadTimeZoneFile America/Panama.}.set TZData(:America/Cayman) $TZData(:America/Panama).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11003
              Entropy (8bit):3.728817385585057
              Encrypted:false
              SSDEEP:192:rXxbWziyUZB4ME9Hmp7EYQYMWUJ2eQzURWu3OabMQxXI6X8x3X3D2DgOMIOdXkqq:rXxbWziyUZB4ME9Hmp7EYQYMWUJ2eQzg
              MD5:6175956F3052F3BE172F6110EF6342EE
              SHA1:532E2600DFAFAACCD3A187A233956462383401A6
              SHA-256:FC172494A4943F8D1C3FC35362D96F3D12D6D352984B93BC1DE7BDCB7C85F15E
              SHA-512:36B47003183EB9D7886F9980538DB3BDDC231BB27D4F14006CDBE0CB9042215A02559D97085679F8320DED6109FC7745DC43859EBA99B87365B09C4526D28193
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Chicago) {. {-9223372036854775808 -21036 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1577901600 -21600 0 CST}. {-1563724800 -18000 1 CDT}. {-1551632400 -21600 0 CST}. {-1538928000 -18000 1 CDT}. {-1520182800 -21600 0 CST}. {-1504454400 -18000 1 CDT}. {-1491757200 -21600 0 CST}. {-1473004800 -18000 1 CDT}. {-1459702800 -21600 0 CST}. {-1441555200 -18000 1 CDT}. {-1428253200 -21600 0 CST}. {-1410105600 -18000 1 CDT}. {-1396803600 -21600 0 CST}. {-1378656000 -18000 1 CDT}. {-1365354000 -21600 0 CST}. {-1347206400 -18000 1 CDT}. {-1333904400 -21600 0 CST}. {-1315152000 -18000 1 CDT}. {-1301850000 -21600 0 CST}. {-1283702400 -18000 1 CDT}. {-1270400400 -21600 0 CST}. {-1252252800 -18000 1 CDT}. {-1238950800 -21600 0 CST}. {-1220803200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6593
              Entropy (8bit):3.795313170000037
              Encrypted:false
              SSDEEP:96:LJNfzBT8tRkfKxhzY720zaOXmlITHjLc1cb:dN18tRkfKv+2wB9h
              MD5:B0CA4CFF6571AFBFF25FAC72CDDB5B08
              SHA1:1BF3ACEC369AEA504AAA248459A115E61CF79C4B
              SHA-256:C689A3BEED80D26EAB96C95C85874428F80699F7E136A44377776E52B5855D00
              SHA-512:398496EBA4344EDF78AFBF51BD6024481D3A12546D0EE597B7C593A1CD1BF575AFDE62FFADE7A0DDFEDA79CF235612E6F4DA74D7305A6E48F5942EA10D8A4F8E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Chihuahua) {. {-9223372036854775808 -25460 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {820476000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {883634400 -21600 0 CST}. {891766800 -21600 0 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600 1 MDT}. {1162108800 -25
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):193
              Entropy (8bit):4.822360211437507
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/qlfSwFVAIgp/qlfAvt2909qEac90/qlfu:MBaIMY/TwQp/tvt290Fac90/j
              MD5:2541EC94D1EA371AB1361118EEC98CC6
              SHA1:950E460C1BB680B591BA3ADA0CAA73EF07C229FE
              SHA-256:50E6EE06C0218FF19D5679D539983CEB2349E5D25F67FD05E142921431DC63D6
              SHA-512:2E6B66815565A9422015CAB8E972314055DC4141B5C21B302ABD671F30D0FBAE1A206F3474409826B65C30EDBEDD46E92A99251AB6316D59B09FC5A8095E7562
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Atikokan)]} {. LoadTimeZoneFile America/Atikokan.}.set TZData(:America/Coral_Harbour) $TZData(:America/Atikokan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):214
              Entropy (8bit):4.74004515366486
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MdVAIgp/MOF29093+90/Msn:MBaIMY/M4p/MOF290c90/Ms
              MD5:89870B2001C2EE737755A692E7CA2F18
              SHA1:F67F6C22BF681C105068BEEB494A59B3809C5ED8
              SHA-256:38C3DD7DAF75DBF0179DBFC387CE7E64678232497AF0DACF35DC76050E9424F7
              SHA-512:EFA8A5A90BE6FAAA7C6F5F39CBBBA3C7D44C7943E1BB1B0F7E966FEE4F00F0E4BF1D999A377D4E5230271B120B059EB020BD93E7DA46CF1FFA54AB13D7EC3FFE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Cordoba)]} {. LoadTimeZoneFile America/Argentina/Cordoba.}.set TZData(:America/Cordoba) $TZData(:America/Argentina/Cordoba).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):416
              Entropy (8bit):4.443696146912203
              Encrypted:false
              SSDEEP:12:MBp5290l0TmdHd5PZ6kibvI8/uFn/mSU/uFn/i/uFn/4Y8/uFn//DVn:cQmAed9Z6n5Sn/mtSn/iSn/4JSn/bh
              MD5:D47A1FBA5AD701E1CA168A356D0DA0A9
              SHA1:6738EA6B4F54CC76B9723917AA373034F6865AF1
              SHA-256:51F08C1671F07D21D69E2B7868AA5B9BDBFA6C31D57EB84EB5FF37A06002C5CD
              SHA-512:DB6AD81466500F22820941DF3369155BA03CFA42FA9D267984A28A6D15F88E1A71625E3DC578370B5F97727355EBB7C338482FA33A7701ADB85A160C09BAD232
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Costa_Rica) {. {-9223372036854775808 -20173 0 LMT}. {-2524501427 -20173 0 SJMT}. {-1545071027 -21600 0 CST}. {288770400 -18000 1 CDT}. {297234000 -21600 0 CST}. {320220000 -18000 1 CDT}. {328683600 -21600 0 CST}. {664264800 -18000 1 CDT}. {678344400 -21600 0 CST}. {695714400 -18000 1 CDT}. {700635600 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):211
              Entropy (8bit):4.798554218839104
              Encrypted:false
              SSDEEP:6:SlSWB9X52909ovTm2OHpcHvvPagcyEXC/vHcQCi:MBp52900mdHpcHPagPECvHl
              MD5:9E3726148A53940507998FA1A5EEE6DB
              SHA1:2493B72DF895ED2AE91D09D43BDDADDB41E4DEBC
              SHA-256:E809F227E92542C6FB4BAC82E6079661EEF7700964079AA4D7E289B5B400EC49
              SHA-512:F5ED4085160A06DE672DB93CEE700C420D0438DE9AC3548B291DA236AA8CCC84F97270DA3956E49432AE1E281CCECEB6DF92E71EB305106655B4DF231E04B558
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Creston) {. {-9223372036854775808 -27964 0 LMT}. {-2713882436 -25200 0 MST}. {-1680454800 -28800 0 PST}. {-1627833600 -25200 0 MST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7646
              Entropy (8bit):3.4194836403778353
              Encrypted:false
              SSDEEP:192:+lD7ZYOtu7D/fVLF5H1RuSFuY66DCVDAWicDqRp5RepgK3i8kmmkniko1Kg+R4hu:3jF17vArp
              MD5:7309EBE8210C3C84C24D459289484EFA
              SHA1:31EFE19E3CA2DB512C7AC9CAFD72991EF0517FD3
              SHA-256:FE7543FF576D7EDC3A3FF82759E5C244DE8EB57A95744E20610CEDF6E29AB4C9
              SHA-512:41C94E4093F015B61ACEFCEA067C101AA1ECB855789CFDB8FA4D17589D20868FB7A1456D21C90B5261445D970E5E7F134CBAF17EA926278C9E6DFC471D29F896
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cuiaba) {. {-9223372036854775808 -13460 0 LMT}. {-1767212140 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {592977600 -1080
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.858195118945703
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52IAcGE9CvjEwcXGm2OHCevUd5xF9vFVFIVgYd/iQG3VFpRR/r:SlSWB9X52909C4wTm2OHjyxzFQVgIUFp
              MD5:CE0F18F27502E771B27236C5BF7D3317
              SHA1:D2E68415B8544A8BAC2A4F335854FC048BD4B34C
              SHA-256:118EC9D89937FDA05FCE45F694F8C3841664BBE9DFADB86347B375BF437F9BD6
              SHA-512:B04B5DAB30384FF05ABFC235DA4F9BFE96F400076DEB7CBBA0938F93E66BFF5E86B18E95E9BC0448D812722C8F2D4AFD78AC75180FD80D992F96DFA0CEC156AC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Curacao) {. {-9223372036854775808 -16547 0 LMT}. {-1826738653 -16200 0 -0430}. {-157750200 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1089
              Entropy (8bit):3.793747183330894
              Encrypted:false
              SSDEEP:24:cQZefXQgiu2kPIw1Dtc7UXxH9vC0gdtiyW8RWK79ET7cSXKIuXvY:52XQgiu2kgw1DtuyxdvC0gdtiyW8RB7S
              MD5:E83072C1351121C5CFD74E110ECA9B4B
              SHA1:360B468851EBFF266E4A8F40FE5D196BC6809E65
              SHA-256:6A12AD52CBCF0B3F8BB449C7BC51A784BE560F4BD13545D04426E76B2511D8F9
              SHA-512:539C53AA1D02E3AABF65873CA830782697AC9D55EC6694B68B95C325608F8703882B1182215D2B4E2B6066784AC880BCF0F4EBC5A72B2E637BD9B2C3A61D2979
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Danmarkshavn) {. {-9223372036854775808 -4480 0 LMT}. {-1686091520 -10800 0 -03}. {323845200 -7200 0 -02}. {338950800 -10800 0 -03}. {354675600 -7200 1 -02}. {370400400 -10800 0 -03}. {386125200 -7200 1 -02}. {401850000 -10800 0 -03}. {417574800 -7200 1 -02}. {433299600 -10800 0 -03}. {449024400 -7200 1 -02}. {465354000 -10800 0 -03}. {481078800 -7200 1 -02}. {496803600 -10800 0 -03}. {512528400 -7200 1 -02}. {528253200 -10800 0 -03}. {543978000 -7200 1 -02}. {559702800 -10800 0 -03}. {575427600 -7200 1 -02}. {591152400 -10800 0 -03}. {606877200 -7200 1 -02}. {622602000 -10800 0 -03}. {638326800 -7200 1 -02}. {654656400 -10800 0 -03}. {670381200 -7200 1 -02}. {686106000 -10800 0 -03}. {701830800 -7200 1 -02}. {717555600 -10800 0 -03}. {733280400 -7200 1 -02}. {749005200 -10800 0 -03}. {764730000 -7200 1 -02}. {780454800 -10800 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7609
              Entropy (8bit):3.785302701923574
              Encrypted:false
              SSDEEP:96:nxr+C2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:nx/Nf+aNwj/lpmlOxnKcndIG
              MD5:4DBA9C83ECAD5B5A099CC1AA78D391B0
              SHA1:FFCC77D7964BD16BD8A554FB437BCF4F2FC8958E
              SHA-256:3A89A6834DDBE4A3A6A1CB8C1A1F9579259E7FD6C6C55DE21DCD4807753D8E48
              SHA-512:21212AFE8917C0F3BBED433B510C4FCE671B0DA887A1C7338A18CD5409B1A95E766510A9E636E5AA3AB0BA21D7D2C00A462FEBB10D4567A343B85AFE6A3E2394
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Dawson) {. {-9223372036854775808 -33460 0 LMT}. {-2188996940 -32400 0 YST}. {-1632056400 -28800 1 YDT}. {-1615125600 -32400 0 YST}. {-1596978000 -28800 1 YDT}. {-1583164800 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-147884400 -25200 1 YDDT}. {-131554800 -32400 0 YST}. {315561600 -28800 0 PST}. {325677600 -25200 1 PDT}. {341398800 -28800 0 PST}. {357127200 -25200 1 PDT}. {372848400 -28800 0 PST}. {388576800 -25200 1 PDT}. {404902800 -28800 0 PST}. {420026400 -25200 1 PDT}. {436352400 -28800 0 PST}. {452080800 -25200 1 PDT}. {467802000 -28800 0 PST}. {483530400 -25200 1 PDT}. {499251600 -28800 0 PST}. {514980000 -25200 1 PDT}. {530701200 -28800 0 PST}. {544615200 -25200 1 PDT}. {562150800 -28800 0 PST}. {576064800 -25200 1 PDT}. {594205200 -28800 0 PST}. {607514400 -25200 1 PDT}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1876
              Entropy (8bit):3.9458112723626755
              Encrypted:false
              SSDEEP:24:cQ4eJ58IlJ14RsT8X+km8VnynhBZ2c4Y+O4A5W5xDICW2n7oZA8QZFaIOvkty1H2:5DH0yIRkf12fZGJ5LB6xfZ89Y
              MD5:D7E4978775F290809B7C042674F46903
              SHA1:E94DB1EBB6A1594ED1A5AEA48B52395482D06085
              SHA-256:2E6CFFE8E0C1FE93F55B1BD01F96AA1F3CE645BC802C061CB4917318E30C4494
              SHA-512:1FF3CD58A4C4DEC7538F0816E93E6577C51B0045CF36190FF4D327E81FB8282ADDB0EF20BD78A838ABD507EBAD1C187F2A20CC7840E2325B9C326EC449897B45
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Dawson_Creek) {. {-9223372036854775808 -28856 0 LMT}. {-2713881544 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-725817600 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8629
              Entropy (8bit):3.76966035849006
              Encrypted:false
              SSDEEP:96:4cGbc2sGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:4c2dVUC2mWBNwWTxyWR
              MD5:F641A7F5DE8FCF4ADC1E5A1A2C9DEC53
              SHA1:B013EBBE8002C91C0C45A2D389245A1A9194077A
              SHA-256:DF5459068DB3C771E41BE8D62FB89A2822CB2A33CF9A5640C6C666AB20ECE608
              SHA-512:C2EA07FF21FD6D1A45A87C6AD85DD3929C2B56E66A52D23103DDFF7B2B3B6433EC5EBFC17BED0F9C0A9AF036F0DF965E12EA3D4463207A128AEF5F6BC12970D7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Denver) {. {-9223372036854775808 -25196 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-1577898000 -25200 0 MST}. {-1570374000 -21600 1 MDT}. {-1551628800 -25200 0 MST}. {-1538924400 -21600 1 MDT}. {-1534089600 -25200 0 MST}. {-883587600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-757357200 -25200 0 MST}. {-147884400 -21600 1 MDT}. {-131558400 -25200 0 MST}. {-116434800 -21600 1 MDT}. {-100108800 -25200 0 MST}. {-94669200 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8010
              Entropy (8bit):3.742999180017181
              Encrypted:false
              SSDEEP:96:FVzApQaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:FVspQrn+qvOTFhPI1jFIL
              MD5:177B0815E8BD6BFA6E62895FE12A61E5
              SHA1:EC2400FA644023D6B3100B52381DB65EAF2606F0
              SHA-256:402EC5AB0E99EF6EBB33F4D482EEA5198EC686C7EAE75FC4F7D9B4EF4AC0A9E9
              SHA-512:CFA4226A21FDB23C723335F7385EA15436D8A0752EE50C67DA4C1D839BFFD4792EE9AB6E408498CD06C6B8A99A96E95E0B591F7EA17B41C1895ED396438C6D5A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Detroit) {. {-9223372036854775808 -19931 0 LMT}. {-2051202469 -21600 0 CST}. {-1724083200 -18000 0 EST}. {-883594800 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-757364400 -18000 0 EST}. {-684349200 -14400 1 EDT}. {-671047200 -18000 0 EST}. {94712400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {157784400 -18000 0 EST}. {167814000 -14400 0 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):203
              Entropy (8bit):4.856609165175433
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290TL3290e/:MBaIMY9QpI290Tr290O
              MD5:F85ADC16127A74C9B35D16C631E11F4F
              SHA1:F7716E20F546AA04697FB0F4993A14BAFDD1825E
              SHA-256:67ACF237962E3D12E0C746AEDC7CDBC8579DC7C0A7998AC6B6E169C58A687C17
              SHA-512:89E8F9DC6A306912B2DAEE77705E2DCD76E32F403352C23ED6BE34F8BEBB12C3604C20DA11DB921553D20E3FC43EC7984C7103D8D1396AB83B104E70BA6D13B1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Dominica) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8435
              Entropy (8bit):3.7724320820194475
              Encrypted:false
              SSDEEP:96:7tGVgeb0Gm+qI1zXN+C2mWBNQMsmNTxf6AeO+cblX:7heJ/UC2mWBNwWTxyWR
              MD5:FECBDD64036247B2FBB723ADD8F798F6
              SHA1:60B1719958AD6151CDB174A319A396D5F48C7CF1
              SHA-256:EC95041E0A97B37A60EF16A6FA2B6BCB1EBEFABBC9468B828D0F467595132BC2
              SHA-512:7CF94EC5040F4C8FA3C6ED30CFDAB59A199C18AA0CDA9A66D1A477F15563D2B7CB872CEEF1E2295E0F3B9A85508A03AEC29E3ECEBE11D9B089A92794D510BA00
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Edmonton) {. {-9223372036854775808 -27232 0 LMT}. {-1998663968 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1600614000 -21600 1 MDT}. {-1596816000 -25200 0 MST}. {-1567954800 -21600 1 MDT}. {-1551628800 -25200 0 MST}. {-1536505200 -21600 1 MDT}. {-1523203200 -25200 0 MST}. {-1504450800 -21600 1 MDT}. {-1491753600 -25200 0 MST}. {-1473001200 -21600 1 MDT}. {-1459699200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-715791600 -21600 1 MDT}. {-702489600 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {136371600 -21600 1 MDT}. {152092800 -25200 0 MST}. {167821200 -21600 1 MDT}. {183542400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1189
              Entropy (8bit):3.7118381376452767
              Encrypted:false
              SSDEEP:24:cQOX9eptXyss/u/C5/ukCI/uiCk/u8CHe/uOCXs/um4Co/uN3Cc/ux8CL/uiFCyL:5OXUCs5IlTToo4mdGFtapG8dtedJ9fO2
              MD5:D6945DF73BA7E12D3B23889CC34F6CFB
              SHA1:8C1317F3EF82225A14751318DFDA8904F908C457
              SHA-256:71F15943EAD942224B8807CCBB21F9AE34F04619FD76176404633BDB49D9E88C
              SHA-512:088C2D7BE44650A044B7632337A1FF8C3CF8A6188F24507C846B9B648FE796466B22D4A322B602B75C2943653FC43C7B9A99AE0AACF9AB7BCC86388EC3953F8A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Eirunepe) {. {-9223372036854775808 -16768 0 LMT}. {-1767208832 -18000 0 -05}. {-1206950400 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1175367600 -14400 1 -05}. {-1159819200 -18000 0 -05}. {-633812400 -14400 1 -05}. {-622062000 -18000 0 -05}. {-602276400 -14400 1 -05}. {-591825600 -18000 0 -05}. {-570740400 -14400 1 -05}. {-560203200 -18000 0 -05}. {-539118000 -14400 1 -05}. {-531345600 -18000 0 -05}. {-191358000 -14400 1 -05}. {-184190400 -18000 0 -05}. {-155156400 -14400 1 -05}. {-150062400 -18000 0 -05}. {-128890800 -14400 1 -05}. {-121118400 -18000 0 -05}. {-99946800 -14400 1 -05}. {-89582400 -18000 0 -05}. {-68410800 -14400 1 -05}. {-57960000 -18000 0 -05}. {499755600 -14400 1 -05}. {511243200 -18000 0 -05}. {530600400 -14400 1 -05}. {540273600 -18000 0 -05}. {562136400 -14400 1 -05}. {571204800 -18000 0 -05}. {590040000 -18
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):269
              Entropy (8bit):4.7060952459188305
              Encrypted:false
              SSDEEP:6:SlSWB9X529078iwTm2OHvJ4YRIgdrV/uFn/acD3/uFn/sVn:MBp5290785mdHx4YlB/uFn/z/uFn/U
              MD5:77BE2E0759A3B7227B4DAC601A670D03
              SHA1:1FB09211F291E5B1C5CC9848EB53106AF48EE830
              SHA-256:40994535FE02326EA9E373F54CB60804BA7AE7162B52EA5F73497E7F72F2D482
              SHA-512:EB5E6A4A912053E399F6225A02DDC524A223D4A5724165CAD9009F1FA10B042F971E52CE17B395A86BC80FCC6897FD2CCC3B00708506FEF39E4D71812F5DF595
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/El_Salvador) {. {-9223372036854775808 -21408 0 LMT}. {-1546279392 -21600 0 CST}. {547020000 -18000 1 CDT}. {559717200 -21600 0 CST}. {578469600 -18000 1 CDT}. {591166800 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.786739478919165
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo2IAcGE7JM7QIAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo2907390eu
              MD5:74AB4664E80A145D808CAB004A22859B
              SHA1:2AF7665C4E155A227B3F76D1C4BC87854C25A6CB
              SHA-256:BDD0893AA5D170F388B1E93CE5FE2EDF438866707E52033E49898AFC499F86C5
              SHA-512:CCC2E75E07BA1CAAFD1149A22D07668D191594272922AA2A1CE6DE628A8FF49AD90AA8BFE75C005328820C700B991AD87A6F40DEB5AD519B2708D8F7BF04E5A0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:America/Ensenada) $TZData(:America/Tijuana).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4427
              Entropy (8bit):3.8109873978594053
              Encrypted:false
              SSDEEP:48:5aIl06OIRkf12fZGJ5LB6xfZ89Cf5udCLA9ZClqs/K+ff0t9:sIlWf/5LB6xR89C8CgZCHtffW9
              MD5:90BBD338049233FAC5596CC63AA0D5B6
              SHA1:D96282F5B57CBF823D5A1C1FDDE7907B74DAD770
              SHA-256:DD21597BA97FD6591750E83CC00773864D658F32653017C4B52285670FFE52E3
              SHA-512:3B0F5801E55EBBB7B4C0F74DDBD3469B8F4C2BFC1B44CC80B0D36DA2152C837C8176695945F61FA75664C04F1266BCA0564815307A2C27E783CD3348C4451E4A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Fort_Nelson) {. {-9223372036854775808 -29447 0 LMT}. {-2713880953 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-725817600 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):226
              Entropy (8bit):4.730673843485836
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBL290HXYAp4903GK1:MBaIMY3GK7Hp3GKBL290Hz4903GK1
              MD5:4685E4E850E0B6669F72B8E1B4314A0A
              SHA1:BC6CCD58A2977A1E125B21D7B8FD57E800E624E1
              SHA-256:D35F335D6F575F95CEA4FF53382C0BE0BE94BE7EB8B1E0CA3B7C50E8F7614E4E
              SHA-512:867003B33A5FC6E42D546FBFC7A8AB351DE72232B89BA1BEC6DB566F6DCE135E65C08DE9112837190EB21D677E2F83E7E0F6049EC70CB9E36F223DE3A68E000A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:America/Fort_Wayne) $TZData(:America/Indiana/Indianapolis).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1375
              Entropy (8bit):3.695923796037783
              Encrypted:false
              SSDEEP:24:cQVeVc4h1u80V2dBUGphmC17ewGtN3rvIh0VBHZDIOXqWoN:5b4h19U2dBUGrmO7XGtN3kh0VBHZUwqX
              MD5:2BCCE3C71898F3D7F2327419950C5838
              SHA1:CE45568E951C227CB3D88D20B337E5E1E1D4B1EF
              SHA-256:AA2CF8DA8D63FC4DE912A4F220CF7E49379021F5E51ABA1AFCFC7C9164D5A381
              SHA-512:420066E5D39446AA53547CBF1A015A4745F02D1059B2530B7735AC4C28BD2BFC431AEB7531C2C49C2BDF8E31405F15717D88DE0DE3F5F42BAA96A8289A014D06
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Fortaleza) {. {-9223372036854775808 -9240 0 LMT}. {-1767216360 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8099
              Entropy (8bit):3.737123408653655
              Encrypted:false
              SSDEEP:192:C1V2eXXnqvlrPGgFEUlpde9pXbO53oVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kQ:CDJv
              MD5:3A839112950BFDFD3B5FBD440A2981E4
              SHA1:FFDF034F7E26647D1C18C1F6C49C776AD5BA93ED
              SHA-256:3D0325012AB7076FB31A68E33EE0EABC8556DFA78FBA16A3E41F986D523858FF
              SHA-512:1E06F4F607252C235D2D69E027D7E0510027D8DB0EE49CF291C39D6FD010868EF6899437057DA489DD30981949243DDFA6599FD07CE80E05A1994147B78A76CE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Glace_Bay) {. {-9223372036854775808 -14388 0 LMT}. {-2131646412 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-536443200 -14400 0 AST}. {-526500000 -10800 1 ADT}. {-513198000 -14400 0 AST}. {-504907200 -14400 0 AST}. {63086400 -14400 0 AST}. {73461600 -10800 1 ADT}. {89182800 -14400 0 AST}. {104911200 -10800 1 ADT}. {120632400 -14400 0 AST}. {126244800 -14400 0 AST}. {136360800 -10800 1 ADT}. {152082000 -14400 0 AST}. {167810400 -10800 1 ADT}. {183531600 -14400 0 AST}. {199260000 -10800 1 ADT}. {215586000 -14400 0 AST}. {230709600 -10800 1 ADT}. {247035600 -14400 0 AST}. {262764000 -10800 1 ADT}. {278485200 -14400 0 AST}. {294213600 -10800 1 ADT}. {309934800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7186
              Entropy (8bit):3.4539479411234977
              Encrypted:false
              SSDEEP:192:HzC1RFbvHQbnRJ2N+f4hQAa3/paCxwPQg07VvN/W5ylGiGJ3G5cGKQWaT7dZV4gF:t5lfDARzJXC
              MD5:F7C502D77495455080AC3125CE2B42EA
              SHA1:B4883AF71068903AFA372DBFA9E73A39B658A8FF
              SHA-256:058FBB47D5CD3001C0E5A0B5D92ACE1F8A720527A673A78AB71925198AC0ACA1
              SHA-512:B0361D7FB7B02C996B9E608F9B8B1D8DB76FC7D298FA9AC841C4C51A0469FF05A06E0F7829E6C7D810D13BDF3B792A9547B70F6721CA9D7544CBD94028364CAB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Godthab) {. {-9223372036854775808 -12416 0 LMT}. {-1686083584 -10800 0 -03}. {323845200 -7200 0 -02}. {338950800 -10800 0 -03}. {354675600 -7200 1 -02}. {370400400 -10800 0 -03}. {386125200 -7200 1 -02}. {401850000 -10800 0 -03}. {417574800 -7200 1 -02}. {433299600 -10800 0 -03}. {449024400 -7200 1 -02}. {465354000 -10800 0 -03}. {481078800 -7200 1 -02}. {496803600 -10800 0 -03}. {512528400 -7200 1 -02}. {528253200 -10800 0 -03}. {543978000 -7200 1 -02}. {559702800 -10800 0 -03}. {575427600 -7200 1 -02}. {591152400 -10800 0 -03}. {606877200 -7200 1 -02}. {622602000 -10800 0 -03}. {638326800 -7200 1 -02}. {654656400 -10800 0 -03}. {670381200 -7200 1 -02}. {686106000 -10800 0 -03}. {701830800 -7200 1 -02}. {717555600 -10800 0 -03}. {733280400 -7200 1 -02}. {749005200 -10800 0 -03}. {764730000 -7200 1 -02}. {780454800 -10800 0 -03
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10015
              Entropy (8bit):3.780383775128893
              Encrypted:false
              SSDEEP:192:z9zdvd8mSGDcfnrpbXXMqvlrPGgFEUlpd8ESeYPiVFuT/eleWmBk81kS/kV6kefD:z9zdvd7SGgcESeYPiV2Jv
              MD5:77DEEF08876F92042F71E1DEFA666857
              SHA1:7E21B51B3ED8EBEB85193374174C6E2BCA7FEB7F
              SHA-256:87E9C6E265BFA58885FBEC128263D5E5D86CC32B8FFEDECAFE96F773192C18BE
              SHA-512:C9AB8C9147354A388AEC5FE04C6C5317481478A07893461706CDC9FD5B42E31733EAC01C95C357F3C5DC3556C49F20374F58A6E0A120755D5E96744DE3A95A81
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Goose_Bay) {. {-9223372036854775808 -14500 0 LMT}. {-2713895900 -12652 0 NST}. {-1640982548 -12652 0 NST}. {-1632076148 -9052 1 NDT}. {-1615145348 -12652 0 NST}. {-1609446548 -12652 0 NST}. {-1096921748 -12600 0 NST}. {-1072989000 -12600 0 NST}. {-1061670600 -9000 1 NDT}. {-1048973400 -12600 0 NST}. {-1030221000 -9000 1 NDT}. {-1017523800 -12600 0 NST}. {-998771400 -9000 1 NDT}. {-986074200 -12600 0 NST}. {-966717000 -9000 1 NDT}. {-954624600 -12600 0 NST}. {-935267400 -9000 1 NDT}. {-922570200 -12600 0 NST}. {-903817800 -9000 1 NDT}. {-891120600 -12600 0 NST}. {-872368200 -9000 0 NWT}. {-769395600 -9000 1 NPT}. {-765401400 -12600 0 NST}. {-757369800 -12600 0 NST}. {-746044200 -9000 1 NDT}. {-733347000 -12600 0 NST}. {-714594600 -9000 1 NDT}. {-701897400 -12600 0 NST}. {-683145000 -9000 1 NDT}. {-670447800 -12600 0 NST}. {-6516954
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7307
              Entropy (8bit):3.755018614919114
              Encrypted:false
              SSDEEP:96:hrZaC3Xm8sHRyvOTFhP5S+ijFnRaJeaX1eyDt:htrn+cvOTFhPI1jFIL
              MD5:8582299C1262010B6843306D65DB436C
              SHA1:70DB6B507D7F51B1E2C96E087CD7987EB69E9A1D
              SHA-256:7CFBA4D1B1E6106A0EC6D6B5600791D6A33AD527B7D47325C3AB9524B17B1829
              SHA-512:CC12912C38D85B23242C69211BA2B58167C55836D51DB02E6D820CDBD6368F835893AF656FC81F73EA745FD786E9134EC4A3E8D325D1515A01540E8A7EBEF03B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Grand_Turk) {. {-9223372036854775808 -17072 0 LMT}. {-2524504528 -18430 0 KMT}. {-1827687170 -18000 0 EST}. {284014800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}. {499240800 -18000 0 EST}. {514969200 -14400 1 EDT}. {530690400 -18000 0 EST}. {544604400 -14400 1 EDT}. {562140000 -18000 0 EST}. {576054000 -14400 1 EDT}. {594194400 -18000 0 EST}. {607503600 -14400 1 EDT}. {625644000 -18000 0 EST}. {638953200 -14400 1 EDT}. {657093600 -18000 0 EST}. {671007600 -14400 1 EDT}. {688543200 -18000 0 EST}. {702457200 -14400 1 EDT}. {71
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):202
              Entropy (8bit):4.877543794488217
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX2905Qb90e/:MBaIMY9QpI290Ob90O
              MD5:C62E81B423F5BA10709D331FEBAB1839
              SHA1:F7BC5E7055E472DE33DED5077045F680843B1AA7
              SHA-256:0806C0E907DB13687BBAD2D22CEF5974D37A407D00E0A97847EC12AF972BCFF3
              SHA-512:7D7090C3A6FEBE67203EB18E06717B39EC62830757BAD5A40E0A7F97572ABB81E81CAB614AA4CD3089C3787DAA6293D6FED0137BB57EF3AE358A92FCDDCF52A8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Grenada) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):205
              Entropy (8bit):4.914669229343752
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX2905AJLr490e/:MBaIMY9QpI290qJLr490O
              MD5:026A098D231C9BE8557A7F4A673C1BE2
              SHA1:192EECA778E1E713053D37353AF6D3C168D2BFF5
              SHA-256:FFE0E204D43000121944C57D2B2A846E792DDC73405C02FC5E8017136CD55BCB
              SHA-512:B49BD0FC12CC8D475E7E5116B8BDEA1584912BFA433734451F4338E42B5E042F3EC259E81C009E85798030E21F658158FA9F4EFC60078972351F706F852425E3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Guadeloupe) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):385
              Entropy (8bit):4.450029420195016
              Encrypted:false
              SSDEEP:12:MBp52906GdJmdHKznI2f/uFn/z/uFn/w67Rd3/uFn/4Bx/uFn/xAQ:cQ8JeQXfSn/zSn/w67Rd3Sn/4HSn/j
              MD5:6E3FD9D19E0CD26275B0F95412F13F4C
              SHA1:A1B6D6219DEBDBC9B5FFF5848E5DF14F8F4B1158
              SHA-256:1DC103227CA0EDEEBA8EE8A41AE54B3E11459E4239DC051B0694CF7DF3636F1A
              SHA-512:BF615D16BB55186AFC7216B47250EE84B7834FD08077E29E0A8F49C65AACAAD8D27539EA751202EBFF5E0B00702EC59B0A7D95F5FB585BFED68AC6206416110D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guatemala) {. {-9223372036854775808 -21724 0 LMT}. {-1617040676 -21600 0 CST}. {123055200 -18000 1 CDT}. {130914000 -21600 0 CST}. {422344800 -18000 1 CDT}. {433054800 -21600 0 CST}. {669708000 -18000 1 CDT}. {684219600 -21600 0 CST}. {1146376800 -18000 1 CDT}. {1159678800 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):240
              Entropy (8bit):4.690879495223713
              Encrypted:false
              SSDEEP:6:SlSWB9X529056m2OHHjGeP5lahicKpKV91EX/uFkfF/KV9C:MBp5290smdHHLP5C/gO9U/uFEF/O9C
              MD5:58E0902DC63F2F584AD72E6855A68BB8
              SHA1:C8ED225C95DB512CB860D798E6AF648A321B82E7
              SHA-256:D940627FFCBE6D690E34406B62EE4A032F116DF1AB81631E27A61E16BD4051E2
              SHA-512:EF2523F2C55890BE4CE78DA2274833647587CF6F48B144C8261EB69B24BA73946B63244F03FEDF37A990FCAFECB2D88F4ECE302993F115C06323721E570EDD99
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guayaquil) {. {-9223372036854775808 -19160 0 LMT}. {-2524502440 -18840 0 QMT}. {-1230749160 -18000 0 -05}. {722926800 -14400 1 -05}. {728884800 -18000 0 -05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):208
              Entropy (8bit):4.687194013851928
              Encrypted:false
              SSDEEP:6:SlSWB9X52905R3Lm2OHRjGeTShVy4yViUKcVVFAH/MIB/O9:MBp5290LLmdHVTiy4yVi7c/OH/MG/O9
              MD5:CF5AD3AFBD735A42E3F7D85064C16AFC
              SHA1:B8160F8D5E677836051643622262F13E3AE1B0BE
              SHA-256:AF2EC2151402DF377E011618512BBC25A5A6AC64165E2C42212E2C2EC182E8F1
              SHA-512:F69F10822AB115D25C0B5F705D294332FAAA66EB0BA2D98A6610A35E1FA5ED05F02B3DDBB4E37B9B4A77946C05E28C98113DBF11EDF8DB2661A2D8ED40711182
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guyana) {. {-9223372036854775808 -13960 0 LMT}. {-1730578040 -13500 0 -0345}. {176010300 -10800 0 -03}. {662698800 -14400 0 -04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10763
              Entropy (8bit):3.724988391778253
              Encrypted:false
              SSDEEP:192:Y7Z1hubfVmv0SqJXDiFHrbm96qddObEn/RDzWRfQFQ4XL8vG+81VcfnrpbXXnqvo:823ZLYvuOZJv
              MD5:7DE8E355A725B3D9B3FD06A838B9715F
              SHA1:41C6AAEA03FC7FEED50CFFFC4DFF7F35E2B1C23D
              SHA-256:5F65F38FFA6B05C59B21DB98672EB2124E4283530ACB01B22093EAEFB256D116
              SHA-512:4C61A15DDF28124343C1E6EFE068D15E48F0662534486EC38A4E2731BE085CDA5856F884521EF32A6E0EDD610A8A491A722220BDD1BAF2A9652D8457778AF696
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Halifax) {. {-9223372036854775808 -15264 0 LMT}. {-2131645536 -14400 0 AST}. {-1696276800 -10800 1 ADT}. {-1680469200 -14400 0 AST}. {-1640980800 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-1609444800 -14400 0 AST}. {-1566763200 -10800 1 ADT}. {-1557090000 -14400 0 AST}. {-1535486400 -10800 1 ADT}. {-1524949200 -14400 0 AST}. {-1504468800 -10800 1 ADT}. {-1493413200 -14400 0 AST}. {-1472414400 -10800 1 ADT}. {-1461963600 -14400 0 AST}. {-1440964800 -10800 1 ADT}. {-1429390800 -14400 0 AST}. {-1409515200 -10800 1 ADT}. {-1396731600 -14400 0 AST}. {-1376856000 -10800 1 ADT}. {-1366491600 -14400 0 AST}. {-1346616000 -10800 1 ADT}. {-1333832400 -14400 0 AST}. {-1313956800 -10800 1 ADT}. {-1303678800 -14400 0 AST}. {-1282507200 -10800 1 ADT}. {-1272661200 -14400 0 AST}. {-1251057600 -10800 1 ADT}. {-1240088400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8444
              Entropy (8bit):3.7372403334059547
              Encrypted:false
              SSDEEP:192:VXA0Bc0tTJtNliQ4sxgpuG4c2JPTxUw9Or2ocrPGSyM9Gk4LK46MCf7VkXgySCWv:VXA0Bc0tTJtNliQ4sxSuG4c2JPTxUw9F
              MD5:C436FDCDBA98987601FEFC2DBFD5947B
              SHA1:A04CF2A5C9468C634AED324CB79F9EE3544514B7
              SHA-256:32F8B4D03E4ACB466353D72DAA2AA9E1E42D454DBBA001D0B880667E6346B8A1
              SHA-512:56C25003685582AF2B8BA4E32EFF03EF10F4360D1A12E0F1294355000161ADDF7024CBD047D1830AB884BE2C385FD8ABE8DA5C30E9A0671C22E84EE3BF957D85
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Havana) {. {-9223372036854775808 -19768 0 LMT}. {-2524501832 -19776 0 HMT}. {-1402813824 -18000 0 CST}. {-1311534000 -14400 1 CDT}. {-1300996800 -18000 0 CST}. {-933534000 -14400 1 CDT}. {-925675200 -18000 0 CST}. {-902084400 -14400 1 CDT}. {-893620800 -18000 0 CST}. {-870030000 -14400 1 CDT}. {-862171200 -18000 0 CST}. {-775681200 -14400 1 CDT}. {-767822400 -18000 0 CST}. {-744231600 -14400 1 CDT}. {-736372800 -18000 0 CST}. {-144702000 -14400 1 CDT}. {-134251200 -18000 0 CST}. {-113425200 -14400 1 CDT}. {-102542400 -18000 0 CST}. {-86295600 -14400 1 CDT}. {-72907200 -18000 0 CST}. {-54154800 -14400 1 CDT}. {-41457600 -18000 0 CST}. {-21495600 -14400 1 CDT}. {-5774400 -18000 0 CST}. {9954000 -14400 1 CDT}. {25675200 -18000 0 CST}. {41403600 -14400 1 CDT}. {57729600 -18000 0 CST}. {73458000 -14400 1 CDT}. {87364800 -18000 0 CST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):595
              Entropy (8bit):4.2803367804689785
              Encrypted:false
              SSDEEP:12:MBp5290ebmdH5NWw+Ux++vTQtFlvm0tFXtFjV5a:cQBe5gfUT7UFltF9FjV5a
              MD5:9D1A1746614CE2CEE26D066182938CDC
              SHA1:967590403A84E80ED299B8D548A2B37C8EEB21CE
              SHA-256:493DB3E7B56B2E6B266A5C212CD1F75F1E5CF57533DA03BB1C1F2449543B9F48
              SHA-512:DFAE6BC48F2E4B75DD6744AEE57D31D6A6E764D02DCA5731C7B516AD87B9BAB2FEB355A012EC38BDD53008B501B0744953EB7E0677F02B9EAF083D2E66042B37
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Hermosillo) {. {-9223372036854775808 -26632 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {915174000 -25200 0 MST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6996
              Entropy (8bit):3.799188069575817
              Encrypted:false
              SSDEEP:96:uRXxWMzJ2eQzURWu3N7sHRwvOTFhP5S+ijFnRaJeaX1eyDt:uRXxWUJ2eQzURWu3NOqvOTFhPI1jFIL
              MD5:154A332C3ACF6D6F358B07D96B91EBD1
              SHA1:FC16E7CBE179B3AB4E0C2A61AB5E0E8C23E50D50
              SHA-256:C0C7964EBF9EA332B46D8B928B52FDE2ED15ED2B25EC664ACD33DA7BF3F987AE
              SHA-512:5831905E1E6C6FA9DD309104B3A2EE476941D6FF159764123A477E2690C697B0F19EDEA0AD0CD3BBBECF96D64DC4B981027439E7865FCB1632661C8539B3BD6C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Indianapolis) {. {-9223372036854775808 -20678 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1577901600 -21600 0 CST}. {-900259200 -18000 1 CDT}. {-891795600 -21600 0 CST}. {-883591200 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8470
              Entropy (8bit):3.7546412701514034
              Encrypted:false
              SSDEEP:192:AXxr2eQzURWu3Oab9BxXI6X8xYIIOdXkqbfkeTzZSJw5/9/yuvQ+hcr8bYkzbXw6:AXxr2eQzUwu3Oab9BxXI6XUYIIOdXkqv
              MD5:E8AFD9E320A7F4310B413F8086462F31
              SHA1:7BEE624AAC096E9C280B4FC84B0671381C657F6C
              SHA-256:BE74C1765317898834A18617352DF3B2952D69DE4E294616F1554AB95824DAF0
              SHA-512:C76620999A293FA3A93CA4615AB78F19395F12CC08C242F56BFD4C4CAF8BC769DDEBF33FF10F7DA5A3EFD8ED18792362780188636075419014A8C099A897C43C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Knox) {. {-9223372036854775808 -20790 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-725824800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-447267600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-415818000 -21600 0 CST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7037
              Entropy (8bit):3.786429098558221
              Encrypted:false
              SSDEEP:96:FXx3knO559B18XWRh0ksHRwvOTFhP5S+ijFnRaJeaX1eyDt:FXxUnO559B2XWRh0pqvOTFhPI1jFIL
              MD5:456422A0D5BE8FBF5DBD0E75D8650894
              SHA1:737AC21F019A7E89689B9C8B465C8482FF4F403E
              SHA-256:C92D86CACFF85344453E1AFBC124CE11085DE7F6DC52CB4CBE6B89B01D5FE2F3
              SHA-512:372AEBB2F13A50536C36A025881874E5EE3162F0168B71B2083965BECBBFCA3DAC726117D205D708CC2B4F7ABE65CCC2B3FE6625F1403D97001950524D545470
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Marengo) {. {-9223372036854775808 -20723 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-599594400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-292438800 -21600 0 CST}. {-273686400 -18000 0 EST}. {-31518000 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7364
              Entropy (8bit):3.79636789874872
              Encrypted:false
              SSDEEP:192:pXxS559B2XW6X8x3X3D2D8IOdXkqbfkeTzlbaqvOTFhPI1jFIL:pXxS559B2XW6XU3X3D2D8IOdXkqbfNT2
              MD5:9614153F9471187A2F92B674733369A0
              SHA1:199E8D5018A374EDB9592483CE4DDB30712006E3
              SHA-256:5323EBC8D450CC1B53AED18AD209ADEB3A6EEB5A00A80D63E26DB1C85B6476ED
              SHA-512:2A1E26D711F62C51A5EE7014584FAF41C1780BD62573247D45D467500C6AB9A9EAD5A382A1986A9D768D7BB927E4D391EA1B7A4AD9A54D3B05D8AD2385156C33
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Petersburg) {. {-9223372036854775808 -20947 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-473364000 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-292438800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-257965200 -21600 0 CST}. {-242236800 -18000 1 CDT}. {-226515600 -21600 0 CST}. {-210787200 -18000 1 CDT}. {-195066000 -21600 0 CST}. {-179337600 -18000 1 CDT}. {-163616400 -21600 0 CST
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6992
              Entropy (8bit):3.7768650637181533
              Encrypted:false
              SSDEEP:192:CXxjL36559B2XI6XE3X3D2E0bYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3g:CXxjL36559B2XI6XE3X3D2E0bYkzbXw6
              MD5:D0F40504B578D996E93DAE6DA583116A
              SHA1:4D4D24021B826BFED2735D42A46EEC1C9EBEA8E3
              SHA-256:F4A0572288D2073D093A256984A2EFEC6DF585642EA1C4A2860B38341D376BD8
              SHA-512:BA9D994147318FF5A53D45EC432E118B5F349207D58448D568E0DB316452EF9FD620EE4623FD4EAD123BC2A6724E1BAE2809919C58223E6FD4C7A20F004155E0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Tell_City) {. {-9223372036854775808 -20823 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-289414800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-260989200 -21600 0 CST}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6350
              Entropy (8bit):3.782861360101505
              Encrypted:false
              SSDEEP:96:K9Xx3+lsHRwvOTFhP5S+ijFnRaJeaX1eyDt:6XxuoqvOTFhPI1jFIL
              MD5:35A64C161E0083DCE8CD1E8E1D6EBE85
              SHA1:9BC295C23783C07587D82DA2CC25C1A4586284B2
              SHA-256:75E89796C6FB41D75D4DDA6D94E4D27979B0572487582DC980575AF6656A7822
              SHA-512:7BAF735DA0DE899653F60EED6EEF53DD8A1ABC6F61F052B8E37B404BC9B37355E94563827BC296D8E980C4247864A57A117B7B1CB58A2C242991BBDC8FE7174E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Vevay) {. {-9223372036854775808 -20416 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-495043200 -18000 0 EST}. {-31518000 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {94712400 -18000 0 EST}. {1136091600 -18000 0 EST}. {1143961200 -14400 1 EDT}. {1162101600 -18000 0 EST}. {1173596400 -14400 1 EDT}. {1194156000 -18000 0 EST}. {1205046000 -14400 1 EDT}. {1225605600 -18000 0 EST}. {1236495600 -14400 1 EDT}. {1257055200 -18000 0 EST}. {1268550000 -14400 1 EDT}. {1289109600 -18000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6992
              Entropy (8bit):3.795913753683276
              Encrypted:false
              SSDEEP:192:TXxjL36559B2XI6XE3X3D2E0baqvOTFhPI1jFIL:TXxjL36559B2XI6XE3X3D2E0bZ3+
              MD5:AD8B44BD0DBBEB06786B2B281736A82B
              SHA1:7480D3916F0ED66379FC534F20DC31001A3F14AF
              SHA-256:18F35F24AEF9A937CD9E91E723F611BC5D802567A03C5484FAB7AEEC1F2A0ED0
              SHA-512:7911EC3F1FD564C50DEAF074ED99A502A9B5262B63E3E0D2901E21F27E90FBD5656A53831E61B43A096BA1FF18BB4183CCCE2B903782C2189DAAFDD7A90B3083
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Vincennes) {. {-9223372036854775808 -21007 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-289414800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-260989200 -21600 0 CST}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7170
              Entropy (8bit):3.7942292979267767
              Encrypted:false
              SSDEEP:192:YXxjJ2eQzURWu3Oab9B2XWR0/qvOTFhPI1jFIL:YXxjJ2eQzUwu3Oab9B2XWR0M3+
              MD5:40D8E05D8794C9D11DF018E3C8B8D7C0
              SHA1:58161F320CB46EC72B9AA6BAD9086F18B2E0141B
              SHA-256:A13D6158CCD4283FE94389FD341853AD90EA4EC505D37CE23BD7A6E7740F03F6
              SHA-512:BC45B6EFF1B879B01F517D4A4012D0AFBA0F6A9D92E862EF9A960FE07CBE216C8C929FE790044C566DC95981EC4BEAB3DCBD45A1FE597606CF601214A78AEA08
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Winamac) {. {-9223372036854775808 -20785 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-447267600 -21600 0 CST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):228
              Entropy (8bit):4.655121947675421
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBL2903GfJ4903GK1:MBaIMY3GK7Hp3GKBL2903GfJ4903GK1
              MD5:CB79BE371FAB0B0A5EBEB1BA101AA8BA
              SHA1:6A24348AB24D6D55A8ABDEE1500ED03D5D1357F3
              SHA-256:6AABF28AC5A766828DD91F2EE2783F50E9C6C6307D8942FCD4DFAE21DB2F1855
              SHA-512:156E1E7046D7A0938FE4BF40BC586F0A7BEF1B0ED7B887665E9C6041980B511F079AA739B7BD42A89794CB9E82DB6629E81DD39D2F8161DFABDED539E272FB6E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:America/Indianapolis) $TZData(:America/Indiana/Indianapolis).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7389
              Entropy (8bit):3.778898781146325
              Encrypted:false
              SSDEEP:96:/ZGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:/EVUC2mWBNwWTxyWR
              MD5:EFEFB694C4F54583C0ED45A955E823AF
              SHA1:6FF35D151E8E1DED0DC362671FFF904B3CFF59B4
              SHA-256:72C48C0CCC1B8C1BD80E5BB5B8879A07A2DBE82317667568523BBE1F855E4883
              SHA-512:52BDACF02C5A595927FF9B7DC0151367C81B259C8831A91F66A0C10D5271DCDF834763F44868CCF7EDA497295D9D55C49C8F8FD43EEC383C29BC3CABAA4B6B0F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Inuvik) {. {-9223372036854775808 0 0 -00}. {-536457600 -28800 0 PST}. {-147888000 -21600 1 PDDT}. {-131558400 -28800 0 PST}. {315558000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {688550400 -25200 0 MST}. {702464400 -21600 1 MDT}. {720000000 -25200 0 MST}. {733914000 -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7421
              Entropy (8bit):3.7475594770809835
              Encrypted:false
              SSDEEP:96:0/GC3XmzdsHRwvOTFhP5S+ijFnRaJeaX1eyDt:0/Pn0gqvOTFhPI1jFIL
              MD5:67B9C859DCD38D60EB892500D7287387
              SHA1:E91BE702B1D97039528A3F540D1FFFF553683CE9
              SHA-256:34D907D9F2B36DC562DCD4E972170011B4DA98F9F6EDA819C50C130A51F1DBED
              SHA-512:239B0BA842C1432DB5A6DE4E0A63CDE4B4800FC76AE237B0E723116426F0700FFF418634FB1B5641B87E7792709E16A9ED679E37A570E9D723E3561C2B6B45B5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Iqaluit) {. {-9223372036854775808 0 0 -00}. {-865296000 -14400 0 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-147898800 -10800 1 EDDT}. {-131569200 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}. {499240800 -18000 0 EST}. {514969200 -14400 1 EDT}. {530690400 -18000 0 EST}. {544604400 -14400 1 EDT}. {562140000 -18000 0 EST}. {576054000 -14400 1 EDT}. {594194400 -18000 0 EST}. {607503600 -14400 1 EDT}. {625644000 -18000 0 EST}. {638953200 -14400 1 EDT}. {657093600 -18000 0 EST}. {671007600 -14400 1 EDT}. {688543200 -18000 0 EST}. {702457200 -14400 1 EDT}. {71999280
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):818
              Entropy (8bit):4.132568007446054
              Encrypted:false
              SSDEEP:24:cQ1ewtWFD/u/Ip/uJD/u2lR/utzN54i/uhU/ufUF5/uDBq/u63gU/u3Zh/u4u8H:5htWFYIgxmzfwuFqBG3g/k8H
              MD5:5C35FFB7D73B7F46DB4A508CF7AB1C54
              SHA1:5C631104044E9413C86F95E072A630C2AD9EA56D
              SHA-256:7FDD008C250308942D0D1DE485B05670A6A4276CB61F5F052385769B7E1906C1
              SHA-512:7B3FF2C945598DDBF43B0BD0650192D6C70B333BF89916013C35F56DC1489CB65A72BA70FB0AE7341C71A71D4B73805F9D597A5B5FA525F4BFB1DF0F582641AE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Jamaica) {. {-9223372036854775808 -18430 0 LMT}. {-2524503170 -18430 0 KMT}. {-1827687170 -18000 0 EST}. {126248400 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {162370800 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {441781200 -18000 0 EST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):206
              Entropy (8bit):4.89710274358395
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MI1VAIgp/MI+290pPGe90/MIE:MBaIMY/Mvp/Mh290h390/MB
              MD5:320C83EFE59FD60EB9F5D4CF0845B948
              SHA1:5A71DFAE7DF9E3D8724DFA533A37744B9A34FFEC
              SHA-256:67740B2D5427CFCA70FB53ABD2356B62E01B782A51A805A324C4DFAD9ACA0CFA
              SHA-512:D7A6378372386C45C907D3CB48B923511A719794B0C0BFA3694DBCE094A46A48249720653836C2F10CBB2178DD8EEEEA6B5019E4CC6C6B650FD7BE256BE1CA99
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Jujuy)]} {. LoadTimeZoneFile America/Argentina/Jujuy.}.set TZData(:America/Jujuy) $TZData(:America/Argentina/Jujuy).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8406
              Entropy (8bit):3.8821515247187883
              Encrypted:false
              SSDEEP:96:sL19jPaps/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:sB9jPP/4h5sBPy+CMt/ElALLVuAH
              MD5:7D338E0224E7DDC690766CDC3E436805
              SHA1:89BB26B7731AC40DE75FFCD854BA4D30A0F1B716
              SHA-256:B703FC5AA56667A5F27FD80E5042AFE0F22F5A7EF7C5174646B2C10297E16810
              SHA-512:7B52EDD2FE3ECAB682138EC867B4D654A08BEA9C4A3BB20E1ED69F03DD9EF91A3B707C78D25CA5A32938152157E98188A253AD2D2D283EF24ECE7352BCB88B67
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Juneau) {. {-9223372036854775808 54139 0 LMT}. {-3225223727 -32261 0 LMT}. {-2188954939 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9332
              Entropy (8bit):3.769996646995791
              Encrypted:false
              SSDEEP:192:wmXxSkUArUfxLURWu3O5bMQxXI6Xah0drn+qvOTFhPI1jFIL:wmXxSkUArUfxLUwu3O5bMQxXI6Xah2n8
              MD5:D9BC20AFD7DA8643A2091EB1A4B48CB3
              SHA1:9B567ABF6630E7AB231CAD867AD541C82D9599FF
              SHA-256:B4CC987A6582494779799A32A9FB3B4A0D0298425E71377EB80E2FB4AAAEB873
              SHA-512:0BC769A53E63B41341C25A0E2093B127064B589F86483962BD24DB4082C4466E12F4CD889B82AD0134C992E984EF0897113F28321522B57BA45A98C15FF7E172
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Kentucky/Louisville) {. {-9223372036854775808 -20582 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1546279200 -21600 0 CST}. {-1535904000 -18000 1 CDT}. {-1525280400 -21600 0 CST}. {-905097600 -18000 1 CDT}. {-891795600 -21600 0 CST}. {-883591200 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-744224400 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-684349200 -18000 1 CDT}. {-652899600 -18000 1 CDT}. {-620845200 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8279
              Entropy (8bit):3.785637200740036
              Encrypted:false
              SSDEEP:192:jFPXxEOdXkqbfkeTzZSJw5/9/yuvQ+hcrD57X0N41+gqvOTFhPI1jFIL:5PXxEOdXkqbfNTzZSJw5/9/yuvQ6crD9
              MD5:0C6F5C9D1514DF2D0F8044BE27080EE2
              SHA1:70CBA0561E4319027C60FB0DCF29C9783BFE8A75
              SHA-256:1515460FBA496FE8C09C87C51406F4DA5D77C11D1FF2A2C8351DF5030001450F
              SHA-512:17B519BCC044FE6ED2F16F2DFBCB6CCE7FA83CF17B9FC4A40FDA21DEFBA9DE7F022A50CF5A264F3090D57D51362662E01C3C60BD125430AEECA0887BB8520DB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Kentucky/Monticello) {. {-9223372036854775808 -20364 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-63136800 -21600 0 CST}. {-52934400 -18000 1 CDT}. {-37213200 -21600 0 CST}. {-21484800 -18000 1 CDT}. {-5763600 -21600 0 CST}. {9964800 -18000 1 CDT}. {25686000 -21600 0 CST}. {41414400 -18000 1 CDT}. {57740400 -21600 0 CST}. {73468800 -18000 1 CDT}. {89190000 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 C
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):199
              Entropy (8bit):4.8191308888643345
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y73GKXFVAIgp3GK4N2901iZ903GKk:MBaIMY3GKXQp3GKe290Q903GKk
              MD5:465D405C9720EB7EC4BB007A279E88ED
              SHA1:7D80B8746816ECF4AF45166AED24C731B60CCFC6
              SHA-256:BE85C86FBD7D396D2307E7DCC945214977829E1314D1D71EFAE509E98AC15CF7
              SHA-512:C476022D2CC840793BF7B5841051F707A30CCAB1022E30FB1E45B420077417F517BEDA5564EFB154283C7C018A9CA09D10845C6A1BFE2A2DE7C939E307BDCE6F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Knox)]} {. LoadTimeZoneFile America/Indiana/Knox.}.set TZData(:America/Knox_IN) $TZData(:America/Indiana/Knox).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.810917109656368
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGE1QOa0IAcGE9Cvju:SlSWB9IZaM3y79CzVAIgp9CE2901Qv0k
              MD5:4763D6524D2D8FC62720BCD020469FF6
              SHA1:EE567965467E4F3BDFE4094604E526A49305FDD8
              SHA-256:A794B43E498484FFD83702CFB9250932058C01627F6F6F4EE1432C80A9B37CD6
              SHA-512:37462E0A3C24D5BAEBDD1ADCF8EE94EA07682960D710D57D5FD05AF9C5F09FF30312528D79516A16A0A84A2D351019DBB33308FC39EC468033B18FB0AC872C13
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Kralendijk) $TZData(:America/Curacao).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):210
              Entropy (8bit):4.853705210019575
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52IAcGEyUMWkXGm2OHpJvvvX+nFp1vZSsXxyFYMUmBXlVvG9:SlSWB9X5290Xm2OHphvPKZpyFMmBVVO9
              MD5:FE113AA98220A177DA9DD5BF588EB317
              SHA1:083F2C36FF97185E2078B389F6DB2B3B04E95672
              SHA-256:AF2A931C2CC39EED49710B9AFDBB3E56F1E4A1A5B9B1C813565BE43D6668493A
              SHA-512:B6A34966F4150E3E3785563DFEB543726868923DB3980F693B4F2504B773A6CFD4102225C24897C81F1B3D22F35D1BE92D5ECE19F03028AC485A6B975896BB8F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/La_Paz) {. {-9223372036854775808 -16356 0 LMT}. {-2524505244 -16356 0 CMT}. {-1205954844 -12756 1 BST}. {-1192307244 -14400 0 -04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):444
              Entropy (8bit):4.171707948838632
              Encrypted:false
              SSDEEP:12:MBp5290BbmdH4VPvut/O9F/O9BQXR/uFEC3/O9Ge/uFAs/O92/O9PF/O9R8/O9Tu:cQye8mV6FC4R/u1Cp/u2sC2CdC6CTSPV
              MD5:D20722EC3E24AA65C23DB94006246684
              SHA1:3E9D446FFA6163ED658D947BB582C9F566374777
              SHA-256:593FEBC924D0DE7DA5FC482952282F1B1E3432D7509798F475B13743047286DA
              SHA-512:326E300C837981DEFC497B5E467EA70DC2F6F10765FAB39977A2F03F3BEF0A0917EFD0524E2B66CBCFE0EE424273594437E098C6503EFC73002673678016C605
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Lima) {. {-9223372036854775808 -18492 0 LMT}. {-2524503108 -18516 0 LMT}. {-1938538284 -14400 0 -05}. {-1002052800 -18000 0 -05}. {-986756400 -14400 1 -05}. {-971035200 -18000 0 -05}. {-955306800 -14400 1 -05}. {-939585600 -18000 0 -05}. {512712000 -18000 0 -05}. {544248000 -18000 0 -05}. {638942400 -18000 0 -05}. {765172800 -18000 0 -05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9409
              Entropy (8bit):3.767062784666229
              Encrypted:false
              SSDEEP:192:lBY5PBFx/9jgNf+aNwj/lpmlOxnKcndIG:lBY5PBFx/9wfefnK6
              MD5:A661407CC08E68459018A636C8EF0EC1
              SHA1:5524A613B07C4B4CA7404504EAD917E5B0A00112
              SHA-256:C39E5A4C1482B13E862B4D36F4F4590BDF230BE44BAC30BDAB015CDBE02BE9C9
              SHA-512:F5BD08D99E0B54911AC3ABFD413A1D98A0EB7F39A41E348E17D38EA9226A9320BA0CFE9CEB0954D158AB9B8761F0A9ECFB6F82DF033CD9B2234BC71A2D163B3A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Los_Angeles) {. {-9223372036854775808 -28378 0 LMT}. {-2717640000 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-687967140 -25200 1 PDT}. {-662655600 -28800 0 PST}. {-620838000 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589388400 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557938800 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526489200 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495039600 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463590000 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431535600 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400086000 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-368636400 -25200 1 PDT}. {-355330800 -28800 0 PST}. {
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):223
              Entropy (8bit):4.866250035215905
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y71PiKp4ozFVAIgp1PiKp4zL290hp4901PiKp4/:MBaIMYPyJpPyzL290P490Py/
              MD5:3BAD2D8B6F2ECB3EC0BFA16DEAEBADC3
              SHA1:2E8D7A5A29733F94FF247E7E62A7D99D5073AFDC
              SHA-256:242870CE8998D1B4E756FB4CD7097FF1B41DF8AA6645E0B0F8EB64AEDC46C13C
              SHA-512:533A6A22A11C34BCE3772BD85B6A5819CCCD98BF7ECED9E751191E5D1AD3B84F34D70F30936CFE501C2FA3F6AAC7ABB9F8843B7EB742C6F9C2AD4C22D5C73740
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Kentucky/Louisville)]} {. LoadTimeZoneFile America/Kentucky/Louisville.}.set TZData(:America/Louisville) $TZData(:America/Kentucky/Louisville).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.81236985301262
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGEyOqdVM1h4IAcGE9Cva:SlSWB9IZaM3y79CzVAIgp9CE290h48hf
              MD5:EBB062CC0AA5C21F7C4278B79B9EAE6C
              SHA1:6DFC8303BBE1FB990D7CB258E7DBC6270A5CFE64
              SHA-256:4842420076033349DD9560879505326FFAB91BED75D6C133143FFBBFB8725975
              SHA-512:5087C6257CA797317D049424324F5DC31BBD938436DCEB4CF4FE3D2520F7745F1C023E3EC48689957E389900EF2AACB3F5E9E49FD154DF51FF89F9A7173818CD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Lower_Princes) $TZData(:America/Curacao).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1487
              Entropy (8bit):3.655866753080831
              Encrypted:false
              SSDEEP:24:cQGEecc4h1u80V2dBUGphmC17ewGtN3rvIh0VKngBHZDIOXqWoN:5K4h19U2dBUGrmO7XGtN3kh0VKngBHZy
              MD5:3BC7560FE4E357A36D53F6DCC1E6F176
              SHA1:F9F647E5021344A3A350CD895A26B049331E7CF1
              SHA-256:184EC961CA5D1233A96A030D75D0D47A4111717B793EE25C82C0540E25168BDD
              SHA-512:0805146230F55E12D7524F3F4EDB53D9C6C41C6926FA0603B3958AA82E85C9531D8CBDF4DFF085189908F293A2B29FDFA1BAEFB0FDADF34134D6C4D2FCF19397
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Maceio) {. {-9223372036854775808 -8572 0 LMT}. {-1767217028 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {60
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):590
              Entropy (8bit):4.233264210289004
              Encrypted:false
              SSDEEP:12:MBp5290znTsmdHOYPprva6/wLAyM/uFn/V8/uFn/3Y/oA2P/RASx/uFn/G/uFn/M:cQGnoeOshRIpMSn/V8Sn/3YVgJvxSn/6
              MD5:6BF9AB156020E7AC62F93F561B314CB8
              SHA1:7484A57EADCFD870490395BB4D6865A2E024B791
              SHA-256:D45B4690B43C46A7CD8001F8AE950CD6C0FF7B01CD5B3623E3DD92C62FD5E473
              SHA-512:CF02E62650679D8E2D58D0D70DE2322CAAA6508AF4FF7A60E415AA8AA3A9D26D1A191CFAE986ACAF0AEF1DFC4C2E34F9A5B6EDC2018E0B7E9000917D429FB587
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Managua) {. {-9223372036854775808 -20708 0 LMT}. {-2524500892 -20712 0 MMT}. {-1121105688 -21600 0 CST}. {105084000 -18000 0 EST}. {161758800 -21600 0 CST}. {290584800 -18000 1 CDT}. {299134800 -21600 0 CST}. {322034400 -18000 1 CDT}. {330584400 -21600 0 CST}. {694260000 -18000 0 EST}. {717310800 -21600 0 CST}. {725868000 -18000 0 EST}. {852094800 -21600 0 CST}. {1113112800 -18000 1 CDT}. {1128229200 -21600 0 CST}. {1146384000 -18000 1 CDT}. {1159682400 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1127
              Entropy (8bit):3.6965365214193797
              Encrypted:false
              SSDEEP:24:cQGnveI8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSjc:5rSaSwXS4SqSbS3JSySxSxcSESAlSQSk
              MD5:BFCC0D7639AE2D973CDBD504E99A58B8
              SHA1:E8C43C5B026891D3E9B291446ABC050E7A100C71
              SHA-256:1237FF765AA4C5530E5250F928DFAB5BB687C72C990A37B87E9DB8135C5D9CBD
              SHA-512:DAD87E612161A136606E50944C50401AFD4C11D51A016704BDD070E52ED3BAC56E0E7BCFD83E7DA392FC8D2278E5F9EF6C0C466372F58AFA1005C4156CDA189D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Manaus) {. {-9223372036854775808 -14404 0 LMT}. {-1767211196 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -1440
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):202
              Entropy (8bit):4.890561068654966
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290zzJ/90e/:MBaIMY9QpI290zzN90O
              MD5:3340CD9706ECBB2C6BCB16F1D75C5428
              SHA1:FE230B53F0DCCE15C14C91F43796E46DA5C1A2CE
              SHA-256:BC2F908758F074D593C033F7B1C7D7B4F81618A4ED46E7907CD434E0CCFEE9F4
              SHA-512:016AB54B9E99600A296D99A036A555BB79E3C5FDB0F1BEB516AFFE17B7763D864CB076B9C2D95547ED44BA2F6FC372CDFF25708C5423E1CF643AB6F0AA78E0E3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Marigot) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):242
              Entropy (8bit):4.7982301339896285
              Encrypted:false
              SSDEEP:6:SlSWB9X5290zlJm2OHfueP9dMQR5OfT/VVFUFkCFeR/r:MBp5290znmdHfnP9dMQR5Gb/uFkCFO/r
              MD5:2F7A1415403071E5D2E545C1DAA96A15
              SHA1:6A8FB2ABAD2B2D25AF569624C6C9AAE9821EF70B
              SHA-256:40F3C68A518F294062AC3DD5361BB9884308E1C490EF11D2CFDC93CB219C3D26
              SHA-512:3E4D94AB6A46E6C3BB97304F3A5596A06041C0E0935CC840F4A6EB56D0892778F853959A742C5B832CD8F07AB9B74539C45599F22C080577503B2E34B6CE28C5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Martinique) {. {-9223372036854775808 -14660 0 LMT}. {-2524506940 -14660 0 FFMT}. {-1851537340 -14400 0 AST}. {323841600 -10800 1 ADT}. {338958000 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6526
              Entropy (8bit):3.7582526108760064
              Encrypted:false
              SSDEEP:192:t+vN41+z6stuNEsRZLbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsr2:taN41+z6stuNEsRZLbXwDTIRqfh57TlE
              MD5:2BBAA150389EAAE284D905A159A61167
              SHA1:0001B50C25FC0CDF015A60150963AAF895EEDEEF
              SHA-256:A7966B95DBE643291FB68E228B60E2DC780F8155E064D96B670C8290F104E4AB
              SHA-512:87CE18E7E4C2C59A953CD47005EF406F4923730459996B1BF09B04FFD9CD5F963A9E50299ECCDBF4B24C565412B706B1ABC39890D659E6F409F1BA50308E57F9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Matamoros) {. {-9223372036854775808 -24000 0 LMT}. {-1514743200 -21600 0 CST}. {568015200 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {599637600 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 C
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6619
              Entropy (8bit):3.788952004807415
              Encrypted:false
              SSDEEP:96:W7ezBT8tRkfKxhzY720zaOXmlITHjLc1cb:X8tRkfKv+2wB9h
              MD5:4D63766E65BF3E772CCEC2D6DB3E2D3E
              SHA1:DB541D2908159C7EF98F912D8DBC36755FFD13F3
              SHA-256:81CEA4A397AF6190FD250325CF513976B3508209AE3A88FDFD55490A5016A36D
              SHA-512:DFAF1B3547B1B1B78B33F1F0F5E9624C693492687EC5D060FC4C6CBE2AFBB61B2E9B618133636DD62364D28B2450F741561AADFDE7B811F579BBC7247343A041
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Mazatlan) {. {-9223372036854775808 -25540 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):214
              Entropy (8bit):4.76389929825594
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MBVAIgp/Ma290zpH+90/MI:MBaIMY/Mcp/Ma290zpe90/MI
              MD5:A6EFD8F443D4CB54A5FB238D4D975808
              SHA1:8F25C6C0EA9D73DC8D1964C4A28A4E2E783880CC
              SHA-256:39B34B406339F06A8D187F8CCC1B6BF2550E49329F7DCE223619190F560E75F8
              SHA-512:4B5D48472D56AF19B29AD2377573CC8CB3ED9EF1AF53C00C907B6576FA852EA3D1E9F9B3A78A280DC44F8ADBE5B81D6AEC2609BE08FFA08507CD0F4139878F46
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Mendoza)]} {. LoadTimeZoneFile America/Argentina/Mendoza.}.set TZData(:America/Mendoza) $TZData(:America/Argentina/Mendoza).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8136
              Entropy (8bit):3.7460641906933345
              Encrypted:false
              SSDEEP:192:oXxj07ffkeTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbdXvC:oXxj07ffNTzZSJw5/9/yuvQ6crD57X0w
              MD5:0D0DC4A816CDAE4707CDF4DF51A18D30
              SHA1:7ED2835AA8F723B958A6631092019A779554CADE
              SHA-256:3C659C1EAC7848BBE8DF00F857F8F81D2F64B56BD1CEF3495641C53C007434FA
              SHA-512:930F2FDC2C1EAE4106F9B37A16BCBBAF618A2CCBBA98C712E8215555CF09B9303D71842DEC38EFAF930DB71E14E8208B14E41E10B54EF98335E01435D0FC3518
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Menominee) {. {-9223372036854775808 -21027 0 LMT}. {-2659759773 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-116438400 -18000 1 CDT}. {-100112400 -21600 0 CST}. {-21484800 -18000 0 EST}. {104914800 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -21600 0 CST}. {294220800 -18000 1 CDT}. {309942000 -21600 0 CST}. {325670400 -18000 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6435
              Entropy (8bit):3.757504464563519
              Encrypted:false
              SSDEEP:192:gN41+z6stuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOVEmR:gN41+z6stuNEsRZjWqZL/1dCYDDCxyHo
              MD5:A7C5CFE3FA08D4CEDF6324457EA5766E
              SHA1:83BB96398C0B1B34771940C8F7A19CB78C5EF72F
              SHA-256:A1D7DE7285DC78ADDE1B0A04E05DA44D0D46D4696F67A682D0D28313A53825FE
              SHA-512:092DD7CEF6A5861472965E082171937EEDCFB3AE1821E3C88AA1BDFAB1EC48F765CAC497E3E5C78C19653C78B087C7CE28A8AB76F9073558963234901EF4B4A4
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Merida) {. {-9223372036854775808 -21508 0 LMT}. {-1514743200 -21600 0 CST}. {377935200 -18000 0 EST}. {407653200 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 CDT}. {1225004400 -21600 0 CST}. {1238918400 -18000 1 CD
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6462
              Entropy (8bit):3.906655458013535
              Encrypted:false
              SSDEEP:96:XP19jJ+h5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:X99jIh5sBPy+CMt/ElALLVuAH
              MD5:897140EE4C46A300FBA4B66692A77D2B
              SHA1:D5F2F3C8561A19EA0C5DAF0236696D5DB98D4220
              SHA-256:8B48C28A0AB6728CEDBCC82197355A5F9DD7D73E270EE949D996BB788777623B
              SHA-512:17E52B3C00C4EDE3B2FA10A4BE0601889B12581D31936D075E85118F37329716C4083D2B16F7081F7AA73EC9774ED7B4CF67615BE6090F8A506BF77AADE0CAFD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Metlakatla) {. {-9223372036854775808 54822 0 LMT}. {-3225223727 -31578 0 LMT}. {-2188955622 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6807
              Entropy (8bit):3.761365047166545
              Encrypted:false
              SSDEEP:192:VeE7nN41+zKstuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sQ:VeE7nN41+zKstuNEsRZjWqZL/1dCYDDK
              MD5:C675DA8A44A9841C417C585C2661EF13
              SHA1:147DDE5DD00E520DA889AC9931088E6232CE6FEA
              SHA-256:82B9AAD03408A9DFC0B6361EC923FEAEF97DBB4B3129B772B902B9DAE345D63E
              SHA-512:00615A5EC0D08BABF009C3CAAF3D631B1F4E2E4324E91B0F29ADD7E61B51C80D5D495D20BD131A9370C3005B2E510C8A4E4869A5032D82BC33C875E909CDE086
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Mexico_City) {. {-9223372036854775808 -23796 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-975261600 -18000 1 CDT}. {-963169200 -21600 0 CST}. {-917114400 -18000 1 CDT}. {-907354800 -21600 0 CST}. {-821901600 -18000 1 CWT}. {-810068400 -21600 0 CST}. {-627501600 -18000 1 CDT}. {-612990000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001836800 -21600 0 CST}. {1014184800 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6846
              Entropy (8bit):3.44227328239419
              Encrypted:false
              SSDEEP:192:FxfUaXYEn/wGm3eADKja4PcCYCJ7j7Ub0ZixJpF8pnmpRipo1kay2DfhJ+Nwz/ad:DeTntbDs
              MD5:0C7122725D98CDE5CB9B22624D24A26C
              SHA1:1889279EBE1377DB3460B706CAA4ECF803651517
              SHA-256:86BB088047FB5A6041C7B0792D15F9CB453F49A54F78529CC415B7FF2C41265A
              SHA-512:C23D3AE8D579FAC56521A0C06178550C4976E906A4CD149554821A2550B0EAB43344C6536166271EAA22EC77AF8529D9164696D7A5A740B02FA34C4272D43F26
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Miquelon) {. {-9223372036854775808 -13480 0 LMT}. {-1850328920 -14400 0 AST}. {326001600 -10800 0 -03}. {536468400 -10800 0 -02}. {544597200 -7200 1 -02}. {562132800 -10800 0 -02}. {576046800 -7200 1 -02}. {594187200 -10800 0 -02}. {607496400 -7200 1 -02}. {625636800 -10800 0 -02}. {638946000 -7200 1 -02}. {657086400 -10800 0 -02}. {671000400 -7200 1 -02}. {688536000 -10800 0 -02}. {702450000 -7200 1 -02}. {719985600 -10800 0 -02}. {733899600 -7200 1 -02}. {752040000 -10800 0 -02}. {765349200 -7200 1 -02}. {783489600 -10800 0 -02}. {796798800 -7200 1 -02}. {814939200 -10800 0 -02}. {828853200 -7200 1 -02}. {846388800 -10800 0 -02}. {860302800 -7200 1 -02}. {877838400 -10800 0 -02}. {891752400 -7200 1 -02}. {909288000 -10800 0 -02}. {923202000 -7200 1 -02}. {941342400 -10800 0 -02}. {954651600 -7200 1 -02}. {972792000 -10800 0 -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10165
              Entropy (8bit):3.73501024949866
              Encrypted:false
              SSDEEP:192:XYtQYUKXZRMavqQS8L2En/RDmzTWRf2oFnoF8l988fL8vG+81VcfnrpbX+qvlrPf:gQYzCO4alKqYvuOdeYP/Jv
              MD5:C1F34BD1FB4402481FFA5ABEE1573085
              SHA1:46B9AD38086417554549C36A40487140256BED57
              SHA-256:A4C2F586D7F59A192D6D326AD892C8BE20753FB4D315D506F4C2ED9E3F657B9A
              SHA-512:115D3E65A6A3834E748ED1917CF03A835F74EC0F8DB789C2B99EB78879EA3A5A2AFEB35981BA221D868E6A5B579374CFB3F865ACF6D4271B918EBCC2C3C69579
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Moncton) {. {-9223372036854775808 -15548 0 LMT}. {-2715882052 -18000 0 EST}. {-2131642800 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-1167595200 -14400 0 AST}. {-1153681200 -10800 1 ADT}. {-1145822400 -14400 0 AST}. {-1122231600 -10800 1 ADT}. {-1114372800 -14400 0 AST}. {-1090782000 -10800 1 ADT}. {-1082923200 -14400 0 AST}. {-1059332400 -10800 1 ADT}. {-1051473600 -14400 0 AST}. {-1027882800 -10800 1 ADT}. {-1020024000 -14400 0 AST}. {-996433200 -10800 1 ADT}. {-988574400 -14400 0 AST}. {-965674800 -10800 1 ADT}. {-955396800 -14400 0 AST}. {-934743600 -10800 1 ADT}. {-923947200 -14400 0 AST}. {-904503600 -10800 1 ADT}. {-891892800 -14400 0 AST}. {-883598400 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-757368000 -14400 0 AST}. {-747252000 -10800 1 ADT}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6496
              Entropy (8bit):3.75909042772931
              Encrypted:false
              SSDEEP:192:Xc+vN41+z6stuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOt:saN41+z6stuNEsRZjWqZL/1dCYDDCxyI
              MD5:255A5A8E27CA1F0127D71E09033C6D9B
              SHA1:4F1C5E6D3F9E5BC9F8958FA50C195FDADD0F4022
              SHA-256:C753DEF7056E26D882DCD842729816890D42B6C7E31522111467C0C39A24B2F2
              SHA-512:96A67C3CC54EC39086D4DF681DDA39B4167FE80F0C45600045480F28C282071915F793BD672146119A22E0C15339F162DFF9DF326E7132E723684EF079666F58
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Monterrey) {. {-9223372036854775808 -24076 0 LMT}. {-1514743200 -21600 0 CST}. {568015200 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {599637600 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 C
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2840
              Entropy (8bit):3.549378422404712
              Encrypted:false
              SSDEEP:48:5JJjQSSSGEcS2SrPZSMSEkS/StSneSOSnx7EXnF9XXGGLgvA/Sa8h1liqZovoJqP:X9QV0cduTSe+J1ix7inFBXGGUvA/Sa8A
              MD5:87A9F18CE5E5EE97D943316EE93DC664
              SHA1:C221C82FA644943AF05C5737B4A68418BEFE66D7
              SHA-256:E8DB201FDAF1FD43BE39422062CEB2A25F25764934C481A95CD7BB3F93949495
              SHA-512:AC7D6BA85A37585BEC2101AAF0F46B04BF49F56B449A2BEC4E32D009576CA4D0CB687981EFA96DA8DAB00453F0020925E5FB9681BF8071AC6EFFC4F938E0D891
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Montevideo) {. {-9223372036854775808 -13491 0 LMT}. {-1942690509 -13491 0 MMT}. {-1567455309 -14400 0 -04}. {-1459627200 -10800 0 -0330}. {-1443819600 -12600 0 -0330}. {-1428006600 -10800 1 -0330}. {-1412283600 -12600 0 -0330}. {-1396470600 -10800 1 -0330}. {-1380747600 -12600 0 -0330}. {-1141590600 -10800 1 -0330}. {-1128286800 -12600 0 -0330}. {-1110141000 -10800 1 -0330}. {-1096837200 -12600 0 -0330}. {-1078691400 -10800 1 -0330}. {-1065387600 -12600 0 -0330}. {-1047241800 -10800 1 -0330}. {-1033938000 -12600 0 -0330}. {-1015187400 -10800 1 -0330}. {-1002488400 -12600 0 -0330}. {-983737800 -10800 1 -0330}. {-971038800 -12600 0 -0330}. {-954707400 -10800 1 -0330}. {-938984400 -12600 0 -0330}. {-920838600 -10800 1 -0330}. {-907534800 -12600 0 -0330}. {-896819400 -10800 1 -0330}. {-853621200 -9000 0 -03}. {-845847000 -10800 0 -03}. {-33
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.696915330047381
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qMKLRXIVAIg20qMKLRI62IAcGEzQ21h4IAcGEqMKR:SlSWB9IZaM3y7RQ+VAIgpRQ+6290zQg2
              MD5:F4631583229AD8B12C548E624AAF4A9F
              SHA1:C56022CEACBD910C9CBF8C39C974021294AEE9DA
              SHA-256:884575BE85D1276A1AE3426F33153B3D4787AC5238FDBE0991C6608E7EB0DF07
              SHA-512:48FB9910D8A75AD9451C860716746D38B29319CA04DF9E8690D62FB875A5BEBCC7A8C546A60878821BD68A83271C69671D483C3133E4F807F2C3AC899CEBF065
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Toronto)]} {. LoadTimeZoneFile America/Toronto.}.set TZData(:America/Montreal) $TZData(:America/Toronto).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):205
              Entropy (8bit):4.865859395466201
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290zQ1HK90e/:MBaIMY9QpI290zQ490O
              MD5:705E51A8FB38AA8F9714256AFB55DA8A
              SHA1:97D96BE4C08F128E739D541A43057F08D24DDDCF
              SHA-256:0FED15D7D58E8A732110FF6765D0D148D15ACBB0251EE867CE7596933E999865
              SHA-512:4D7E42ECDB16F7A8A62D9EDA1E365325F3CBFAA1EF0E9FEE2790E24BA8DEAAA716D41F9389B849C69DC3973DA61D575146932FB2C8AC81579C65C18E45AE386E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Montserrat) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8260
              Entropy (8bit):3.7353311910027376
              Encrypted:false
              SSDEEP:96:JUzoaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:Gzorn+qvOTFhPI1jFIL
              MD5:6F9F530A792FC34E2B0CEE4BC3DB3809
              SHA1:4DF8A4A6993E47DD5A710BEE921D88FEF44858E7
              SHA-256:9F62117DDA0A21D37B63C9083B3C50572399B22D640262F427D68123078B32F9
              SHA-512:C2BF93FDBE8430113FA63561D1A08145DCF31CD679AB7230098993C7A19EF0F29F486C962656F8A62505CB1BFE993FBD3BB5FB0BAE7B6E7E190DE2865C445408
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nassau) {. {-9223372036854775808 -18570 0 LMT}. {-1825095030 -18000 0 EST}. {-179341200 -14400 1 EDT}. {-163620000 -18000 0 EST}. {-147891600 -14400 1 EDT}. {-131565600 -18000 0 EST}. {-116442000 -14400 1 EDT}. {-100116000 -18000 0 EST}. {-84387600 -14400 1 EDT}. {-68666400 -18000 0 EST}. {-52938000 -14400 1 EDT}. {-37216800 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {189320400 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11004
              Entropy (8bit):3.725417189649631
              Encrypted:false
              SSDEEP:96:iNXYUiZrbgZ8UMr5UwdaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:23iZrbgZ8UMr2wdrn+qvOTFhPI1jFIL
              MD5:C9D78AB6CF796A9D504BE2903F00B49C
              SHA1:A6C0E4135986A1A6F36B62276BFAB396DA1A4A9B
              SHA-256:1AB6E47D96BC34F57D56B936233F58B5C748B65E06AFF6449C3E3C317E411EFE
              SHA-512:6D20B13F337734CB58198396477B7C0E9CB89ED4D7AB328C22A4A528CAF187D10F42540DBB4514A0C139E6F4AE9A1A71AED02E3735D1D4F12C5314014C0C1EB6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/New_York) {. {-9223372036854775808 -17762 0 LMT}. {-2717650800 -18000 0 EST}. {-1633280400 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1601830800 -14400 1 EDT}. {-1583690400 -18000 0 EST}. {-1577905200 -18000 0 EST}. {-1570381200 -14400 1 EDT}. {-1551636000 -18000 0 EST}. {-1536512400 -14400 1 EDT}. {-1523210400 -18000 0 EST}. {-1504458000 -14400 1 EDT}. {-1491760800 -18000 0 EST}. {-1473008400 -14400 1 EDT}. {-1459706400 -18000 0 EST}. {-1441558800 -14400 1 EDT}. {-1428256800 -18000 0 EST}. {-1410109200 -14400 1 EDT}. {-1396807200 -18000 0 EST}. {-1378659600 -14400 1 EDT}. {-1365357600 -18000 0 EST}. {-1347210000 -14400 1 EDT}. {-1333908000 -18000 0 EST}. {-1315155600 -14400 1 EDT}. {-1301853600 -18000 0 EST}. {-1283706000 -14400 1 EDT}. {-1270404000 -18000 0 EST}. {-1252256400 -14400 1 EDT}. {-1238954400 -18000 0 EST}. {-122080680
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7836
              Entropy (8bit):3.7462966187089535
              Encrypted:false
              SSDEEP:96:rEa2raC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:rYrrn+qvOTFhPI1jFIL
              MD5:3D389AA51D3E29E8A1E8ED07646AA0DD
              SHA1:2E3DF9406B14662ADEDDC0F891CD81DF23D98157
              SHA-256:3A0FB897E5CCB31B139E009B909053DCE36BB5791ACF23529D874AFA9F0BB405
              SHA-512:AFF7B30355ECB6EBD43D1E6C943C250AB98CC82BDC8DDC7595769E4CE188A23591AEFCF18A028CC6479CF6AA20F65980E37C74F6CEE907537366136FAF29B66E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nipigon) {. {-9223372036854775808 -21184 0 LMT}. {-2366734016 -18000 0 EST}. {-1632070800 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-923252400 -14400 1 EDT}. {-880218000 -14400 0 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8404
              Entropy (8bit):3.88589736733708
              Encrypted:false
              SSDEEP:96:OWmWQm825s/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:OWmWQmI/4h5sBPy+CMt/ElALLVuAH
              MD5:F5E89780553D3D30A32CF65746CA9A69
              SHA1:43D8B6E3C5D719599A680E1E6D4FF913D2700D7E
              SHA-256:5BDA4867EC7707E9D5E07AD3E558DA7C1E44EC1135E85A8F1809441A54B22BE5
              SHA-512:D1239FF5277055DD8787BF58ED14DBDC229FC46EDDF21E034CA77DEA439631974F44FCE63EF12483520ADB83AD235642AE480230544A7284A8BDAA5296486563
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nome) {. {-9223372036854775808 46702 0 LMT}. {-3225223727 -39698 0 LMT}. {-2188947502 -39600 0 NST}. {-883573200 -39600 0 NST}. {-880196400 -36000 1 NWT}. {-769395600 -36000 1 NPT}. {-765374400 -39600 0 NST}. {-757342800 -39600 0 NST}. {-86878800 -39600 0 BST}. {-31496400 -39600 0 BST}. {-21466800 -36000 1 BDT}. {-5745600 -39600 0 BST}. {9982800 -36000 1 BDT}. {25704000 -39600 0 BST}. {41432400 -36000 1 BDT}. {57758400 -39600 0 BST}. {73486800 -36000 1 BDT}. {89208000 -39600 0 BST}. {104936400 -36000 1 BDT}. {120657600 -39600 0 BST}. {126709200 -36000 1 BDT}. {152107200 -39600 0 BST}. {162392400 -36000 1 BDT}. {183556800 -39600 0 BST}. {199285200 -36000 1 BDT}. {215611200 -39600 0 BST}. {230734800 -36000 1 BDT}. {247060800 -39600 0 BST}. {262789200 -36000 1 BDT}. {278510400 -39600 0 BST}. {294238800 -36000 1 BDT}. {309960000 -3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1349
              Entropy (8bit):3.6915980783248976
              Encrypted:false
              SSDEEP:24:cQ8eHNxrW3YrEnBrur9rTPBrJ2r+KrDv1rn1rHhr33rPxN4brSJrrh4rEgtXrH1W:5PxrW3YrEnBruxrT5rJ2r+KrDv1rn1r/
              MD5:10B0C457561BA600E9A39CE20CD22B72
              SHA1:07946FBB04D0C8D7CA92204E3E2DF3AB755196AB
              SHA-256:96AEE3A529C11C8DBDE3431C65C8C2315DBCFB5686957419EFCEB3D49208AB11
              SHA-512:A60AFB3DD064EAB9C4AE5F0A112DA5A7903BDB99DCF78BB99FE13DBB72310E8D47A2A62A58DAD2AB4F33971001F5B9787D663649E05FBD47B75994113CD5E8ED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Noronha) {. {-9223372036854775808 -7780 0 LMT}. {-1767217820 -7200 0 -02}. {-1206961200 -3600 1 -02}. {-1191366000 -7200 0 -02}. {-1175378400 -3600 1 -02}. {-1159830000 -7200 0 -02}. {-633823200 -3600 1 -02}. {-622072800 -7200 0 -02}. {-602287200 -3600 1 -02}. {-591836400 -7200 0 -02}. {-570751200 -3600 1 -02}. {-560214000 -7200 0 -02}. {-539128800 -3600 1 -02}. {-531356400 -7200 0 -02}. {-191368800 -3600 1 -02}. {-184201200 -7200 0 -02}. {-155167200 -3600 1 -02}. {-150073200 -7200 0 -02}. {-128901600 -3600 1 -02}. {-121129200 -7200 0 -02}. {-99957600 -3600 1 -02}. {-89593200 -7200 0 -02}. {-68421600 -3600 1 -02}. {-57970800 -7200 0 -02}. {499744800 -3600 1 -02}. {511232400 -7200 0 -02}. {530589600 -3600 1 -02}. {540262800 -7200 0 -02}. {562125600 -3600 1 -02}. {571194000 -7200 0 -02}. {592970400 -3600 1 -02}. {602038800 -7200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8278
              Entropy (8bit):3.7975723806562063
              Encrypted:false
              SSDEEP:192:raF2dVtXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsrXHEK5Dac5TE35:OFcVtXwDTIRqfh57Tlto//q7u379zlqw
              MD5:15AABAE9ABE4AF7ABEADF24A510E9583
              SHA1:3DEF11310D02F0492DF09591A039F46A8A72D086
              SHA-256:B328CC893D217C4FB6C84AA998009940BFBAE240F944F40E7EB900DEF1C7A5CF
              SHA-512:7A12A25EB6D6202C47CFDD9F3CE71342406F0EDA3D1D68B842BCFE97EFF1F2E0C11AD34D4EE0A61DF7E0C7E8F400C8CCA73230BDB3C677F8D15CE5CBA44775D7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/Beulah) {. {-9223372036854775808 -24427 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MS
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8278
              Entropy (8bit):3.7834920003907664
              Encrypted:false
              SSDEEP:192:LF2dK7X0N41+IestuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaT:LFcK7X0N41+IestuNEbYkzbXwDTIRqfK
              MD5:AC804124F4CE4626F5C1FDA2BC043011
              SHA1:4B3E8CC90671BA543112CEE1AB5450C6EA4615DF
              SHA-256:E90121F7D275FDCC7B8DCDEC5F8311194D432510FEF5F5F0D6F211A4AACB78EF
              SHA-512:056EF65693C16CB58EC5A223528C636346DB37B75000397D03663925545979792BBC50B20B5AA20139ECE9A9D6B73DA80C2319AA4F0609D6FC1A6D30D0567C58
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/Center) {. {-9223372036854775808 -24312 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MS
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8281
              Entropy (8bit):3.795939700557522
              Encrypted:false
              SSDEEP:192:uF2dyuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsrXHEK5Da:uFcyuNEbYkzbXwDTIRqfh57Tlto//q7k
              MD5:E26FC508DFD73B610C5543487C763FF5
              SHA1:8FBDE67AF561037AAA2EDF93E9456C7E534F4B5A
              SHA-256:387D3C57EDE8CCAAD0655F19B35BC0D124C016D16F06B6F2498C1151E4792778
              SHA-512:8A10B7370D1521EDF18AB4D5192C930ABC68AB9AE718ADF3D175EACE9A1F5DAC690A76B02EFB4059374761962D8C2660497F8E951DFE9812FB3CFCFDF9165E45
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/New_Salem) {. {-9223372036854775808 -24339 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6621
              Entropy (8bit):3.7945318113967823
              Encrypted:false
              SSDEEP:48:5gUFM/6M/Mp5tyTc8Ln4ypZ9giGuWGwZIoktiz+hL5Cw5feQ5BT5rBSNNOVQoh/5:KJNfzo+C2mWBNQMsmNTxf6AeO+cblX
              MD5:D88A28F381C79410D816F8D2D1610A02
              SHA1:81949A1CACD5907CA5A8649385C03813EEFCDDE0
              SHA-256:F65C0F8532387AFE703FACDEE325BF8D7F3D1232DEE92D65426FF917DD582CB3
              SHA-512:9A9B0C65ECDFF690EF2933B323B3A1CF2D67D0A43F285BB9FEEFF275316148A07F5AC044C48F64E3D8CFA7C1DE44AF220A6855DC01225F8BFFF63AEC946B944A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Ojinaga) {. {-9223372036854775808 -25060 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {820476000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {883634400 -21600 0 CST}. {891766800 -21600 0 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600 1 MDT}. {1162108800 -2520
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.924365872261203
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52IAcGEu5fcXGm2OHGf8xYvX5BidhZSsc1HRX1vain:SlSWB9X5290WTm2OHDxYP5GhZE3X1iin
              MD5:771816CABF25492752C5DA76C5EF74A5
              SHA1:6494F467187F99C9A51AB670CD8DC35078D63904
              SHA-256:0E323D15EA84D4B6E838D5DCD99AEE68666AF97A770DA2AF84B7BDCA4AB1DBBA
              SHA-512:C32D918E121D800B9DFD5CE1F13A4BF2505C0EDCE0085639C8EDF48073E0888906F1A28EF375BDCF549DB14CD33F7C405E28BC35DDF22445C224FBC64146B4EC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Panama) {. {-9223372036854775808 -19088 0 LMT}. {-2524502512 -19176 0 CMT}. {-1946918424 -18000 0 EST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7484
              Entropy (8bit):3.768929501362495
              Encrypted:false
              SSDEEP:192:i2KFEUlpde9pXbO53or0gqvOTFhPI1jFIL:n0r3+
              MD5:2701DA468F9F1C819301374E807AAA27
              SHA1:F08D7525639EA752D52F36A6D14F14C5514CED8E
              SHA-256:6C7DFDE581AC9DE7B4ED6A525A40F905B7550BD2AE7E55D7E2E1B81B771D030B
              SHA-512:98BD9EDD40D2982E20A169B8B8E8D411382E5707634BB4F8365CFFF73DB17B8C042D7ED1A59B9511A3A7EB587895119532CCED69F5EFBC49D74FFDC9CA91966F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Pangnirtung) {. {-9223372036854775808 0 0 -00}. {-1546300800 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-147902400 -7200 1 ADDT}. {-131572800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}. {357112800 -10800 1 ADT}. {372834000 -14400 0 AST}. {388562400 -10800 1 ADT}. {404888400 -14400 0 AST}. {420012000 -10800 1 ADT}. {436338000 -14400 0 AST}. {452066400 -10800 1 ADT}. {467787600 -14400 0 AST}. {483516000 -10800 1 ADT}. {499237200 -14400 0 AST}. {514965600 -10800 1 ADT}. {530686800 -14400 0 AST}. {544600800 -10800 1 ADT}. {562136400 -14400 0 AST}. {576050400 -10800 1 ADT}. {594190800 -14400 0 AST}. {607500000 -10800 1 ADT}. {625640400 -14400 0 AST}. {638949600 -10800 1 ADT}. {657090000 -14400 0 AST}. {671004000 -10800 1 ADT}. {688539600 -14400 0 AST}. {702
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):244
              Entropy (8bit):4.731092370398455
              Encrypted:false
              SSDEEP:6:SlSWB9X5290oldJm2OHeke3FIMVTvVOzGXg/VVFAHC:MBp5290olLmdHeV3qSv4zX/OHC
              MD5:5D11C2A86B0CDE60801190BFC8FA5E0B
              SHA1:38A63200995E359E61F1DEA00C5716938ED7A499
              SHA-256:D2078D8D396D5189E1D3555628960990FD63694D08256FF814EE841E01A3F56E
              SHA-512:D4D83019E5AE05C3FCDE3518672DC08925C0DECC9FCA6927D75ADA969647CE8EF2D1C67FFD1A075969309CD1B1AADDF15DB21ABDAF241EAA450D2C9E038AEF6A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Paramaribo) {. {-9223372036854775808 -13240 0 LMT}. {-1861906760 -13252 0 PMT}. {-1104524348 -13236 0 PMT}. {-765317964 -12600 0 -0330}. {465449400 -10800 0 -03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):479
              Entropy (8bit):4.379302206927978
              Encrypted:false
              SSDEEP:12:MBp5290OQmdH514YPFotFg4tFQxRgmjtFdRb2:cQCeksFsFgcFQxBhF7b2
              MD5:1B5C5CBC4168FCCC9100487D3145AF6D
              SHA1:6E9E3074B783108032469C8E601D2C63A573B840
              SHA-256:9E28F87C0D9EE6AD6791A220742C10C135448965E1F66A7EB04D6477D8FA11B0
              SHA-512:4A6527FF5C7F0A0FDC574629714399D9A475EDC1338BF4C9EEEEDCC8CA23E14D2DE4DCA421D46FABA813A65236CD7B8ADBE103B641A763C6BC508738BF73A58C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Phoenix) {. {-9223372036854775808 -26898 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-820519140 -25200 0 MST}. {-796841940 -25200 0 MST}. {-94669200 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-56221200 -25200 0 MST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6398
              Entropy (8bit):3.770736282266079
              Encrypted:false
              SSDEEP:48:5IV1C8phBVSWroLMEbF8xzqXtWl5Hm0RU+5oaIOWIF4IPWFeB/5udPOcBqYZ4vxl:mKXrvOTFhP5S+ijFnRaJeaX1eyDt
              MD5:7802A7D0CAEECF52062EA9AAC665051A
              SHA1:D965CD157A99FD258331A45F5E86B8F17A444D2B
              SHA-256:3D1BEDC932E5CB6315438C7EF060824C927C547009EEA25E8CF16C9D8C4A28B6
              SHA-512:4D369FF44CC1B1CBA75C0249B032581BA792830479D22C418C5B0599975E715B8983D93F52B00793F2A419F530BC8877D2DA251393592FD6B865499A97875FD8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Port-au-Prince) {. {-9223372036854775808 -17360 0 LMT}. {-2524504240 -17340 0 PPMT}. {-1670483460 -18000 0 EST}. {421218000 -14400 1 EDT}. {436334400 -18000 0 EST}. {452062800 -14400 1 EDT}. {467784000 -18000 0 EST}. {483512400 -14400 1 EDT}. {499233600 -18000 0 EST}. {514962000 -14400 1 EDT}. {530683200 -18000 0 EST}. {546411600 -14400 1 EDT}. {562132800 -18000 0 EST}. {576050400 -14400 1 EDT}. {594194400 -18000 0 EST}. {607500000 -14400 1 EDT}. {625644000 -18000 0 EST}. {638949600 -14400 1 EDT}. {657093600 -18000 0 EST}. {671004000 -14400 1 EDT}. {688543200 -18000 0 EST}. {702453600 -14400 1 EDT}. {719992800 -18000 0 EST}. {733903200 -14400 1 EDT}. {752047200 -18000 0 EST}. {765352800 -14400 1 EDT}. {783496800 -18000 0 EST}. {796802400 -14400 1 EDT}. {814946400 -18000 0 EST}. {828856800 -14400 1 EDT}. {846396000 -18000 0 EST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):155
              Entropy (8bit):5.077805073731929
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52IAcGEuPXGkXGm2OHUnvUdxKzVvwvYv:SlSWB9X5290eSm2OHkzVr
              MD5:8169D55899164E2168EF50E219115727
              SHA1:42848A510C120D4E834BE61FC76A1C539BA88C8A
              SHA-256:6C8718C65F99AB43377609705E773C93F7993FBB3B425E1989E8231308C475AF
              SHA-512:1590D42E88DD92542CADC022391C286842C156DA4795877EA67FEF045E0A831615C3935E08098DD71CF29C972EDC79084FFCC9AFAB7813AE74EEE14D6CFEFB9D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Port_of_Spain) {. {-9223372036854775808 -14764 0 LMT}. {-1825098836 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):196
              Entropy (8bit):4.818272118524638
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7thtedVAIgpthKQ290msh490thB:MBaIMYdxpR290v490x
              MD5:1C0C736D0593654230FCBB0DC275313B
              SHA1:00518615F97BCFF2F6862116F4DF834B70E2D4CA
              SHA-256:5C97E6DF0FC03F13A0814274A9C3A983C474000AE3E78806B38DF9208372FD54
              SHA-512:2252D17CB4F770124586BBF35974077212B92C1587071C9F552F1EFAC15CBF92128E61C456F9F5154D212F7D66CC5BD85B76B1187D5A6F24E89E14EDF322D67F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Rio_Branco)]} {. LoadTimeZoneFile America/Rio_Branco.}.set TZData(:America/Porto_Acre) $TZData(:America/Rio_Branco).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1016
              Entropy (8bit):3.7660008200834842
              Encrypted:false
              SSDEEP:24:cQQe478Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSj/f:5bSaSwXS4SqSbS3JSySxSxcSESAlSQSv
              MD5:5E4CB713378D22D90A1A86F0AF33D6E8
              SHA1:CF4B2A68873BF778257D40AEA887D4BCBEE6CC72
              SHA-256:6D7F49E0A67C69A3945DA4BC780653C8D875650536A810610A6518080CC483DB
              SHA-512:06559B6E80BCDD42120398E19CCB3AEE8A1B08E09D0DF07DB9CCD68A863A7670D6D6457018CE3D9E23FE359D3E2EC0D249134EE0D969C0312665975B67DB8E80
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Porto_Velho) {. {-9223372036854775808 -15336 0 LMT}. {-1767210264 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):273
              Entropy (8bit):4.728240676465187
              Encrypted:false
              SSDEEP:6:SlSWB9X5290pbm2OH9VPMGoeVVFrZVVFUFkeF3k/eJpR/r:MBp5290lmdHvPMpe/ZZ/uFkeF3k/eJ/D
              MD5:2FB893819124F19A7068F802D6A59357
              SHA1:6B35C198F74FF5880714A3182407858193CE37A4
              SHA-256:F05530CFBCE7242847BE265C2D26C8B95B00D927817B050A523FFB139991B09E
              SHA-512:80739F431F6B3548EFD4F70FE3630F66F70CB29B66845B8072D26393ADD7DAB22675BE6DA5FBDC7561D4F3F214816AAD778B6CD0EE45264B4D6FFA48B3AC7C43
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Puerto_Rico) {. {-9223372036854775808 -15865 0 LMT}. {-2233035335 -14400 0 AST}. {-873057600 -10800 0 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-757368000 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3576
              Entropy (8bit):3.5316229197228632
              Encrypted:false
              SSDEEP:96:Yv9+P8pYraRo+kP0pDrMb6UHlRnHqhTxxJAHXEa9c0yq/g2tw5E8fIk5iWpOFZAd:YoP8pYraRo+kP0pDrMb60RnHqhTxxJAw
              MD5:1FFFED9AA83AA3CA9E7330AA27E8D188
              SHA1:9B45F2662C1F3F0799ED4221E843483674878F43
              SHA-256:FECDC08709D5852A07D8F5C7DD7DBDBCD3D864A0893248E3D3932A2F848EB4B2
              SHA-512:8F6D51F94A91168EE092972316E150C2B487808EA3506F77FD028F84436FE29AD5BAD50A8DB65BCFB524D5A12DC1C66C5C0BC9A7FC6AE8A0EAAED6F4BA5ADED7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Punta_Arenas) {. {-9223372036854775808 -17020 0 LMT}. {-2524504580 -16966 0 SMT}. {-1892661434 -18000 0 -05}. {-1688410800 -16966 0 SMT}. {-1619205434 -14400 0 -04}. {-1593806400 -16966 0 SMT}. {-1335986234 -18000 0 -05}. {-1335985200 -14400 1 -05}. {-1317585600 -18000 0 -05}. {-1304362800 -14400 1 -05}. {-1286049600 -18000 0 -05}. {-1272826800 -14400 1 -05}. {-1254513600 -18000 0 -05}. {-1241290800 -14400 1 -05}. {-1222977600 -18000 0 -05}. {-1209754800 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1178132400 -14400 0 -04}. {-870552000 -18000 0 -05}. {-865278000 -14400 0 -04}. {-718056000 -18000 0 -05}. {-713649600 -14400 0 -04}. {-36619200 -10800 1 -04}. {-23922000 -14400 0 -04}. {-3355200 -10800 1 -04}. {7527600 -14400 0 -04}. {24465600 -10800 1 -04}. {37767600 -14400 0 -04}. {55915200 -10800 1 -04}. {69217200 -14400 0 -04}. {87
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7840
              Entropy (8bit):3.75014960690837
              Encrypted:false
              SSDEEP:192:k+iBktTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbdXvDXpVS:k+iBmTzZSJw5/9/yuvQ6crD57X0N41+a
              MD5:9C10496730E961187C33C1AE91C8A60D
              SHA1:A77E3508859FB6F76A7445CD13CD42348CB4EBC7
              SHA-256:136F0A49742F30B05B7C6BF3BF014CC999104F4957715D0BEB39F5440D5216DF
              SHA-512:70936E65D0B439F6BE6E31E27032F10BA2EB54672647DA615744ABC7A767F197F0C7FDBCCEE0D335CBCECB6855B7BD899D1A5B97BA5083FFA42AF5F30343EA7F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rainy_River) {. {-9223372036854775808 -22696 0 LMT}. {-2366732504 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-923248800 -18000 1 CDT}. {-880214400 -18000 0 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {136368000 -18000 1 CDT}. {152089200 -21600 0 CST}. {167817600 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -21600 0 CST}. {294220800 -18000 1 CDT}. {309942000 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7366
              Entropy (8bit):3.749928775816306
              Encrypted:false
              SSDEEP:192:vw5/9/yuvQ+hcrD57X0N41+IstuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u37N:vw5/9/yuvQ6crD57X0N41+IstuNEbYkJ
              MD5:54F6D5098A0CF940F066EADEEA234A57
              SHA1:20B9FE5F6F70E97420A6D9939AA43C4CCFA8231B
              SHA-256:AA68088E41A018002E5CE12B14F8910E5ECE5F26D5854092E351BAAC2F90DB2B
              SHA-512:9EC1AF599604CEE266D9A4377B6CDABF94E61D0177CBC2158122406BF551AE0E3EE4CF147B28A382277B015CCB8F4405DB3EB3AE6425431EBB43CCDE08AEA3E1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rankin_Inlet) {. {-9223372036854775808 0 0 -00}. {-410227200 -21600 0 CST}. {-147895200 -14400 1 CDDT}. {-131565600 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}. {499244400 -21600 0 CST}. {514972800 -18000 1 CDT}. {530694000 -21600 0 CST}. {544608000 -18000 1 CDT}. {562143600 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {607507200 -18000 1 CDT}. {625647600 -21600 0 CST}. {638956800 -18000 1 CDT}. {657097200 -21600 0 CST}. {671011200 -18000 1 CDT}. {688546800 -21600 0 CST}. {702460800 -18000 1 CDT}. {719996400 -21600 0 CST}. {733910400 -18000 1 CDT}. {75205
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1372
              Entropy (8bit):3.6943875149362064
              Encrypted:false
              SSDEEP:24:cQHJeHQc4h1u80V2dBUGphmC17ewGtN3rvIh0VBHZDIykqWoN:5Kh4h19U2dBUGrmO7XGtN3kh0VBHZUnk
              MD5:1567A3F3419D1A4FCF817A6EDC11769E
              SHA1:2970F9EDD76B77A843D31F518587C17A05EC4C43
              SHA-256:3F62246DF3A378815772D9D942033FB235B048B62F5EF52A3DCD6DB3871E0DB5
              SHA-512:567BEAC48AE0FEEB32FE40EEA73EB4601DBDBF72FA963777E5F5C3E9972E2AD7A359301E80E574592AFB3045414A177D0ABD38DF958BD5317B02D4DFD2DCE607
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Recife) {. {-9223372036854775808 -8376 0 LMT}. {-1767217224 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {60
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1723
              Entropy (8bit):3.956012642028802
              Encrypted:false
              SSDEEP:48:56ecDOBDgE+hIZVEa3lGw+6yZgTX+rNO46wYDW:86VlGS8
              MD5:7D955B277C43D51F19377A91B987FAF9
              SHA1:F2F3E11E955C3E58E21654F3D841B5B1528C0913
              SHA-256:A1FA7BF002B3BA8DCA4D52AA0BB41C047DDAF88B2E542E1FCF81CB3AAF91AA75
              SHA-512:719DEE7A932EDB9255D711E82AC0CA3FCFB07AF3EFE2EE0D887D7137F6059BEBE07F85D910CC0005391D244B4EADA16257BE49787938386FD4B5DB6D8E31D513
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Regina) {. {-9223372036854775808 -25116 0 LMT}. {-2030202084 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1251651600 -21600 1 MDT}. {-1238349600 -25200 0 MST}. {-1220202000 -21600 1 MDT}. {-1206900000 -25200 0 MST}. {-1188752400 -21600 1 MDT}. {-1175450400 -25200 0 MST}. {-1156698000 -21600 1 MDT}. {-1144000800 -25200 0 MST}. {-1125248400 -21600 1 MDT}. {-1111946400 -25200 0 MST}. {-1032714000 -21600 1 MDT}. {-1016992800 -25200 0 MST}. {-1001264400 -21600 1 MDT}. {-986148000 -25200 0 MST}. {-969814800 -21600 1 MDT}. {-954093600 -25200 0 MST}. {-937760400 -21600 1 MDT}. {-922039200 -25200 0 MST}. {-906310800 -21600 1 MDT}. {-890589600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-748450800 -21600 1 MDT}. {-732729600 -25200 0 MST}. {-715791600 -21600 1 MDT}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7362
              Entropy (8bit):3.7460671071064846
              Encrypted:false
              SSDEEP:192:iw5/9/yuvQ+hcrD57X0N41+IstuNESkzbXwDTIRqfhXbdXvDXpVXVto//q7u379L:iw5/9/yuvQ6crD57X0N41+IstuNESkzV
              MD5:07FFF43B350D520D13D91701618AD72E
              SHA1:8D4B36A6D3257509C209D0B78B58982709FB8807
              SHA-256:39E13235F87A1B8621ADA62C9AD2EBF8E17687C5533658E075EFA70A04D5C78D
              SHA-512:37397A2621F0A1EA6B46F6769D583CAEA9703924A2C652B8B58FA4C7DBA8E789BA8FE442FB2C77504E495617591FB138AD733063E3A4A0153ED2B26D4B863018
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Resolute) {. {-9223372036854775808 0 0 -00}. {-704937600 -21600 0 CST}. {-147895200 -14400 1 CDDT}. {-131565600 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}. {499244400 -21600 0 CST}. {514972800 -18000 1 CDT}. {530694000 -21600 0 CST}. {544608000 -18000 1 CDT}. {562143600 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {607507200 -18000 1 CDT}. {625647600 -21600 0 CST}. {638956800 -18000 1 CDT}. {657097200 -21600 0 CST}. {671011200 -18000 1 CDT}. {688546800 -21600 0 CST}. {702460800 -18000 1 CDT}. {719996400 -21600 0 CST}. {733910400 -18000 1 CDT}. {752050800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1075
              Entropy (8bit):3.7557219407321303
              Encrypted:false
              SSDEEP:24:cQYEeH5yyss/u/C5/ukCI/uiCk/u8CHe/uOCXs/um4Co/uN3Cc/ux8CL/uiFCy/i:5q5xs5IlTToo4mdGFtapG8dtedkFL
              MD5:9AA66AEB91380EFD3313338A2DCBE432
              SHA1:2D86915D1F331CC7050BBFAAE3315CE1440813C1
              SHA-256:53DB45CF4CB369DA06C31478A793E787541DA0E77C042EBC7A10175A6BB6EFF6
              SHA-512:C9B4F6544B4A1E77BFF6D423A9AD5E003E32FA77B00ECC2A7AF6D2279ACC849ABE331E5DE27C450A6BF86ECC2450CEBFAB4880AB69C54649D4C7EE0AF05CD377
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rio_Branco) {. {-9223372036854775808 -16272 0 LMT}. {-1767209328 -18000 0 -05}. {-1206950400 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1175367600 -14400 1 -05}. {-1159819200 -18000 0 -05}. {-633812400 -14400 1 -05}. {-622062000 -18000 0 -05}. {-602276400 -14400 1 -05}. {-591825600 -18000 0 -05}. {-570740400 -14400 1 -05}. {-560203200 -18000 0 -05}. {-539118000 -14400 1 -05}. {-531345600 -18000 0 -05}. {-191358000 -14400 1 -05}. {-184190400 -18000 0 -05}. {-155156400 -14400 1 -05}. {-150062400 -18000 0 -05}. {-128890800 -14400 1 -05}. {-121118400 -18000 0 -05}. {-99946800 -14400 1 -05}. {-89582400 -18000 0 -05}. {-68410800 -14400 1 -05}. {-57960000 -18000 0 -05}. {499755600 -14400 1 -05}. {511243200 -18000 0 -05}. {530600400 -14400 1 -05}. {540273600 -18000 0 -05}. {562136400 -14400 1 -05}. {571204800 -18000 0 -05}. {590040000 -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):214
              Entropy (8bit):4.752946571641783
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7/MdVAIgp/MOF290rI5290/Msn:MBaIMY/M4p/MOF290r190/Ms
              MD5:4FC460A084DF33A73F2F87B7962B0084
              SHA1:45E70D5D68FC2DE0ACFF76B062ADA17E0021460F
              SHA-256:D1F5FFD2574A009474230E0AA764256B039B1D78D91A1CB944B21776377B5B70
              SHA-512:40045420FE88FA54DE4A656534C0A51357FBAB3EA3B9120DA15526A9DEC7EEC2C9799F4D9A72B6050474AD67490BC28540FDA0F17B7FCAF125D41CBCA96ECCDE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Cordoba)]} {. LoadTimeZoneFile America/Argentina/Cordoba.}.set TZData(:America/Rosario) $TZData(:America/Argentina/Cordoba).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):189
              Entropy (8bit):4.820569634622523
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo2IAcGEtX2exp4IAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo290tX2U49Q
              MD5:75EA3845AFED3FBBF8496824A353DA32
              SHA1:207A1520F041B09CCD5034E6E87D3F7A4FBD460E
              SHA-256:2FACC167377FC1F592D2926829EB2980F58BE38D50424F64DFA04A2ECBBE1559
              SHA-512:B9D4DB95CEA1DADCE27264BBD198676465854E9C55D6BB175966D860D9AF7014F6635A945510602C0A9FBF08596B064DAE7D30589886960F06B2F8E69786CFF6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:America/Santa_Isabel) $TZData(:America/Tijuana).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1043
              Entropy (8bit):3.7336343389566795
              Encrypted:false
              SSDEEP:24:cQceUh8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSj/X:57SaSwXS4SqSbS3JSySxSxcSESAlSQSn
              MD5:8F5EAA4F5099B82EDD68893C5D99A0EF
              SHA1:1B21DAD0CD54E083A6EADCFD57CA8F58759189AD
              SHA-256:1A46357BC4FE682AF78FFAB10A6A88893BEF50AECC6ACA217A5EBC1B98C01C07
              SHA-512:2C82822CCA208E900383A1B55882BFC3559EC116C5B5AD2452BA367594AEF36F34C316FFA18B2BAB71A82FC382559069385947548EE9902FEDCDED084801ABF2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santarem) {. {-9223372036854775808 -13128 0 LMT}. {-1767212472 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -14
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8582
              Entropy (8bit):3.4381885094053835
              Encrypted:false
              SSDEEP:192:LCA/E8pYraRo+kP0pDrMb60RnHqhTxxJA3Ea9c0yq/g2tw5E8Q+iWMFeHpkUu9/6:LRNBnrR59bPYUt
              MD5:47BED3B60EF45B00267B4D628A2F18C4
              SHA1:B3827DF571CF2CA16074188CE0E3061E296B8B26
              SHA-256:51BB12A2397CAD3D412C9E8F3BA06DD98CC379F999DB3D00ED651A84DA1D6D1C
              SHA-512:8DA831A0EAB180C982395F2BA85952959A676AADA87823E56C5B643FEB7082B6605FD3645D880B19F3F9EE5B25353002309CDB37AE68F1B3A192AE1280B74404
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santiago) {. {-9223372036854775808 -16966 0 LMT}. {-2524504634 -16966 0 SMT}. {-1892661434 -18000 0 -05}. {-1688410800 -16966 0 SMT}. {-1619205434 -14400 0 -04}. {-1593806400 -16966 0 SMT}. {-1335986234 -18000 0 -05}. {-1335985200 -14400 1 -05}. {-1317585600 -18000 0 -05}. {-1304362800 -14400 1 -05}. {-1286049600 -18000 0 -05}. {-1272826800 -14400 1 -05}. {-1254513600 -18000 0 -05}. {-1241290800 -14400 1 -05}. {-1222977600 -18000 0 -05}. {-1209754800 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1178132400 -14400 0 -04}. {-870552000 -18000 0 -05}. {-865278000 -14400 0 -04}. {-740520000 -10800 1 -03}. {-736376400 -14400 0 -04}. {-718056000 -18000 0 -05}. {-713649600 -14400 0 -04}. {-36619200 -10800 1 -04}. {-23922000 -14400 0 -04}. {-3355200 -10800 1 -04}. {7527600 -14400 0 -04}. {24465600 -10800 1 -04}. {37767600 -14400 0 -04}. {55
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):595
              Entropy (8bit):4.2614212422453726
              Encrypted:false
              SSDEEP:12:MBp5290/SyJmdHhvPu4/G/uFNM/KMVvMj/+MVvMqx/r0XVvMnUB/B7VvMa6I8/0p:cQ+DJeVu4e/uICEkFvxwdqUBZp965VPO
              MD5:04F2A2C789E041270354376C3FD90D2D
              SHA1:D0B89262D559021FAC035A519C96D2A2FA417F9C
              SHA-256:42EF317EA851A781B041DC1951EA5A3EA1E924149C4B868ECD75F24672B28FA8
              SHA-512:F8D072527ED38C2FF1C9E08219104213352B2EFA1171C0D1E02B6B1542B4929D0C4640B441326791CC86F23206621CD4E0D3247CBAB1F99B63E65DB667F3DFED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santo_Domingo) {. {-9223372036854775808 -16776 0 LMT}. {-2524504824 -16800 0 SDMT}. {-1159773600 -18000 0 EST}. {-100119600 -14400 1 EDT}. {-89668800 -18000 0 EST}. {-5770800 -16200 1 -0430}. {4422600 -18000 0 EST}. {25678800 -16200 1 -0430}. {33193800 -18000 0 EST}. {57733200 -16200 1 -0430}. {64816200 -18000 0 EST}. {89182800 -16200 1 -0430}. {96438600 -18000 0 EST}. {120632400 -16200 1 -0430}. {127974600 -18000 0 EST}. {152082000 -14400 0 AST}. {975823200 -14400 0 AST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7552
              Entropy (8bit):3.4588792656032914
              Encrypted:false
              SSDEEP:192:Lam19U2gUGrpzsVE0OjmicnyVkHZWWWE/+ZqPuWcBpR4xHtMlAbGCoGzvGmFGgh4:L3Yc8u9U
              MD5:DEA27A3FE65A22BE42A97C6AB58E9687
              SHA1:CD50184C4D1739CF5568E21683980FC63C9BFF24
              SHA-256:AFA706258270F20F9317FF5B84957A2DF77842D564922C15DC302F7A8AB59CEC
              SHA-512:34C306EC889C10988B3D9C236903417BCA1590E96CD60AE700882C064CCC410132265F106BB10D9593AFFA32B923728FBDDFB6DEE77CAF4A058C877F4D5F1EF1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Sao_Paulo) {. {-9223372036854775808 -11188 0 LMT}. {-1767214412 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-195429600 -7200 1 -02}. {-189381600 -7200 0 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6593
              Entropy (8bit):3.4670685654529194
              Encrypted:false
              SSDEEP:96:URW/ukG9UDHaXZgsP/N/LWAWVF20V/VapcJlNcnkF0:BuZUDHaXZgsN/FWVFjHv0
              MD5:7E7EF4D67CCD455833603F7EF9E374A6
              SHA1:4AD722F75FC88572DD5A2CD1845FF5F68ED4B58A
              SHA-256:2B5B2A00793545C8D32437D7DAA2A36B42D3B1B7421054621841E2919F713294
              SHA-512:0688EB3EBDE78E18EE5E31DE57F1CBE0BF10071A6EDC97D284B2B3E1E22975262190934446C202E90EFD161686F4790342EDDBCACADB3A65B0AC6C1A9099C79F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Scoresbysund) {. {-9223372036854775808 -5272 0 LMT}. {-1686090728 -7200 0 -02}. {323841600 -3600 0 -01}. {338961600 -7200 0 -02}. {354679200 0 0 +00}. {370400400 -3600 0 -01}. {386125200 0 1 +00}. {401850000 -3600 0 -01}. {417574800 0 1 +00}. {433299600 -3600 0 -01}. {449024400 0 1 +00}. {465354000 -3600 0 -01}. {481078800 0 1 +00}. {496803600 -3600 0 -01}. {512528400 0 1 +00}. {528253200 -3600 0 -01}. {543978000 0 1 +00}. {559702800 -3600 0 -01}. {575427600 0 1 +00}. {591152400 -3600 0 -01}. {606877200 0 1 +00}. {622602000 -3600 0 -01}. {638326800 0 1 +00}. {654656400 -3600 0 -01}. {670381200 0 1 +00}. {686106000 -3600 0 -01}. {701830800 0 1 +00}. {717555600 -3600 0 -01}. {733280400 0 1 +00}. {749005200 -3600 0 -01}. {764730000 0 1 +00}. {780454800 -3600 0 -01}. {796179600 0 1 +00}. {811904400 -3600 0 -01}. {828234000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.840231755053259
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0L2IAcGEtOFBx+IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iL290tO09G
              MD5:65307038DB12A7A447284DF4F3E6A3E8
              SHA1:DC28D6863986D7A158CEF239D46BE9F5033DF897
              SHA-256:3FD862C9DB2D5941DFDBA5622CC53487A7FC5039F7012B78D3EE4B58753D078D
              SHA-512:91BC29B7EC9C49D4020DC26F682D0EFBBBEE83D10D79C766A08C78D5FF04D9C0A09288D9696A378E777B65E0C2C2AC8A218C12F86C45BD6E7B5E204AE5FC2335
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:America/Shiprock) $TZData(:America/Denver).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8376
              Entropy (8bit):3.8793735356495116
              Encrypted:false
              SSDEEP:96:lG19jJps/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:lM9jI/4h5sBPy+CMt/ElALLVuAH
              MD5:2F2C91BD29B32A281F9FB1F811953ACB
              SHA1:49102C37397CC9B7CDCDCE6A76F9BE03D0B446AB
              SHA-256:6ABBF55FEE7839B9EEEBB97EA53E185E1A0E189843531257708258841A35EB76
              SHA-512:FB06D4FE28BD9DD9D56A7365F1E2CC7434678B8850CECF99A232F07B4B720F092980EC337C279E599A12E54548DE6AC253547FE4C255BEFA7B545F8C93375589
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Sitka) {. {-9223372036854775808 53927 0 LMT}. {-3225223727 -32473 0 LMT}. {-2188954727 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677600 -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):208
              Entropy (8bit):4.905980413237828
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290txP90e/:MBaIMY9QpI2907P90O
              MD5:B6E45D20EB8CC73A77B9A75578E5C246
              SHA1:19C6BB6ED12B6943CF7BDFFE4C8A8D72DB491E44
              SHA-256:31E60EAC8ABFA8D3DAD501D3BCDCA7C4DB7031B65ADDA24EC11A6DEE1E3D14C3
              SHA-512:C0F3BF8D106E77C1000E45D0A6C8E7C05B7B97EFA2EECCA45FEF48EB42FBDD5336FD551C794064EADFB6919A12813FF66B2F95722877432B4A48B1FBA6C5409D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Barthelemy) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10917
              Entropy (8bit):3.7872036312069963
              Encrypted:false
              SSDEEP:192:Vvprjhbvd8mSGu9EnkBVAZK2GrbrvZeuqpNFT:Vvbvd7SGu9lzoVpDT
              MD5:F87531D6DC9AAFB2B0F79248C5ADA772
              SHA1:E14C52B0F564FA3A3536B7576A2B27D4738CA76B
              SHA-256:0439DA60D4C52F0E777431BF853D366E2B5D89275505201080954D88F6CA9478
              SHA-512:5B43CE25D970EEEFD09865D89137388BD879C599191DE8ACE37DA657C142B6DF63143DBF9DED7659CBD5E45BAB699E2A3AFDD28C76A7CB2F300EBD9B74CDA59D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/St_Johns) {. {-9223372036854775808 -12652 0 LMT}. {-2713897748 -12652 0 NST}. {-1664130548 -9052 1 NDT}. {-1650137348 -12652 0 NST}. {-1640982548 -12652 0 NST}. {-1632076148 -9052 1 NDT}. {-1615145348 -12652 0 NST}. {-1609446548 -12652 0 NST}. {-1598650148 -9052 1 NDT}. {-1590100148 -12652 0 NST}. {-1567286948 -9052 1 NDT}. {-1551565748 -12652 0 NST}. {-1535837348 -9052 1 NDT}. {-1520116148 -12652 0 NST}. {-1503782948 -9052 1 NDT}. {-1488666548 -12652 0 NST}. {-1472333348 -9052 1 NDT}. {-1457216948 -12652 0 NST}. {-1440883748 -9052 1 NDT}. {-1425767348 -12652 0 NST}. {-1409434148 -9052 1 NDT}. {-1394317748 -12652 0 NST}. {-1377984548 -9052 1 NDT}. {-1362263348 -12652 0 NST}. {-1346534948 -9052 1 NDT}. {-1330813748 -12652 0 NST}. {-1314480548 -9052 1 NDT}. {-1299364148 -12652 0 NST}. {-1283030948 -9052 1 NDT}. {-1267914548 -12652 0 NS
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):203
              Entropy (8bit):4.878034750755565
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tMp490e/:MBaIMY9QpI290g490O
              MD5:B149DC2A23F741BA943E5511E35370D3
              SHA1:3C8D3CFDB329B7ECB90C19D3EB3DE6F33A063ADD
              SHA-256:36046A74F6BB23EA8EABA25AD3B93241EBB509EF1821CC4BEC860489F5EC6DCA
              SHA-512:CEB38EC2405A3B0A4E09CDD2D69A11884CCB28DA0FD7CF8B344E1472642A0571674D3ED33C639E745DDEEE741E52B0948B86DFFFD324BB07A9F1A6B9F38F898E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Kitts) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):203
              Entropy (8bit):4.89157166321909
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0uPXoFVAIg20uPXhF2IAcGEtkS+IAcGEuPX/:SlSWB9IZaM3y7eoFVAIgpeX290tY90e/
              MD5:7B7FCA150465F48FAC9F392C079B6376
              SHA1:1B501288CC00E8B90A2FAD82619B49A9DDBE4475
              SHA-256:87203A4BF42B549FEBF467CC51E8BCAE01BE1A44C193BED7E2D697B1C3D268C9
              SHA-512:5E4F7EE08493547A012144884586D45020D83B5838254C257FD341B8B6D3F9E279013D068EFC7D6DF7569DDD20122B3B23E9C93A0017FB64E941A50311ED1F18
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Lucia) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):204
              Entropy (8bit):4.888871207225013
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tXIMFJ490e/:MBaIMY9QpI290tJ490O
              MD5:7E272CE31D788C2556FF7421F6832314
              SHA1:A7D89A1A9AC2B61D98690126D1E4C1595E160C8F
              SHA-256:F0E10D45C929477A803085B2D4CE02EE31FD1DB24855836D02861AD246BC34D9
              SHA-512:CCDF0B1B5971B77F6FA27F25900DB1AB9A4A4C69E15DCDF4EA35E1E1FC31AAD957C2E5862B411B0155BB1E25E2DD417A89168295317B1E603DA59142D76CE80A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Thomas) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):205
              Entropy (8bit):4.876306758637305
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tzb+Q90e/:MBaIMY9QpI290xyQ90O
              MD5:52DAAF1636B5B70E0BA2015E9F322A74
              SHA1:4BD05207601CF6DB467C27052EBB25C9A64DAC96
              SHA-256:A5B3687BBA1D14D52599CB355BA5F4399632BF98DF4CEB258F9C479B1EA73586
              SHA-512:E3DE0447236F6EA24D173CCB46EA1A4A31B5FFBCE2A442CD542DA8C54DAD22391FD1CA301776C0FB07CBCF256FC708E61B7BBA682C02EEBE03BECCEA2B6D3BD0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Vincent) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):845
              Entropy (8bit):4.182525430299964
              Encrypted:false
              SSDEEP:24:cQce7eUFLxsOCX+FmFyyFDVFdPFxFZA8uFZYV:5NecLGO+6yZzXDZA8KZG
              MD5:1502A6DD85B55B9619E42D1E08C09738
              SHA1:70FF58E29CCDB53ABABA7EBD449A9B34AC152AA6
              SHA-256:54E541D1F410AFF34CE898BBB6C7CC945B66DFC9D7C4E986BD9514D14560CC6F
              SHA-512:99F0EFF9F2DA4CDD6AB508BB85002F38B01BDFDE0CBA1EB2F4B5CA8EAD8AAB645A3C26BECF777DE49574111B37F847EFF9320331AC07E84C8E892B688B01D36B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Swift_Current) {. {-9223372036854775808 -25880 0 LMT}. {-2030201320 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-747241200 -21600 0 MDT}. {-732729600 -25200 0 MST}. {-715791600 -21600 1 MDT}. {-702489600 -25200 0 MST}. {-684342000 -21600 1 MDT}. {-671040000 -25200 0 MST}. {-652892400 -21600 1 MDT}. {-639590400 -25200 0 MST}. {-631126800 -25200 0 MST}. {-400086000 -21600 1 MDT}. {-384364800 -25200 0 MST}. {-337186800 -21600 1 MDT}. {-321465600 -25200 0 MST}. {-305737200 -21600 1 MDT}. {-292435200 -25200 0 MST}. {-273682800 -21600 1 MDT}. {-260985600 -25200 0 MST}. {73472400 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):329
              Entropy (8bit):4.580220354026118
              Encrypted:false
              SSDEEP:6:SlSWB9X5290Em2OHskeRbV1UcgdrV/uFn/acD3/uFn/sb9/uFn/yn:MBp5290EmdHsVH1UDB/uFn/z/uFn/k/N
              MD5:004588073FADF67C3167FF007759BCEA
              SHA1:64A6344776A95E357071D4FC65F71673382DAF9D
              SHA-256:55C18EA96D3BA8FD9E8C4F01D4713EC133ACCD2C917EC02FD5E74A4E0089BFBF
              SHA-512:ADC834C393C5A3A7BFD86A933E7C7F594AC970A3BD1E38110467A278DC4266D81C3E96394C102E565F05DE7FBBDA623C673597E19BEC1EA26AB12E4354991066
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Tegucigalpa) {. {-9223372036854775808 -20932 0 LMT}. {-1538503868 -21600 0 CST}. {547020000 -18000 1 CDT}. {559717200 -21600 0 CST}. {578469600 -18000 1 CDT}. {591166800 -21600 0 CST}. {1146981600 -18000 1 CDT}. {1154926800 -21600 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6666
              Entropy (8bit):3.7481713130223295
              Encrypted:false
              SSDEEP:192:pJunToVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kV6kef4zjyvUP/ZbJitpJxSIRj:pAWJv
              MD5:8FFE81344C31A51489A254DE97E83C3E
              SHA1:4397D9EDAC304668D95921EF03DFD90F967E772F
              SHA-256:EF6AF4A3FA500618B37AF3CDD40C475E54347D7510274051006312A42C79F20C
              SHA-512:F34A6D44499DE5A4E328A8EAFBA5E77B1B8C04A843160D74978398F1545C821C3034FCBD5ADBFAD8D14D1688907C57E7570023ABD3096D4E4C19E3D3C04428B3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Thule) {. {-9223372036854775808 -16508 0 LMT}. {-1686079492 -14400 0 AST}. {670399200 -10800 1 ADT}. {686120400 -14400 0 AST}. {701848800 -10800 1 ADT}. {717570000 -14400 0 AST}. {733903200 -10800 1 ADT}. {752043600 -14400 0 AST}. {765352800 -10800 1 ADT}. {783493200 -14400 0 AST}. {796802400 -10800 1 ADT}. {814942800 -14400 0 AST}. {828856800 -10800 1 ADT}. {846392400 -14400 0 AST}. {860306400 -10800 1 ADT}. {877842000 -14400 0 AST}. {891756000 -10800 1 ADT}. {909291600 -14400 0 AST}. {923205600 -10800 1 ADT}. {941346000 -14400 0 AST}. {954655200 -10800 1 ADT}. {972795600 -14400 0 AST}. {986104800 -10800 1 ADT}. {1004245200 -14400 0 AST}. {1018159200 -10800 1 ADT}. {1035694800 -14400 0 AST}. {1049608800 -10800 1 ADT}. {1067144400 -14400 0 AST}. {1081058400 -10800 1 ADT}. {1099198800 -14400 0 AST}. {1112508000 -10800 1 ADT}. {1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8058
              Entropy (8bit):3.7473289441354263
              Encrypted:false
              SSDEEP:96:hePraC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:hirrn+qvOTFhPI1jFIL
              MD5:CE6E17F16AA8BAD3D9DB8BD2E61A6406
              SHA1:7DF466E7BB5EDD8E1CDF0ADC8740248EF31ECB15
              SHA-256:E29F83A875E2E59EC99A836EC9203D5ABC2355D6BD4683A5AEAF31074928D572
              SHA-512:833300D17B7767DE74E6F2757513058FF5B25A9E7A04AB97BBBFFAC5D9ADCC43366A5737308894266A056382D2589D0778EEDD85D56B0F336C84054AB05F1079
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Thunder_Bay) {. {-9223372036854775808 -21420 0 LMT}. {-2366733780 -21600 0 CST}. {-1893434400 -18000 0 EST}. {-883594800 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {18000 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {94712400 -18000 0 EST}. {126248400 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8470
              Entropy (8bit):3.767364707906483
              Encrypted:false
              SSDEEP:96:mb4O5mC2ZCAFBWsBNwj/lpmlOxGcKcnRH31t+ucgge:Q5DaYaNwj/lpmlOxnKcndIG
              MD5:F76D5FB5BC773872B556A6EDF660E5CC
              SHA1:3FD19FCD0FFD3308D2E7D9A3553C14B6A6C3A903
              SHA-256:170540AA3C0962AFE4267F83AC679241B2D135B1C18E8E7220C2608B94DDDE0E
              SHA-512:7FC5D2BC39EF3A3C902A56272474E28CD9C56DE37A7AE9FAEADE974993677CCF3A9E6CE64C064D69B7587BD47951BFFFD751412D97F4066656CBB42AD9B619DF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Tijuana) {. {-9223372036854775808 -28084 0 LMT}. {-1514736000 -25200 0 MST}. {-1451667600 -28800 0 PST}. {-1343062800 -25200 0 MST}. {-1234803600 -28800 0 PST}. {-1222963200 -25200 1 PDT}. {-1207242000 -28800 0 PST}. {-873820800 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-761677200 -28800 0 PST}. {-686073600 -25200 1 PDT}. {-661539600 -28800 0 PST}. {-504892800 -28800 0 PST}. {-495039600 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463590000 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431535600 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400086000 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-368636400 -25200 1 PDT}. {-355330800 -28800 0 PST}. {-337186800 -25200 1 PDT}. {-323881200 -28800 0 PST}. {-305737200 -25200 1 PDT}. {-292431600 -28800 0 PST}. {-283968000 -28800 0 PST}. {189331200 -28800 0 PST}. {199274400 -25200 1 PDT}. {21560
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10883
              Entropy (8bit):3.7202964099536917
              Encrypted:false
              SSDEEP:96:9wUYG1dbgZ8UMrEUWraC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:9wS1dbgZ8UMrVWrrn+qvOTFhPI1jFIL
              MD5:9C60AFDFA3BA2002BA68673B778194CF
              SHA1:D6D17C82AEC4B85BA7B0F6FCB36A7582CA26A82B
              SHA-256:7744DB6EFE39D636F1C88F8325ED3EB6BF8FA615F52A60333A58BCE579983E87
              SHA-512:3C793BB00725CF37474683EAB70A0F2B2ACAE1656402CDD7E75182988DC20361A8651A624A5220983E3E05333B9817DCBEAF20D34BD55C5128F55474A02A9455
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Toronto) {. {-9223372036854775808 -19052 0 LMT}. {-2366736148 -18000 0 EST}. {-1632070800 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1609441200 -18000 0 EST}. {-1601753400 -14400 1 EDT}. {-1583697600 -18000 0 EST}. {-1567357200 -14400 1 EDT}. {-1554667200 -18000 0 EST}. {-1534698000 -14400 1 EDT}. {-1524074400 -18000 0 EST}. {-1503248400 -14400 1 EDT}. {-1492365600 -18000 0 EST}. {-1471798800 -14400 1 EDT}. {-1460916000 -18000 0 EST}. {-1440954000 -14400 1 EDT}. {-1428861600 -18000 0 EST}. {-1409504400 -14400 1 EDT}. {-1397412000 -18000 0 EST}. {-1378054800 -14400 1 EDT}. {-1365962400 -18000 0 EST}. {-1346605200 -14400 1 EDT}. {-1333908000 -18000 0 EST}. {-1315155600 -14400 1 EDT}. {-1301853600 -18000 0 EST}. {-1283706000 -14400 1 EDT}. {-1270404000 -18000 0 EST}. {-1252256400 -14400 1 EDT}. {-1238954400 -18000 0 EST}. {-1220806800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):202
              Entropy (8bit):4.854311472609309
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290RRKl290e/:MBaIMY9QpI290V90O
              MD5:B931564D937C807282F1432FF6EA52A6
              SHA1:7ECA025D97717EEA7C91B5390122D3A47A25CAD0
              SHA-256:FF5CF153C4EC65E7E57A608A481F12939B6E4ACC8D62C5B01FEB5A04769A6F07
              SHA-512:97271500C7D7959B90A6AC0A98D5D0D29DA00E92F9FC973594267DF906DEE767243698DBA2F3A0CF00156E949E29CDDD45A151F263583514090717CFDF1FB4DD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Tortola) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9495
              Entropy (8bit):3.7630000632404426
              Encrypted:false
              SSDEEP:192:2f7f/5LB6xi9C7Nf+aNwj/lpmlOxnKcndIG:2f735LB6xi9cfefnK6
              MD5:1ACC41DA124C0CA5E67432760FDC91EC
              SHA1:13F56C3F53076E0027BB8C5814EC81256A37F4AF
              SHA-256:DFC19B5231F6A0AB9E9B971574FB612695A425A3B290699DF2819D46F1250DB0
              SHA-512:2F2E358F5743248DE946B90877EFCCCACAF039956249F17D24B7DA026830A181A125045E2C8937A6ACD674E32887049F2D36A1941F09803DF514ADCDA4055CC5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Vancouver) {. {-9223372036854775808 -29548 0 LMT}. {-2713880852 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-747237600 -25200 1 PDT}. {-732726000 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-386
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):201
              Entropy (8bit):4.901732290886438
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290RXgr490e/:MBaIMY9QpI290xg090O
              MD5:DEB77B4016D310DFB38E6587190886FB
              SHA1:B308A2D187C153D3ED821B205A4F2D0F73DA94B0
              SHA-256:A6B8CFE8B9381EC61EAB553CFA2A815F93BBB224A6C79D74C08AC54BE4B8413B
              SHA-512:04A0D598A24C0F3A1881D3412352F65C610F75281CC512B46248847A798A12AEA551E3DE9EA3FD5BB6B3687A0BB65746392F301F72746876D30697D66B3A3604
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Virgin) $TZData(:America/Port_of_Spain).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7613
              Entropy (8bit):3.789738507183991
              Encrypted:false
              SSDEEP:96:hmD+C2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:hm3Nf+aNwj/lpmlOxnKcndIG
              MD5:CBCFD98E08FCCEB580F66AFE8E670AF5
              SHA1:7E922CCD99CD7758709205E4C9210A2F09F09800
              SHA-256:72992080AA9911184746633C7D6E47570255EE85CC6FE5E843F62331025B2A61
              SHA-512:18290654E5330186B739DEDBC7D6860FD017D089DAE19E480F868E1FB56A3CF2E685D0099C4CF1D4F2AE5F36D0B72ABE52FBAC29AD4F6AB8A45C4C420D90E2D5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Whitehorse) {. {-9223372036854775808 -32412 0 LMT}. {-2188997988 -32400 0 YST}. {-1632056400 -28800 1 YDT}. {-1615125600 -32400 0 YST}. {-1596978000 -28800 1 YDT}. {-1583164800 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-147884400 -25200 1 YDDT}. {-131554800 -32400 0 YST}. {315561600 -28800 0 PST}. {325677600 -25200 1 PDT}. {341398800 -28800 0 PST}. {357127200 -25200 1 PDT}. {372848400 -28800 0 PST}. {388576800 -25200 1 PDT}. {404902800 -28800 0 PST}. {420026400 -25200 1 PDT}. {436352400 -28800 0 PST}. {452080800 -25200 1 PDT}. {467802000 -28800 0 PST}. {483530400 -25200 1 PDT}. {499251600 -28800 0 PST}. {514980000 -25200 1 PDT}. {530701200 -28800 0 PST}. {544615200 -25200 1 PDT}. {562150800 -28800 0 PST}. {576064800 -25200 1 PDT}. {594205200 -28800 0 PST}. {607514400 -25200 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9379
              Entropy (8bit):3.7354364023000937
              Encrypted:false
              SSDEEP:192:t7K22m2eQ7SRWu3O559BxXWDpws1dwVyUAitGeZiSI0PMnp4ozDCM9LfLPix3QWZ:t7K22m2eQ7Swu3O559BxXWDpws1dwVyU
              MD5:F6B8A2DA74DC3429EC1FAF7A38CB0361
              SHA1:1651AD179DB98C9755CDF17FBFC29EF35DE7F588
              SHA-256:FEAA62063316C8F4AD5FABBF5F2A7DD21812B6658FEC40893657E909DE605317
              SHA-512:46C61EFF429075A77C01AF1C02FD6136529237B30B7F06795BCEE26CDB75DDAB2D418283CD95C9A0140D1510E02F393F0A7E9414C99D1B31301AE213BAF50681
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Winnipeg) {. {-9223372036854775808 -23316 0 LMT}. {-2602258284 -21600 0 CST}. {-1694368800 -18000 1 CDT}. {-1681671600 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1029686400 -18000 1 CDT}. {-1018198800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-746035200 -18000 1 CDT}. {-732733200 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620755200 -18000 1 CDT}. {-607626000 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8407
              Entropy (8bit):3.8776961667057868
              Encrypted:false
              SSDEEP:96:ugOZVKyjVYus/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:uBZVKH/4h5sBPy+CMt/ElALLVuAH
              MD5:9C0E781669E3E5549F82ED378EE3423B
              SHA1:32184EA198156731C58616A0D88F169441C8CC7F
              SHA-256:FE1C632FE9AF7E54A8CC9ED839818FAE98F14928921FD78C92A8D8E22F07A415
              SHA-512:D1CDAB3DBAFFB4C30F6EEBDD413D748980C156437FBE99E7DF0C1E17AFA4CC33876AF2BB44C90E1FE5347071E64E83823EED47AE9BE39863C12989CB3EA44BDA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Yakutat) {. {-9223372036854775808 52865 0 LMT}. {-3225223727 -33535 0 LMT}. {-2188953665 -32400 0 YST}. {-883580400 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-757350000 -32400 0 YST}. {-31503600 -32400 0 YST}. {-21474000 -28800 1 YDT}. {-5752800 -32400 0 YST}. {9975600 -28800 1 YDT}. {25696800 -32400 0 YST}. {41425200 -28800 1 YDT}. {57751200 -32400 0 YST}. {73479600 -28800 1 YDT}. {89200800 -32400 0 YST}. {104929200 -28800 1 YDT}. {120650400 -32400 0 YST}. {126702000 -28800 1 YDT}. {152100000 -32400 0 YST}. {162385200 -28800 1 YDT}. {183549600 -32400 0 YST}. {199278000 -28800 1 YDT}. {215604000 -32400 0 YST}. {230727600 -28800 1 YDT}. {247053600 -32400 0 YST}. {262782000 -28800 1 YDT}. {278503200 -32400 0 YST}. {294231600 -28800 1 YDT}. {309952800 -32400 0 YST}. {325681200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7485
              Entropy (8bit):3.781666511020802
              Encrypted:false
              SSDEEP:96:rGzGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:zVUC2mWBNwWTxyWR
              MD5:C9050AC32086644B15631E6FBE4D6292
              SHA1:8C074D0E04CAFB1BDD11953AE77687CFBC53C449
              SHA-256:447B801066A92624F58C00DA66FBB90B54195F4AB06886AE4796228244E19E85
              SHA-512:E7C73E67B247F912E774EF245D2323B24DDF75054C7BE9095BC19E3C58CB5AE287747076B2436ABF735738A969DAFCDB128F0BA2C76A0AFAB5449CF157BEB190
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Yellowknife) {. {-9223372036854775808 0 0 -00}. {-1104537600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-147891600 -18000 1 MDDT}. {-131562000 -25200 0 MST}. {315558000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {68
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):316
              Entropy (8bit):4.338100448107153
              Encrypted:false
              SSDEEP:6:SlSWB9X52L09xvFJm2OHlFFbQMFUkjtjKNUkMQTVsklkQEJ:MBp52Lc9mdHfFbQMF5jdK3zTVxE
              MD5:4AD8AC155D466E47A6BF075508DC05ED
              SHA1:2C911F651B26C27C07756111B5291C63C6954D34
              SHA-256:282A352404B30C4336C0E09F3C5371393511C602B9E55648FB0251EACC9C715D
              SHA-512:4A7305653D700FF565C9747C8A4E69A79609EB4748F3FFAA60C5A8548BBFAEC541EB8EAF830FF9202508BEAFAC2A0895BC4A52473FA51EBC74FAD83FCD0EB8F5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Casey) {. {-9223372036854775808 0 0 -00}. {-31536000 28800 0 +08}. {1255802400 39600 0 +11}. {1267714800 28800 0 +08}. {1319738400 39600 0 +11}. {1329843600 28800 0 +08}. {1477065600 39600 0 +11}. {1520701200 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):312
              Entropy (8bit):4.290371654524798
              Encrypted:false
              SSDEEP:6:SlSWB9X52L0DTm2OHlFFpwz0/MVSYv/JFFv7VoX/MVSYv/bpVQSbRXhNXSMVSYvx:MBp52LeTmdHfFCjF/LFvOkF/bp6SbRRT
              MD5:780DA74192C8F569B1450AACE54A0558
              SHA1:F2650D6D21A4B4AC8D931383ED343CE916252319
              SHA-256:88A4DBB222E9FD2FFC26D9B5A8657FA6552DF6B3B6A14D951CE1168B5646E8F8
              SHA-512:7F1E9E5C0F8E2A9D8AC68E19AF3D48D2BEE9840812A219A759475E7D036EA18CB122C40DDB88977079C1831AEF7EFBCB519C691616631D490B3C04382EB993C0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Davis) {. {-9223372036854775808 0 0 -00}. {-409190400 25200 0 +07}. {-163062000 0 0 -00}. {-28857600 25200 0 +07}. {1255806000 18000 0 +05}. {1268251200 25200 0 +07}. {1319742000 18000 0 +05}. {1329854400 25200 0 +07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):206
              Entropy (8bit):4.716730745171491
              Encrypted:false
              SSDEEP:6:SlSWB9X52L0/3Om2OHlFFbRX82+c6FFpJ6SpQ:MBp52LdmdHfFbx82+ZFDQ
              MD5:83B53540FADB1A36903E2A619954BFFC
              SHA1:C9F520043A641104F43FB5422971B4D7A39A421C
              SHA-256:0E50BA70DE94E6BABC4847C15865867D0F821F6BDDDC0B9750CB6BF13EF5DF3B
              SHA-512:0AE7FE58EED7EAC03CBFFA2EA32CCBF726DBED0A3B1C20CF1D549CDA801CEB2B54F106787BD15B17DA3D9404E2D84936D50E4A2F63D1A72B0FEBCD8F8EA3195F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/DumontDUrville) {. {-9223372036854775808 0 0 -00}. {-725846400 36000 0 +10}. {-566992800 0 0 -00}. {-415497600 36000 0 +10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2800
              Entropy (8bit):3.8632793034261463
              Encrypted:false
              SSDEEP:24:cQbTetvk4z/7hLiVVitCinq+D18KmvLx0WWuyymPXObf78FCt7WQi2NjM:5sTlKiG+h5mjKIyym+WQNo
              MD5:A3E1A9DFB6D6F061E60739865E6E0D18
              SHA1:10C014CB444DEEF093854EE6A415DC17D7C2A4C5
              SHA-256:975026D38C4BF136769D31215F2908867EC37E568380F864983DD57FFADA4676
              SHA-512:9425CF1B717FBDFD4EA04AAC06CF5ACE365A4FCC911D85130B910D022ED4261F1FFF431CE63BA538871C7D3CA1EF65490A30BEE975884EB39FC1E5C2D88009D0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Macquarie) {. {-9223372036854775808 0 0 -00}. {-2214259200 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-1601719200 0 0 -00}. {-94730400 36000 0 AEST}. {-71136000 39600 1 AEDT}. {-55411200 36000 0 AEST}. {-37267200 39600 1 AEDT}. {-25776000 36000 0 AEST}. {-5817600 39600 1 AEDT}. {5673600 36000 0 AEST}. {25632000 39600 1 AEDT}. {37728000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.6965808819415695
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEzyedFkXGm2OHvdFFoVU/VPKVVFSTGFFFjsvUX0VQL:SlSWB9X52L0zyEm2OHlFFzy/UiF/js/G
              MD5:A07C6FA0B635EC81C5199F2515888C9E
              SHA1:587AC900E285F6298A7287F10466DFA4683B9A87
              SHA-256:2D8F0218800F6E0BD645A7270BEAF60A517AE20CBFFD64CF77E3CE4F8F959348
              SHA-512:76A3590748F698E51BF29A1D3C119A253A8C07E9F77835CCDFC6AC51C554B5888351C95E6012CDADB106B42A384D49E56537FBF8DB9DC5BB791CB115FDB623FD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Mawson) {. {-9223372036854775808 0 0 -00}. {-501206400 21600 0 +06}. {1255809600 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.832254042797831
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG/u4pVAIgObT/NCxL2L0GRHEz6BVfnUDH/uvn:SlSWB9IZaM3ycqIVAIgOboL2L0z6/fvn
              MD5:0048A7427AC7880B9F6413208B216BC9
              SHA1:CBB4A29316581CFC7868A779E97DB94F75870F41
              SHA-256:487D4845885643700B4FF043AC5EA59E2355FD38357809BE12679ECAFFA93030
              SHA-512:EC107FA59203B7BCB58253E2715380EF70DF5470030B83E1DEA8D1AC4E7D3FB2908E8C7009D8136212871EC3DA8B4C4194FF3290E5A41EEE8E7D07CABE80ECC0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:Antarctica/McMurdo) $TZData(:Pacific/Auckland).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2526
              Entropy (8bit):3.514598338545733
              Encrypted:false
              SSDEEP:48:5wcS+SGwRShoSdXvuMSuSYSgS1SWFlSqSySSSoyZSWXSHS9SWS3SbSRSBSUS5ShG:tNURMo8XvuMRnHqhTxxJAHXEa9c0yq/4
              MD5:7738686109BCC8AF5271608FCD04EBFB
              SHA1:401217F0F69945ADA13F593681D8F13A368BCF94
              SHA-256:3EECDA7E4507A321A03171658187D2F50F7C6C46E8A1B0831E6B6B6AAFFAC4AC
              SHA-512:F7982BF9D82B2D7C2C1825AF1FF9178849BB699A50367872C11572E6F8A452619A63C9F97CEAF06FD5104075FBDE70936B8363B993F2571FD9A2B699A1D17521
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Palmer) {. {-9223372036854775808 0 0 -00}. {-157766400 -14400 0 -04}. {-152654400 -14400 0 -04}. {-132955200 -10800 1 -04}. {-121122000 -14400 0 -04}. {-101419200 -10800 1 -04}. {-86821200 -14400 0 -04}. {-71092800 -10800 1 -04}. {-54766800 -14400 0 -04}. {-39038400 -10800 1 -04}. {-23317200 -14400 0 -04}. {-7588800 -10800 0 -03}. {128142000 -7200 1 -03}. {136605600 -10800 0 -03}. {389070000 -14400 0 -04}. {403070400 -10800 1 -04}. {416372400 -14400 0 -04}. {434520000 -10800 1 -04}. {447822000 -14400 0 -04}. {466574400 -10800 1 -04}. {479271600 -14400 0 -04}. {498024000 -10800 1 -04}. {510721200 -14400 0 -04}. {529473600 -10800 1 -04}. {545194800 -14400 0 -04}. {560923200 -10800 1 -04}. {574225200 -14400 0 -04}. {592372800 -10800 1 -04}. {605674800 -14400 0 -04}. {624427200 -10800 1 -04}. {637124400 -14400 0 -04}. {653457600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):145
              Entropy (8bit):4.778784990010973
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEsKRaXGm2OHvdFFn/H3VVFVGHC:SlSWB9X52L0rRhm2OHlFFn/VVFAHC
              MD5:8CAED0DB4C911E84AF29910478D0DBD6
              SHA1:80DE97C9959D58C6BF782A948EED735AB4C423CC
              SHA-256:9415FA3A573B98A6EBCBFAEEC15B1C52352F2574161648BB977F55072414002F
              SHA-512:28F27F7EDDF30EB08F8B37ED13219501D14D2AEA4EFA07AFAD36A643BD448E1BD992463C12C47152C99772D755E6EA0198B51B806A05B57743635A9059676EC2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Rothera) {. {-9223372036854775808 0 0 -00}. {218246400 -10800 0 -03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):193
              Entropy (8bit):4.858829912809126
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3ycqIVAIgOboL2L0tlo+plvn:MBaIMdQiO2LMq+p1
              MD5:51AC23110E7EAB20319EE8EC82F048D2
              SHA1:7B4DE168A3078041841762F468AE65A2EE6C5322
              SHA-256:D33E094979B3CE495BEF7109D78F7B77D470AB848E4E2951851A7C57140354BF
              SHA-512:13E800DFFA3D65F94FAD6B529FC8A29A26F40F4F29DBF19283392733458AD3C6B27E479218A8C123424E965711B4746976E39EB9FD54CD0B57281134FEAC4F31
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:Antarctica/South_Pole) $TZData(:Pacific/Auckland).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):143
              Entropy (8bit):4.7487926695696006
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEtWlFeEXGm2OHvdFFpoMdsWYAvn:SlSWB9X52L0tQeLm2OHlFFpbaWYAv
              MD5:AA415901BB9E53CF7FAEA47E546D9AED
              SHA1:CF12572D2C4D0ABF12B0450D366944E297744217
              SHA-256:F161CFAB3E40A0358FF0DEC2EB8ED9231D357FAC20710668B9CE31CDA68E8B96
              SHA-512:4F90E0EA7086EB729080E77A47C2E998F7AD3BCEA4997DAB06044BCDD2E2E1729A83C679EF2E1D78CD0255C37F24FCC6746518444CC4E96EBB2A0547312D8354
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Syowa) {. {-9223372036854775808 0 0 -00}. {-407808000 10800 0 +03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5174
              Entropy (8bit):3.411985404081831
              Encrypted:false
              SSDEEP:96:q4NUwVb0uJjeH7wZjFH7EPzOLrNrnw/ZklmhEJkJdG:jNUwVAuJjs8JmPzO5ngzG
              MD5:CA4730C864AB3CC903F79BDF0F9E8777
              SHA1:7B3E9DDB36766F95F9C651CF244EDA9ED22BDDC5
              SHA-256:E437539A85E91AD95CD100F9628142FEBB455553C95415DB1147FD25948EBF59
              SHA-512:32EE0CCA0AB92D68D6C21A925E5367730A172C49DC5245A61DA1A39E08317569154C52EC695E3FB43BB40D066C4C0E9625C835A7F6E2EB5DDF0768D48DB99F3C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Troll) {. {-9223372036854775808 0 0 -00}. {1108166400 0 0 +00}. {1111885200 7200 1 +02}. {1130634000 0 0 +00}. {1143334800 7200 1 +02}. {1162083600 0 0 +00}. {1174784400 7200 1 +02}. {1193533200 0 0 +00}. {1206838800 7200 1 +02}. {1224982800 0 0 +00}. {1238288400 7200 1 +02}. {1256432400 0 0 +00}. {1269738000 7200 1 +02}. {1288486800 0 0 +00}. {1301187600 7200 1 +02}. {1319936400 0 0 +00}. {1332637200 7200 1 +02}. {1351386000 0 0 +00}. {1364691600 7200 1 +02}. {1382835600 0 0 +00}. {1396141200 7200 1 +02}. {1414285200 0 0 +00}. {1427590800 7200 1 +02}. {1445734800 0 0 +00}. {1459040400 7200 1 +02}. {1477789200 0 0 +00}. {1490490000 7200 1 +02}. {1509238800 0 0 +00}. {1521939600 7200 1 +02}. {1540688400 0 0 +00}. {1553994000 7200 1 +02}. {1572138000 0 0 +00}. {1585443600 7200 1 +02}. {1603587600 0 0 +00}. {1616893200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):144
              Entropy (8bit):4.773942010845718
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEoKcMFtXGm2OHvdFFud/bVFXKVVFSTL:SlSWB9X52L0XcMFEm2OHlFFCVFXK/Un
              MD5:A07C4769267AFA9501BE44BD406ADA34
              SHA1:86747047EFD1F47FEFC7DA44465EAB53F808C9FB
              SHA-256:92816E1C4FDE037D982596610A1F6E11D4E7FD408C3B1FAAB7BEC32B09911FE7
              SHA-512:051A327C898867228C8B1848162C2604BED8456B61533D4A40FBEB9A0069AE2EAF33F79803A0C6A80C6446C34F757A751F4ABC5AC5CCED6C125E2A42D46A022A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Vostok) {. {-9223372036854775808 0 0 -00}. {-380073600 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.922114908130109
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVyWJooedVAIgoqxWJ0YF2XbeLo4cA4FH/h8QasWJ/n:SlSWB9IZaM3ymSDdVAIgo2Q2XbUyAK8H
              MD5:0F69284483D337DC8202970461A28386
              SHA1:0D4592B8EBE070119CB3308534FE9A07A758F309
              SHA-256:3A5DB7C2C71F95C495D0884001F82599E794118452E2748E95A7565523546A8E
              SHA-512:D9F2618B153BFE4888E893A62128BE0BD59DFAFC824DA629454D5D541A9789536AC029BF73B6E9749409C522F450D53A270D302B2CF084444EA64D9138D77DFE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Oslo)]} {. LoadTimeZoneFile Europe/Oslo.}.set TZData(:Arctic/Longyearbyen) $TZData(:Europe/Oslo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):166
              Entropy (8bit):4.7788335911117095
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8t1zVAIgNsM1E2WFK4h4WFK81S:SlSWB9IZaM3yN1zVAIgaM1E2wKs4wK8c
              MD5:BBAFEA8E55A739C72E69A619C406BD5D
              SHA1:0C2793114CA716C5DBAF081083DF1E137F1D0A63
              SHA-256:6E69C5C3C3E1C98F24F5F523EC666B82534C9F33132A93CCC1100F27E594027F
              SHA-512:7741F2281FDCA8F01A75ABEBF908F0B70320C4C026D90D4B0C283F3E2B8C47C95263569916EF83CAD40C87D5B6E714045D0B43370A263BC7BE80EC3DA62CC82F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Riyadh)]} {. LoadTimeZoneFile Asia/Riyadh.}.set TZData(:Asia/Aden) $TZData(:Asia/Riyadh).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1580
              Entropy (8bit):3.640808791765599
              Encrypted:false
              SSDEEP:24:cQveh8mSsOXEFCMiq90DIgb5j6gMJR/4TJTXSATo6SSsMuRFnCYRluoCC1Q0cxfw:50Fqq9iTVrXjS0qBsW
              MD5:AC511C65052CE2D780FD583E50CB475C
              SHA1:6B9171A13F6E6F33F878A347173A03112BCF1B89
              SHA-256:C9739892527CCEBDF91D7E22A6FCD0FD57AAFA6A1B4535915AC82CF6F72F34A4
              SHA-512:12743486EB02C241C90ECCEDD323D0F560D5FA1F55CB3EBB5AF3A65331D362433F2EAF7285B19335F5C262DA033EB8BE5A4618794EA74DFCD4107C170035CE96
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Almaty) {. {-9223372036854775808 18468 0 LMT}. {-1441170468 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {695768400 21600 0 +06}. {701812800 25200 1 +06}. {717537600 21600 0 +06}. {733262400 25200 1 +06}. {748987200 21600 0 +06}. {764712000 25200 1 +06}. {780436800 21
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7055
              Entropy (8bit):3.621680472512772
              Encrypted:false
              SSDEEP:96:Rnv8A4XkyKfUN9QXCkFpej4g2uMekzdgyvwKVuKEZhfuITrar2gsq0teU:RvMw2y3p+4g2PxbLS5
              MD5:703F8A37D41186AC8CDBCB86B9FE6C1B
              SHA1:B2D7FCBD290DA0FEB31CD310BA29FE27A59822BE
              SHA-256:847FA8211956C5930930E2D7E760B1D7F551E8CDF99817DB630222C960069EB8
              SHA-512:66504E448469D2358C228966739F0FEB381BF862866A951B092A600A17DAD80E6331F6D88C4CFCE483F45E79451722A19B37291EDA75C7CD4D7E0A7E82096F47
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Amman) {. {-9223372036854775808 8624 0 LMT}. {-1230776624 7200 0 EET}. {108165600 10800 1 EEST}. {118270800 7200 0 EET}. {136591200 10800 1 EEST}. {149806800 7200 0 EET}. {168127200 10800 1 EEST}. {181342800 7200 0 EET}. {199749600 10800 1 EEST}. {215643600 7200 0 EET}. {231285600 10800 1 EEST}. {244501200 7200 0 EET}. {262735200 10800 1 EEST}. {275950800 7200 0 EET}. {481154400 10800 1 EEST}. {496962000 7200 0 EET}. {512949600 10800 1 EEST}. {528670800 7200 0 EET}. {544399200 10800 1 EEST}. {560120400 7200 0 EET}. {575848800 10800 1 EEST}. {592174800 7200 0 EET}. {610581600 10800 1 EEST}. {623624400 7200 0 EET}. {641167200 10800 1 EEST}. {655074000 7200 0 EET}. {671839200 10800 1 EEST}. {685918800 7200 0 EET}. {702856800 10800 1 EEST}. {717973200 7200 0 EET}. {733701600 10800 1 EEST}. {749422800 7200 0 EET}. {765151200 10800 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2014
              Entropy (8bit):3.680306971172711
              Encrypted:false
              SSDEEP:24:cQMe/VrghhF87/Fpd2kNNxLcULBQdHl2yYvpQ62itgUiRrn5d6kGFF6UERWkBUHA:5ah2zFvpchKvW62XPdXJMwT3Lea
              MD5:E0396BBBB3FDDD2B651D2DBB4EF90884
              SHA1:C1FFCDC6EB77B5F4CFAFA90EA8E1025DB142D5C5
              SHA-256:6A9B4EF8FBED758E8D1737C79D803F9DF4F5BF61F115064ED60DA2397B88FE19
              SHA-512:8FB6D19189142F11812B82F5803F4E5C85BF107689D317305D32EF71905DC9E0655DD2F2D4CE234B5872A6BF452670221F94EF1D48EF776C002AA5A484C2481B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Anadyr) {. {-9223372036854775808 42596 0 LMT}. {-1441194596 43200 0 +12}. {-1247572800 46800 0 +14}. {354884400 50400 1 +14}. {370692000 46800 0 +13}. {386420400 43200 0 +13}. {386424000 46800 1 +13}. {402231600 43200 0 +12}. {417960000 46800 1 +13}. {433767600 43200 0 +12}. {449582400 46800 1 +13}. {465314400 43200 0 +12}. {481039200 46800 1 +13}. {496764000 43200 0 +12}. {512488800 46800 1 +13}. {528213600 43200 0 +12}. {543938400 46800 1 +13}. {559663200 43200 0 +12}. {575388000 46800 1 +13}. {591112800 43200 0 +12}. {606837600 46800 1 +13}. {622562400 43200 0 +12}. {638287200 46800 1 +13}. {654616800 43200 0 +12}. {670341600 39600 0 +12}. {670345200 43200 1 +12}. {686070000 39600 0 +11}. {695746800 43200 0 +13}. {701791200 46800 1 +13}. {717516000 43200 0 +12}. {733240800 46800 1 +13}. {748965600 43200 0 +12}. {764690400 46
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1607
              Entropy (8bit):3.623112789966889
              Encrypted:false
              SSDEEP:24:cQJeoR9NSVYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo03CRJS2I:5fZlkhs7bqIwIoMpqDS7oXb0w+sRBlL
              MD5:410226AA30925F31BA963139FD594AEB
              SHA1:860E17C83D0DF2CBB4B8E73B9C7CB956994F5549
              SHA-256:69402CA6D56138A6A6D09964B90D1781A7CBEFBDFFE506B7292758EC24740B0E
              SHA-512:AE2610D1D779500132D5FA12E7529551ECD009848619C7D802F6EE89B0D2C3D6E7C91FB83DA7616180C166CE9C4499D7A2A4FEB5373621353640A71830B655A3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Aqtau) {. {-9223372036854775808 12064 0 LMT}. {-1441164064 14400 0 +04}. {-1247544000 18000 0 +05}. {370724400 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400 180
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1608
              Entropy (8bit):3.6301391279603696
              Encrypted:false
              SSDEEP:48:5FhXlkhs7bqIwIoMpqDS7oXb0w+bBijbbyzIr1jJL:PtCOgZbdp
              MD5:B8D914F33D568AE8EB46B7F3FC5BF944
              SHA1:91DE61EC025E8F74D9CD10816C3534B5F8D397F7
              SHA-256:9C1C30ADD1919951350C86DA6B716326178CF74A849A3350AE147DD2ADC34049
              SHA-512:A32B34C15D94C42E9DF13316ACB9E0C9AF151F2EF14F502BE1A75E40735A2BC5D9E59244A72ACFB68184DA0D62A48FCC7AB288F1BA85DBB4DC385FA04BF3075D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Aqtobe) {. {-9223372036854775808 13720 0 LMT}. {-1441165720 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):847
              Entropy (8bit):3.852939540326754
              Encrypted:false
              SSDEEP:24:cQgZeRHINS62DS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo03CRJL:5g8U0khs7bqIwIoMpqDS7oXb0L
              MD5:BFDAC4AE48AD49E5C0A048234586507E
              SHA1:ACFE49AED50D0FDF2978034BB3098331F6266CC8
              SHA-256:77FB5A9F578E75EEC3E3B83618C99F33A04C19C8BB9AFB314888091A8DD64AA3
              SHA-512:11B412E0856BD384080B982C9DE6CE196E8C71A68096F7ED22972B7617533F9BD92EFA4C153F2CEE7EA4F0DE206281B6B9066C5969AFFE913AF2FA5CF82EDD90
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ashgabat) {. {-9223372036854775808 14012 0 LMT}. {-1441166012 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +05}. {370720800 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.750782589043179
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8xEYM4DdVAIgN/ZEYvCHt2WFKUNSH+WFKYEYMvn:SlSWB9IZaM3yRhVAIgH1CHt2wKUNSewa
              MD5:73E1F618FB430C503A1499E3A0298C97
              SHA1:29F31A7C9992F9D9B3447FCBC878F1AF8E4BD57F
              SHA-256:5917FC603270C0470D2EC416E6C85E999A52B6A384A2E1C5CFC41B29ABCA963A
              SHA-512:FAE39F158A4F47B4C37277A1DC77B8524DD4287EBAD5D8E6CBB906184E6DA275A308B55051114F4CD4908B449AE3C8FD48384271E3F7106801AD765E5958B4DD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ashgabat)]} {. LoadTimeZoneFile Asia/Ashgabat.}.set TZData(:Asia/Ashkhabad) $TZData(:Asia/Ashgabat).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1608
              Entropy (8bit):3.6351436957032477
              Encrypted:false
              SSDEEP:48:55IZlkhs7bqIwIoMpqDS7oXb0w+bBijbbyblL:X8COgZbd4x
              MD5:F2A86E76222B06103F6C1E8F89EB453E
              SHA1:D73938EBCA8C1340A7C86E865492EE581DFFC393
              SHA-256:211AB2318746486C356091EC2D3508D6FB79B9EBC78FC843BF2ADC96A38C4217
              SHA-512:B5F4F8FF11FA6D113B23F60D64E1737C7FABDDEBF12C37138F0FA05254E6C1643A2D3CA6C322943F4E877CE2E3736CF0F0741DD390C79E7EE94D56361B14BF45
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Atyrau) {. {-9223372036854775808 12464 0 LMT}. {-1441164464 10800 0 +03}. {-1247540400 18000 0 +05}. {370724400 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400 18
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1643
              Entropy (8bit):3.6348723729667975
              Encrypted:false
              SSDEEP:24:cQcTe0yZH76UtjUtUVmFbmU0cybUJN2cU2U9U56UJMlUoCUUbu/UTbU4UdTbU8U6:5cp6pLmFsyN2LouCIpYZgrCi
              MD5:2C0422E86BA0AECAA97CA01F3A27B797
              SHA1:C28FD8530B7895B4631EA0CAE03E6019561C4C40
              SHA-256:D5D69D7A4FE29761C5C3FFBB41A4F8B6B5F2101A34678B1FA9B1D39FC5478EA8
              SHA-512:3C346DE7E82B8EF1783F5A6D8A6099F7A530DD29AD48EDBB72F019ADC47155A703845503B1DD2589315BB67FA40AEF584313150686248DF45F983781F4B18710
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Baghdad) {. {-9223372036854775808 10660 0 LMT}. {-2524532260 10656 0 BMT}. {-1641005856 10800 0 +03}. {389048400 14400 0 +03}. {402264000 10800 0 +03}. {417906000 14400 1 +03}. {433800000 10800 0 +03}. {449614800 14400 1 +03}. {465422400 10800 0 +03}. {481150800 14400 1 +03}. {496792800 10800 0 +03}. {512517600 14400 1 +03}. {528242400 10800 0 +03}. {543967200 14400 1 +03}. {559692000 10800 0 +03}. {575416800 14400 1 +03}. {591141600 10800 0 +03}. {606866400 14400 1 +03}. {622591200 10800 0 +03}. {638316000 14400 1 +03}. {654645600 10800 0 +03}. {670464000 14400 1 +03}. {686275200 10800 0 +03}. {702086400 14400 1 +03}. {717897600 10800 0 +03}. {733622400 14400 1 +03}. {749433600 10800 0 +03}. {765158400 14400 1 +03}. {780969600 10800 0 +03}. {796694400 14400 1 +03}. {812505600 10800 0 +03}. {828316800 14400 1 +03}. {844128000 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):166
              Entropy (8bit):4.732157428331905
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8hHVAIgNvZAvxL2WFKENUKMFB/4WFKKu:SlSWB9IZaM3yBHVAIgPAvxL2wKENUr/i
              MD5:6291D60E3A30B76FEB491CB944BC2003
              SHA1:3D31032CF518A712FBA49DEC42FF3D99DD468140
              SHA-256:A462F83DDB0CCC41AC10E0B5B98287B4D89DA8BBBCA869CCFB81979C70613C6C
              SHA-512:C62D44527EAD47D2281FF951B9CF84C297859CFDC9A497CB92A583B6012B2B9DAAE9924EF17BC6B7CD317B770FF4924D8E1E77ED2E0EBC02502530D132EDE35B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Qatar)]} {. LoadTimeZoneFile Asia/Qatar.}.set TZData(:Asia/Bahrain) $TZData(:Asia/Qatar).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2075
              Entropy (8bit):3.5206282649651808
              Encrypted:false
              SSDEEP:24:cQ4ekZqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyuU+DTO1KKlYX:5YTVOZmF7N76eHIAMsiWVyv2Te
              MD5:460EDC7D17FFA6AF834B6474D8262FB0
              SHA1:913E117814A5B4B7283A533F47525C8A0C68FD3C
              SHA-256:0A1FDA259EE5EBC779768BBADACC7E1CCAC56484AA6C03F7C1F79647AB79593D
              SHA-512:4047A7AD5F248F0B304FEF06C73EA655D603C39B6AC74629A2ADD49A93E74B23F458DC70E8150AD3F5BBF773F2387907B4BB69A95EB945B9FA432CA6B8AB173D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Baku) {. {-9223372036854775808 11964 0 LMT}. {-1441163964 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {701823600 14400 1 +03}. {717548400 14400 0 +04}. {820440000 14400 0 +04}. {828234000 18000 1 +05}. {846378000 14400 0 +04}. {852062400 14400 0 +04}. {859680000 18000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.863210418273511
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKELYOUXGm2OHB+kevXZKmrROpDvFFsQ+8EXVeVSYvC:SlSWB9X52wKELPm2OHxePZ3FO1Rb+UVe
              MD5:8291C9916E9D5E5C78DE38257798799D
              SHA1:F67A474337CF5FF8460911C7003930455AA0C530
              SHA-256:ED9D1C47D50461D312C7314D5C1403703E29EE14E6BAC97625EFB06F38E4942C
              SHA-512:9B552812A0001271980F87C270EF4149201403B911826BDF17F66EE1015B9AC859C1B2E7BB4EB6BC56E37CDB24097BF001201C34AD7D4C0C910AE17CFEC36C8B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Bangkok) {. {-9223372036854775808 24124 0 LMT}. {-2840164924 24124 0 BMT}. {-1570084924 25200 0 +07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2044
              Entropy (8bit):3.6106776173203916
              Encrypted:false
              SSDEEP:48:5Mi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/L7UVtrBju6waUwcTLTTg:9jFRRCfQuiB7TQZ
              MD5:DC7A71DAB17C7F4A348DC1EE2FC458C5
              SHA1:982FAB93A637D18A049DDBE96B0341736C66561D
              SHA-256:52DB3278189AA2380D84A81199A2E7F3B40E9706228D2291C6257FD513D78667
              SHA-512:90659D37D2A2E8574A88FD7F222C28D9572A9866FC3459B0CC1760FECBC7C4A0574B224C252877D723B06DD72165C4FE368D5B00DAB662B85D2E0F4CB2A89271
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Barnaul) {. {-9223372036854775808 20100 0 LMT}. {-1579844100 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433200 2
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7754
              Entropy (8bit):3.6329631010207892
              Encrypted:false
              SSDEEP:96:OnQv8iPC28v82K/w1VxDmsCZgV+f7dIWDkLDo1WlqCTpXxcKvjRQZwtPEWRTvS4y:OQjPCL5VxKWC7dIWDkLDoqphsX
              MD5:2D3AE4AD36BD5F302F980EB5F1DD0E4A
              SHA1:02244056D6D4EC57937D1E187CC65E8FD18F67F0
              SHA-256:E9DD371FA47F8EF1BE04109F0FD3EBD9FC5E2B0A12C0630CDD20099C838CBEBB
              SHA-512:2E4528254102210B8A9A2263A8A8E72774D40F57C2431C2DD6B1761CD91FB6CEA1FAD23877E1E2D86217609882F3605D7FE477B771A398F91F8D8AD3EAF90BAC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Beirut) {. {-9223372036854775808 8520 0 LMT}. {-2840149320 7200 0 EET}. {-1570413600 10800 1 EEST}. {-1552186800 7200 0 EET}. {-1538359200 10800 1 EEST}. {-1522551600 7200 0 EET}. {-1507514400 10800 1 EEST}. {-1490583600 7200 0 EET}. {-1473645600 10800 1 EEST}. {-1460948400 7200 0 EET}. {-399866400 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336794400 10800 1 EEST}. {-323578800 7200 0 EET}. {-305172000 10800 1 EEST}. {-291956400 7200 0 EET}. {-273636000 10800 1 EEST}. {-260420400 7200 0 EET}. {78012000 10800 1 EEST}. {86734800 7200 0 EET}. {105055200 10800 1 EEST}. {118270800 7200 0 EET}. {136591200 10800 1 EEST}. {149806800 7200 0 EET}. {168127200 10800 1 EEST}. {181342800 7200 0 EET}. {199749600 10800 1 EEST}. {212965200 7200 0 EET}. {231285600 10800 1 EEST}. {244501200 7200 0 EE
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1611
              Entropy (8bit):3.653654369590701
              Encrypted:false
              SSDEEP:24:cQge4/SsOXEFCMiq90DIgb5j6gMJR/4TJTXSATolS+WSP7VSzlBSkhFSblDSDOQy:5qFqq9iTVrX2ioerAYabcivcnXKh
              MD5:1A3A4825B73F11024FD21F94AE85F9D2
              SHA1:E63443CC267B43EFEFFD1E3161293217526E7DC8
              SHA-256:D8205F34BB8B618E2F8B4EB6E613BE1B5CFBBF3B6CBFAFE868644E1A1648C164
              SHA-512:5C766BD6FB6195BEBD7CDF703B7E0A67FBB2BCF98052866AE9ACDC5B90469421508F52C60F22542BBA6ED8CC59B4889F20DB131B183918592139B6D135BC57A2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Bishkek) {. {-9223372036854775808 17904 0 LMT}. {-1441169904 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {683586000 18000 0 +05}. {703018800 21600 1 +05}. {717530400 18000 0 +05}. {734468400 21600 1 +05}. {748980000 18000 0 +05}. {765918000 21600 1 +05}. {780429600 18000 0 +05}. {797367600 2
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.792958708451203
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKXeAMMkEXGm2OHCQdvVVvUWUOVFW/FvOVSSC/FiUMWfV1S:SlSWB9X52wK0bm2OHCIvVVXUuW/MVSSV
              MD5:95EE0EFC01271C3E3195ADC360F832C7
              SHA1:CDFA243F359AC5D2FA22032BF296169C8B2B942A
              SHA-256:241C47769C689823961D308B38D8282F6852BC0511E7DC196BF6BF4CFADBE401
              SHA-512:11CAE9804EF933A790F5B9B86CC03C133DBD1DB97FAA78F508D681662AAC3714B93166B596F248799FC5B86344B48764865D3371427119999CB02963C98E15C3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Brunei) {. {-9223372036854775808 27580 0 LMT}. {-1383464380 27000 0 +0730}. {-1167636600 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.721946029615065
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq864DdVAIgN1EF2WFKh0s+WFKvvn:SlSWB9IZaM3ya4DdVAIgo2wKN+wKvv
              MD5:A967F010A398CD98871E1FF97F3E48AC
              SHA1:6C8C0AF614D6789CD1F9B6243D26FAC1F9B767EF
              SHA-256:B07250CD907CA11FE1C94F1DCCC999CECF8E9969F74442A9FCC00FC48EDE468B
              SHA-512:67E3207C8A63A5D8A1B7ED1A62D57639D695F9CD83126EB58A70EF076B816EC5C4FDBD23F1F32A4BB6F0F9131D30AF16B56CD92B1C42C240FD886C81BA8940DA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Kolkata)]} {. LoadTimeZoneFile Asia/Kolkata.}.set TZData(:Asia/Calcutta) $TZData(:Asia/Kolkata).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2014
              Entropy (8bit):3.6060921590827193
              Encrypted:false
              SSDEEP:24:cQyeCXQS6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikiAF:5c/9InX4n7m84nPIzOtfjQhGTNw
              MD5:A3FB98DC18AC53AE13337F3CC1C4CE68
              SHA1:F0280D5598AEB6B6851A8C2831D4370E27121B5F
              SHA-256:D0A984F2EDB6A5A4E3C3CFA812550782F6B34AD0C79B1DD742712EBA14B7B9FB
              SHA-512:A33E2E0EA093BB758539A761B4CF82204699BC35950ACD329DA9205A141469930CAF179E4331DF505408C7C4F97480416DC16C7E93E53B12392509E5A093E562
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Chita) {. {-9223372036854775808 27232 0 LMT}. {-1579419232 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000 324
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1563
              Entropy (8bit):3.6863846285633057
              Encrypted:false
              SSDEEP:24:cQtZeCjXN1xJq4tyiIHil++lqivEoziHvqil+fiRBiS/BvWjiY2Vizi6Xi4+k8ih:5tFdXJVHpkbvvWr2sv5kPYxwM3N5
              MD5:799F0221A1834C723E6BBA2D00727156
              SHA1:569BBC1F20F7157ECF753A8DEB49156B260A96E0
              SHA-256:02FF47A619BE154A88530BA8C83F5D52277FA8E8F7941C0D33F89161CE1B5503
              SHA-512:535812754A92E251A9C86C20E3032A6B363F77F6839C95DAD6ED18200ACAA3075E602AD626F50B84EB931D1D33BD0E00CA5AE1D1D95DEBECDE57EE9E65A137DF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Choibalsan) {. {-9223372036854775808 27480 0 LMT}. {-2032933080 25200 0 +07}. {252435600 28800 0 +08}. {417974400 36000 0 +09}. {433778400 32400 0 +09}. {449593200 36000 1 +09}. {465314400 32400 0 +09}. {481042800 36000 1 +09}. {496764000 32400 0 +09}. {512492400 36000 1 +09}. {528213600 32400 0 +09}. {543942000 36000 1 +09}. {559663200 32400 0 +09}. {575391600 36000 1 +09}. {591112800 32400 0 +09}. {606841200 36000 1 +09}. {622562400 32400 0 +09}. {638290800 36000 1 +09}. {654616800 32400 0 +09}. {670345200 36000 1 +09}. {686066400 32400 0 +09}. {701794800 36000 1 +09}. {717516000 32400 0 +09}. {733244400 36000 1 +09}. {748965600 32400 0 +09}. {764694000 36000 1 +09}. {780415200 32400 0 +09}. {796143600 36000 1 +09}. {811864800 32400 0 +09}. {828198000 36000 1 +09}. {843919200 32400 0 +09}. {859647600 36000 1 +09}. {875368800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.815975603028152
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFKh2V7/4WFKdv:SlSWB9IZaM3yMwVAIgE2wKho4wKt
              MD5:37D7B7C1E435E2539FDD83D71149DD9A
              SHA1:F4ADE88DDF244BD2FF5B23714BF7449A74907E08
              SHA-256:78611E8A0EBEBC4CA2A55611FAC1F00F8495CB044B2A6462214494C7D1F5DA6A
              SHA-512:E0C57229DC76746C6424606E41E10E97F0F08DD2B00659172DA35F3444BF48B4BC7E2F339A10ECC21628A683E2CB8B4FA5945B8AC68C6BAFEA720AFBB88C90C6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Chongqing) $TZData(:Asia/Shanghai).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.840543487466552
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFK7LeL9J4WFKdv:SlSWB9IZaM3yMwVAIgE2wK7LUT4wKt
              MD5:6F21100628DD48B2FF4B1F2AF92E05CB
              SHA1:B74478D0EC95A577C2A58497692DB293BBD31586
              SHA-256:DB2C572E039D1A777FFC66558E2BEE46C52D8FE57401436AE18BB4D5892131CE
              SHA-512:2D3C37790B6A764FE4E1B8BD8EDF1D073D711F59CEA3EC5E6003E481898F7285B42A14E904C3D148422244BB083FBA42C6623DF7DA05923F6145EEE3FD259520
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Chungking) $TZData(:Asia/Shanghai).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.4006537789533695
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKr+tJm2OHgPZv9tGZjSWV/FSQRpPUrK/F/ND/k5iRVVFSQ9R/U4C/k:MBp52z+mdHgPZvqZj1NjDPh/F/1/Y4vF
              MD5:4074FBEF7DD0DF48AD74BDAED3106A75
              SHA1:FB1E5190EAF8BF9B64EED49F115E34926C1EAF53
              SHA-256:DB6A7EA0DC757706126114BED5E693565938AABFE3DA1670170647CCDE6BE6CD
              SHA-512:A469C09FA6A1DA1DB140BFFECB931DBC4B2315A13B82FCA8813C93954598D03818323B7DDE1106D1F1D815ED69523361369AF883CA4818CA562D728F7A88D8A7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Colombo) {. {-9223372036854775808 19164 0 LMT}. {-2840159964 19172 0 MMT}. {-2019705572 19800 0 +0530}. {-883287000 21600 1 +06}. {-862639200 23400 1 +0630}. {-764051400 19800 0 +0530}. {832962600 23400 0 +0630}. {846266400 21600 0 +06}. {1145039400 19800 0 +0530}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):164
              Entropy (8bit):4.733855608307331
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8ntdVAIgN6Ko2WFK1S2WFKwu:SlSWB9IZaM3yHtdVAIgMKo2wKM2wKwu
              MD5:629FC03B52D24615FB052C84B0F30452
              SHA1:80D24B1A70FC568AB9C555BD1CC70C17571F6061
              SHA-256:BD3E4EE002AFF8F84E74A6D53E08AF5B5F2CAF2B06C9E70B64B05FC8F0B6CA99
              SHA-512:1C912A5F323E84A82D60300F6AC55892F870974D4DEFE0AF0B8F6A87867A176D3F8D66C1A5B11D8560F549D738FFE377DC20EB055182615062D4649BBA011F32
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Dhaka)]} {. LoadTimeZoneFile Asia/Dhaka.}.set TZData(:Asia/Dacca) $TZData(:Asia/Dhaka).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8031
              Entropy (8bit):3.629699951300869
              Encrypted:false
              SSDEEP:96:zY75F5VoNVIkbl3IUQZufk0Eej4YWuM0c5/61a7/VGfV8SbU5J3Mirmgs3LmiK:zI75KN+YlgYE+4YWPB6O4in9
              MD5:202E5950F6324878B0E6FD0056D2F186
              SHA1:A668D4DC3E73A292728CCE136EFFAC95D5952A81
              SHA-256:3BB43B71FF807AA3BF6A7F94680FB8BD586A1471218307A6A7A4CE73A5A3A55E
              SHA-512:5F9A7308E9C08267ECB8D502505EF9B32269D62FA490D6BC01F6927CB8D5B40CA17BB0CDFA3EE78D48C7686EAA7FD266666EB80E54125859F86CADFD7366DB6B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Damascus) {. {-9223372036854775808 8712 0 LMT}. {-1577931912 7200 0 EET}. {-1568592000 10800 1 EEST}. {-1554080400 7200 0 EET}. {-1537142400 10800 1 EEST}. {-1522630800 7200 0 EET}. {-1505692800 10800 1 EEST}. {-1491181200 7200 0 EET}. {-1474243200 10800 1 EEST}. {-1459126800 7200 0 EET}. {-242265600 10800 1 EEST}. {-228877200 7200 0 EET}. {-210556800 10800 1 EEST}. {-197427600 7200 0 EET}. {-178934400 10800 1 EEST}. {-165718800 7200 0 EET}. {-147398400 10800 1 EEST}. {-134269200 7200 0 EET}. {-116467200 10800 1 EEST}. {-102646800 7200 0 EET}. {-84326400 10800 1 EEST}. {-71110800 7200 0 EET}. {-52704000 10800 1 EEST}. {-39488400 7200 0 EET}. {-21168000 10800 1 EEST}. {-7952400 7200 0 EET}. {10368000 10800 1 EEST}. {23583600 7200 0 EET}. {41904000 10800 1 EEST}. {55119600 7200 0 EET}. {73526400 10800 1 EEST}. {86742000 7200 0 EET}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):351
              Entropy (8bit):4.345019966462698
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKwfTm2OHEmVFnP9vX+H7UlckVVFSQRL/FG/UPy/UiF/ji/UiF/jWKO:MBp52YfTmdHzdP9P+bcvjRQmmF/j2F/8
              MD5:F5A6B4C90D50208EF512A728A2A03BB6
              SHA1:C9D3C712EDABDFCD1629E72AF363CEB2A0E2334E
              SHA-256:42BF62F13C2F808BEFD2601D668AFE5D49EA417FC1AC5391631C20ED7225FF46
              SHA-512:64D413D9299436877F287943FF454EB2AFD415D87DE13AACA50E7BD123828D16CFABD679677F36C891024AB53C62695559DAABDECCC127A669C3ECA0F155453B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dhaka) {. {-9223372036854775808 21700 0 LMT}. {-2524543300 21200 0 HMT}. {-891582800 23400 0 +0630}. {-872058600 19800 0 +0530}. {-862637400 23400 0 +0630}. {-576138600 21600 0 +06}. {1230746400 21600 0 +06}. {1245430800 25200 1 +06}. {1262278800 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):226
              Entropy (8bit):4.536797249025477
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKCXeLm2OHnBGeVmkNvyvScCVUkP1avScCC:MBp52qXEmdHnBvVDVyHCPP8HCC
              MD5:54EC6A256F6D636CD98DD48CDF0E48F1
              SHA1:571244C3D84A8A6EFFE55C787BFBCE7A6014462C
              SHA-256:88D61A495724F72DA6AB20CC997575F27797589C7B80F2C63C27F84BF1EB8D61
              SHA-512:EDD67865D3AD3D2F6D1AFFAE35B6B25E2439164E0BEF8E0E819F88F937F896C10EAB513467524DA0A5A2E3D4C78F55EA3F98F25979B8625DFC66801CBBE9301F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dili) {. {-9223372036854775808 30140 0 LMT}. {-1830414140 28800 0 +08}. {-879152400 32400 0 +09}. {199897200 28800 0 +08}. {969120000 32400 0 +09}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):142
              Entropy (8bit):4.927936359970315
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKQiXGm2OHvkdvUQK23NVsRYvC:SlSWB9X52wKQZm2OHvsRVNSQC
              MD5:6CC252314EDA586C514C76E6981EEAEE
              SHA1:F58C9072FBBA31C735345162F629BB6CAAB9C871
              SHA-256:8D7409EBC94A817962C3512E07AFF32838B54B939068129C73EBBEEF8F858ED2
              SHA-512:40BC04B25F16247F9F6569A37D28EDCA1D7FB33586482A990A36B5B148BF7598CF5493D38C4D1CBDF664553302E4D6505D80EB7E7B5B9FB5141CB7F39B99A93D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dubai) {. {-9223372036854775808 13272 0 LMT}. {-1577936472 14400 0 +04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):791
              Entropy (8bit):3.8859952964866946
              Encrypted:false
              SSDEEP:24:cQJeOJSsOXEFCMiq90DIgb5j6gMJR/4TJTi4GDL:51Fqq9iTVuzL
              MD5:316F527821D632517866A6E7F97365B3
              SHA1:6F56985AF44E6533778CFB1FC04D206367A6C0BF
              SHA-256:5A8FFD24FF0E26C99536EB9D3FB308C28B3491042034B187140039B7A5DF6F1F
              SHA-512:7EA1ABD02CD8461DD91576B5BCB46B6E3AE25F94BC7936DC051C0964F4EA2F55C58CB1FA6C3A82334AAAAFCDBD6D6DBEBE33FB1C7C45FBDCA5EC43FD46A970A7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dushanbe) {. {-9223372036854775808 16512 0 LMT}. {-1441168512 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 21600 1 +06}. {684363600 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7341
              Entropy (8bit):3.6266031318601386
              Encrypted:false
              SSDEEP:96:vPByq7VKviW/naKl9pUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEA:vPFi//Th2kNU4tB715pyzHy1gA
              MD5:997FF37AE5C6E2E13664100C2FBF8E19
              SHA1:BF59628212564E50BCC5247C534658C8B7CFF0EE
              SHA-256:639F26A411E298948A4FAC560E218ED7079722FB4E4AAF8CE0688A3BE24868AE
              SHA-512:41FEF2026A3062ECA62729A555D10F9ABA777CCBE4E907489B74FC91C645E6010ECFABD2ACB4ED652ADF97E0A69935CB2FADA6732744ED3ADA95DD2EB3C08655
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Famagusta) {. {-9223372036854775808 8148 0 LMT}. {-1518920148 7200 0 EET}. {166572000 10800 1 EEST}. {182293200 7200 0 EET}. {200959200 10800 1 EEST}. {213829200 7200 0 EET}. {228866400 10800 1 EEST}. {243982800 7200 0 EET}. {260316000 10800 1 EEST}. {276123600 7200 0 EET}. {291765600 10800 1 EEST}. {307486800 7200 0 EET}. {323820000 10800 1 EEST}. {338936400 7200 0 EET}. {354664800 10800 1 EEST}. {370386000 7200 0 EET}. {386114400 10800 1 EEST}. {401835600 7200 0 EET}. {417564000 10800 1 EEST}. {433285200 7200 0 EET}. {449013600 10800 1 EEST}. {465339600 7200 0 EET}. {481068000 10800 1 EEST}. {496789200 7200 0 EET}. {512517600 10800 1 EEST}. {528238800 7200 0 EET}. {543967200 10800 1 EEST}. {559688400 7200 0 EET}. {575416800 10800 1 EEST}. {591138000 7200 0 EET}. {606866400 10800 1 EEST}. {622587600 7200 0 EET}. {638316000 108
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7974
              Entropy (8bit):3.660638074803316
              Encrypted:false
              SSDEEP:96:uR7CUoVy0FUeLR2S5nfclzdVYi8x6PxGtv2h4WSwLnRPCILXwuiaAXOH4g1iWThA:uRiVy0WetivMKRPCAXwZ6plyk8B
              MD5:45C8B6CB180839A1F3D500071D1AFC1D
              SHA1:59E900FB2D7BFF44AED578B9BD10AA0530B4F5D1
              SHA-256:FA459622B54CD0A5603323EA00CE64D63BBC957EC0BDCC9BE73D48916237619C
              SHA-512:5F485299D6DF9EBD620D2AEF7BDE21C7505EAD51467699874408691C644E9E6D8C63DD6061489E924B95672A227B5B9921E4281405981FCBBCA4619F80195AB5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Gaza) {. {-9223372036854775808 8272 0 LMT}. {-2185409872 7200 0 EEST}. {-933645600 10800 1 EEST}. {-857358000 7200 0 EEST}. {-844300800 10800 1 EEST}. {-825822000 7200 0 EEST}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EEST}. {-779853600 10800 1 EEST}. {-762656400 7200 0 EEST}. {-748310400 10800 1 EEST}. {-731127600 7200 0 EEST}. {-682653600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 7200 0 EET}. {-115866000 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.814799933523261
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFKwHp4WFKdv:SlSWB9IZaM3yMwVAIgE2wKi4wKt
              MD5:2B286E58F2214F7A28D2A678B905CFA3
              SHA1:A76B2D8BA2EA264FE84C5C1ED3A6D3E13288132F
              SHA-256:6917C89A78ED54DD0C5C9968E5149D42727A9299723EC1D2EBD531A65AD37227
              SHA-512:0022B48003FE9C8722FD1762FFB8E07E731661900FCE40BD6FE82B70F162FF5D32888028519D51682863ADCAC6DD21D35634CA06489FD4B704DA5A8A018BF26F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Harbin) $TZData(:Asia/Shanghai).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7950
              Entropy (8bit):3.6634483349947593
              Encrypted:false
              SSDEEP:96:JrCUoVy0FUeLR2S5nfclzdVYi8x6PxGtv2h4WFwLnRPCILXwuiaAXOH4g1iWThiD:JyVy0WetivMvRPCAXwZ6plyk8B
              MD5:67602731E9D02418D0B1DCBCB9367870
              SHA1:13D896B6B8B553879D70BFBA6734AFDFE3A522A4
              SHA-256:9D89F879C6F47F05015C8B7D66639AAC8AF2D5A6F733CDA60CFF22EB0EB71221
              SHA-512:ECA8EB42144EF4097E606AC57795491248D02C331CE426E7C23D42490F873CD19924F1C2318E2FF1D18E275F3CAD60E9DFBB08B4B8334EA3FF1EE31452B9E167
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hebron) {. {-9223372036854775808 8423 0 LMT}. {-2185410023 7200 0 EEST}. {-933645600 10800 1 EEST}. {-857358000 7200 0 EEST}. {-844300800 10800 1 EEST}. {-825822000 7200 0 EEST}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EEST}. {-779853600 10800 1 EEST}. {-762656400 7200 0 EEST}. {-748310400 10800 1 EEST}. {-731127600 7200 0 EEST}. {-682653600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 7200 0 EET}. {-115866000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):381
              Entropy (8bit):4.352557338100764
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKKACm2OHAT1P3XTxYCMVSYv/lTkd+zvScCBcFVtQvMVSYv/vMUEkB5:MBp52SmdHqP3tYZF/Cd+zHCBiVikF/v9
              MD5:41EF18FF071B8541A5CA830C131B22D3
              SHA1:65E502FD93FE025FD7B358B2953335F4B41BBC68
              SHA-256:95525205BC65B8DB626EF5257F6C3A93A4902AB6415C080EE67399B41D9AD7AA
              SHA-512:3889199D84CE456CC7231B0A81CCA7F4C976ED13015869BF486078075F24687C588F9FB52E09744ED4763CA71CC869048C588CDD42C2EA195A9B04EB9C18A123
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ho_Chi_Minh) {. {-9223372036854775808 25600 0 LMT}. {-2004073600 25590 0 PLMT}. {-1851577590 25200 0 +07}. {-852105600 28800 0 +08}. {-782643600 32400 0 +09}. {-767869200 25200 0 +07}. {-718095600 28800 0 +08}. {-457776000 25200 0 +07}. {-315648000 28800 0 +08}. {171820800 25200 0 +07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2150
              Entropy (8bit):3.923186571913929
              Encrypted:false
              SSDEEP:24:cQPeCtKkjz1lk/mJURqMJDHxyOPq8vWhV0Z8dX83FdX1BzX4JX/v9YsKP2ieGklq:5tK+Zlim0nltdT1BD45X+iA3tnN7
              MD5:BBA59A5886F48DCEC5CEFDB689D36880
              SHA1:8207DE6AB5F7EC6077506ED3AE2EEA3AB35C5FAE
              SHA-256:F66F0F161B55571CC52167427C050327D4DB98AD58C6589FF908603CD53447F0
              SHA-512:D071D97E6773FC22ABCCE3C8BE133E0FDA40C385234FEB23F69C84ABB9042E319D6891BD9CA65F2E0A048E6F374DB91E8880DCD9711A86B79A3A058517A3DBFA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hong_Kong) {. {-9223372036854775808 27402 0 LMT}. {-2056693002 28800 0 HKT}. {-907389000 32400 1 HKST}. {-891667800 28800 0 HKT}. {-884246400 32400 0 JST}. {-766746000 28800 0 HKT}. {-747981000 32400 1 HKST}. {-728544600 28800 0 HKT}. {-717049800 32400 1 HKST}. {-694503000 28800 0 HKT}. {-683785800 32400 1 HKST}. {-668064600 28800 0 HKT}. {-654755400 32400 1 HKST}. {-636615000 28800 0 HKT}. {-623305800 32400 1 HKST}. {-605165400 28800 0 HKT}. {-591856200 32400 1 HKST}. {-573715800 28800 0 HKT}. {-559801800 32400 1 HKST}. {-542352600 28800 0 HKT}. {-528352200 32400 1 HKST}. {-510211800 28800 0 HKT}. {-498112200 32400 1 HKST}. {-478762200 28800 0 HKT}. {-466662600 32400 1 HKST}. {-446707800 28800 0 HKT}. {-435213000 32400 1 HKST}. {-415258200 28800 0 HKT}. {-403158600 32400 1 HKST}. {-383808600 28800 0 HKT}. {-371709000 32400 1 HKST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1528
              Entropy (8bit):3.661748285763298
              Encrypted:false
              SSDEEP:24:cQxEecP9NQwOkN/DN9yinNQHhNY0NVgN8wNy7nNA8eZN0vNb7NBN5pNUckNBe/v9:5MjQwJ/pMiNQXYGVy8iy7NA8ev0VbxX3
              MD5:6CF9D198D7CC1F0E16DDFE91A6B4A1A5
              SHA1:D1DEE309E479271CDC3A306272CF4D94367EC68A
              SHA-256:7E189D7937E5B41CD94AB5208E40C645BE678F2A4F4B02EE1305595E5296E3D0
              SHA-512:56488F1DD1C694457FC7F8B13550B3D2B3BC737241E311783135115E2BD585FDD083A5146488A121BC02CC1F05EF40C05A88EED1AF391FB9E4653C1F25CC4AF7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hovd) {. {-9223372036854775808 21996 0 LMT}. {-2032927596 21600 0 +06}. {252439200 25200 0 +07}. {417978000 28800 1 +07}. {433785600 25200 0 +07}. {449600400 28800 1 +07}. {465321600 25200 0 +07}. {481050000 28800 1 +07}. {496771200 25200 0 +07}. {512499600 28800 1 +07}. {528220800 25200 0 +07}. {543949200 28800 1 +07}. {559670400 25200 0 +07}. {575398800 28800 1 +07}. {591120000 25200 0 +07}. {606848400 28800 1 +07}. {622569600 25200 0 +07}. {638298000 28800 1 +07}. {654624000 25200 0 +07}. {670352400 28800 1 +07}. {686073600 25200 0 +07}. {701802000 28800 1 +07}. {717523200 25200 0 +07}. {733251600 28800 1 +07}. {748972800 25200 0 +07}. {764701200 28800 1 +07}. {780422400 25200 0 +07}. {796150800 28800 1 +07}. {811872000 25200 0 +07}. {828205200 28800 1 +07}. {843926400 25200 0 +07}. {859654800 28800 1 +07}. {875376000 25200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2017
              Entropy (8bit):3.6386982097761646
              Encrypted:false
              SSDEEP:48:5ykBJaTcSANEWiLwyyzLyonofMQa3go8h8PNhRHbsb0k4xiRhIsJ2sbA:BB656ofU5ARdN8
              MD5:E4995DD6F78F859B17952F15DB554ADC
              SHA1:19D4957E2A8CC17BCA7F020E4DF411F0E3AC8B49
              SHA-256:122FEB27760CC2CD714531CF68E6C77F8505E9CA11A147DDA649E2C98E150494
              SHA-512:A36B334E72C9D0854F0DE040EEEBF7B92E537F770D4EEBB1697AB9DD6AB00E678BE58A7CE2514A4667BA2B8760625C22D21AFE3AB80C5B1DBB7C10E91CDDDB3A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Irkutsk) {. {-9223372036854775808 25025 0 LMT}. {-2840165825 25025 0 IMT}. {-1575874625 25200 0 +07}. {-1247554800 28800 0 +09}. {354902400 32400 1 +09}. {370710000 28800 0 +08}. {386438400 32400 1 +09}. {402246000 28800 0 +08}. {417974400 32400 1 +09}. {433782000 28800 0 +08}. {449596800 32400 1 +09}. {465328800 28800 0 +08}. {481053600 32400 1 +09}. {496778400 28800 0 +08}. {512503200 32400 1 +09}. {528228000 28800 0 +08}. {543952800 32400 1 +09}. {559677600 28800 0 +08}. {575402400 32400 1 +09}. {591127200 28800 0 +08}. {606852000 32400 1 +09}. {622576800 28800 0 +08}. {638301600 32400 1 +09}. {654631200 28800 0 +08}. {670356000 25200 0 +08}. {670359600 28800 1 +08}. {686084400 25200 0 +07}. {695761200 28800 0 +09}. {701805600 32400 1 +09}. {717530400 28800 0 +08}. {733255200 32400 1 +09}. {748980000 28800 0 +08}. {764704800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.853387718159342
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV0XaDvFVAIgoq3XPHt2WFK4HB/8QaqXNn:SlSWB9IZaM3ymQazFVAIgoQPHt2wK4HJ
              MD5:7EC8D7D32DC13BE15122D8E26C55F9A2
              SHA1:5B07C7161F236DF34B0FA83007ECD75B6435F420
              SHA-256:434B8D0E3034656B3E1561615CCA192EFA62942F285CD59338313710900DB6CB
              SHA-512:D8F1999AF509871C0A7184CFEFB0A50C174ABDE218330D9CDC784C7599A655AD55F6F2173096EA91EE5700B978B9A94BBFCA41970206E7ADEB804D0EE03B45ED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Istanbul)]} {. LoadTimeZoneFile Europe/Istanbul.}.set TZData(:Asia/Istanbul) $TZData(:Europe/Istanbul).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):357
              Entropy (8bit):4.4086954127843585
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKcr6m2OHATJesaSY4SMNkc5q/MVSSmWSyvScCAdMVSSo1CkDF4mMVt:MBp52E6mdHjkAc5aMxdSyHCQMxoRDF4d
              MD5:88C82B18565C27E050074AD02536D257
              SHA1:9A150FCD9FAA0E903D70A719D949D00D82F531E3
              SHA-256:BC07AE610EF38F63EFF384E0815F6F64E79C61297F1C21469B2C5F19679CEAFB
              SHA-512:29152E0359BC0FB8648BC959DE01D0BCCD17EB928AE000FF77958E7F00FF7D65BFD2C740B438E114D53ABA260B7855B2695EF7C0484850A77FFF34F7A0B255CC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jakarta) {. {-9223372036854775808 25632 0 LMT}. {-3231299232 25632 0 BMT}. {-1451719200 26400 0 +0720}. {-1172906400 27000 0 +0730}. {-876641400 32400 0 +09}. {-766054800 27000 0 +0730}. {-683883000 28800 0 +08}. {-620812800 27000 0 +0730}. {-189415800 25200 0 WIB}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):205
              Entropy (8bit):4.7830039894710366
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKcjm2OHG4YVkcfvScCvowkVcrd1CV4zvhL:MBp52omdHNYacfHCvop2BMVkV
              MD5:3C073BD9DFD2C4F9BC95C8A94652FF5D
              SHA1:F4084CDFC025B3A21092DE18DD8ECAFCA5F0EBBB
              SHA-256:82FC06E73477EBB50C894244C91E613BF3551053359798F42F2F2C913730A470
              SHA-512:7E79E4425A0D855AAE8DCF5C7196AABE8E75D92CD9B65C61B82B31B29395D4A5F2D8B1E90454037753D03A1BDDE44E8F15D7E999E65C49BE8E8F8A2B2C4EECD0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jayapura) {. {-9223372036854775808 33768 0 LMT}. {-1172913768 32400 0 +09}. {-799491600 34200 0 +0930}. {-189423000 32400 0 WIT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7690
              Entropy (8bit):3.684387169764595
              Encrypted:false
              SSDEEP:96:GzmnxfFtWR8fKnG/QvW+tCE5nfclzdVYi8x6PxGtv2TiGuyLsbAicBnKqXRGlGrz:0mKivDivbOKWKwX5BrAZp0
              MD5:4C37DF27AB1E906CC624A62288847BA8
              SHA1:BE690D3958A4A6722ABDF047BF22ACEC8B6D6AFE
              SHA-256:F10DF7378FF71EDA45E8B1C007A280BBD4629972D12EAB0C6BA7623E98AAFA17
              SHA-512:B14F5FB330078A564796114FA6804EA12CE0AD6B2DF6D871FF6E7B416425B12FFD6B4E8511FCD55609FBCE95C8EDFF1E14B1C8C505F4B5B66F47EA52FD53F307
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jerusalem) {. {-9223372036854775808 8454 0 LMT}. {-2840149254 8440 0 JMT}. {-1641003640 7200 0 IST}. {-933645600 10800 1 IDT}. {-857358000 7200 0 IST}. {-844300800 10800 1 IDT}. {-825822000 7200 0 IST}. {-812685600 10800 1 IDT}. {-794199600 7200 0 IST}. {-779853600 10800 1 IDT}. {-762656400 7200 0 IST}. {-748310400 10800 1 IDT}. {-731127600 7200 0 IST}. {-681962400 14400 1 IDDT}. {-673243200 10800 1 IDT}. {-667962000 7200 0 IST}. {-652327200 10800 1 IDT}. {-636426000 7200 0 IST}. {-622087200 10800 1 IDT}. {-608947200 7200 0 IST}. {-591847200 10800 1 IDT}. {-572486400 7200 0 IST}. {-558576000 10800 1 IDT}. {-542851200 7200 0 IST}. {-527731200 10800 1 IDT}. {-514425600 7200 0 IST}. {-490845600 10800 1 IDT}. {-482986800 7200 0 IST}. {-459475200 10800 1 IDT}. {-451537200 7200 0 IST}. {-428551200 10800 1 IDT}. {-418262400 7200 0 IST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.804360783547797
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKTwkXGm2OHodFxsYvXgVHURRNVsRYvFFqdj/cXHFOVRWh:SlSWB9X52wKTEm2OHoH+YPgVHURbSQF9
              MD5:9A8CCA0B4337CB6FA15BF1A4F01F6C22
              SHA1:A4C72FC1EF6EEBDBB5C8C698BCB298DFB5061726
              SHA-256:4F266D90C413FA44DFCA5BE13E45C00428C694AC662CB06F2451CC3FF08E080F
              SHA-512:E8074AA0D8B15EE33D279C97A01FF69451A99C7711FFD66B3E9B6B6B021DE957A63F6B747C7A63E3F3C1241E0A2687D81E780D6B54228EE6B7EB9040D7F06A60
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kabul) {. {-9223372036854775808 16608 0 LMT}. {-2524538208 14400 0 +04}. {-788932800 16200 0 +0430}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1989
              Entropy (8bit):3.6993158455985338
              Encrypted:false
              SSDEEP:24:cQ+3e8/HklxL7/Fpd2kNNxLcULBQdHl2yYvpQ62itgUiRrn5d6kGFF6UERWkBUHA:5c/HezFvpchKvW62XPdXJMwT3Lea
              MD5:496BD39D36218DF67279DA8DE9C7457B
              SHA1:8AE6E5CF7E1E693D11A112B75A0D24A135E94487
              SHA-256:6B757333C12F2BFE782258D7E9126ECE0E62696EF9C24B2955A791145D6780E9
              SHA-512:BADBF7893825F6C7053A23A7AA11B45A2EDBECC4580695BB6B8E568B7FFE5ED72BF61019F3CB6D7B8E663ACAF099F26E266450EC03F3C6B2F8E34BA0D12D100A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kamchatka) {. {-9223372036854775808 38076 0 LMT}. {-1487759676 39600 0 +11}. {-1247569200 43200 0 +13}. {354888000 46800 1 +13}. {370695600 43200 0 +12}. {386424000 46800 1 +13}. {402231600 43200 0 +12}. {417960000 46800 1 +13}. {433767600 43200 0 +12}. {449582400 46800 1 +13}. {465314400 43200 0 +12}. {481039200 46800 1 +13}. {496764000 43200 0 +12}. {512488800 46800 1 +13}. {528213600 43200 0 +12}. {543938400 46800 1 +13}. {559663200 43200 0 +12}. {575388000 46800 1 +13}. {591112800 43200 0 +12}. {606837600 46800 1 +13}. {622562400 43200 0 +12}. {638287200 46800 1 +13}. {654616800 43200 0 +12}. {670341600 39600 0 +12}. {670345200 43200 1 +12}. {686070000 39600 0 +11}. {695746800 43200 0 +13}. {701791200 46800 1 +13}. {717516000 43200 0 +12}. {733240800 46800 1 +13}. {748965600 43200 0 +12}. {764690400 46800 1 +13}. {780415200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):441
              Entropy (8bit):4.32891547054552
              Encrypted:false
              SSDEEP:12:MBp52SmdH35S6DvjRQ+vjjEn6S7Pictk6a2iW6oNl:cQSe3pjRQ+jjE6S7lTh
              MD5:7A7CFCB7273FCAE33F77048F225BBBBD
              SHA1:44701B91CBC61FCAC8EEB6E67BCCA0403E9FDD7E
              SHA-256:9F8C46E5AC4DF691DDCB13C853660915C94316E73F74DD36AF889D5137F1761B
              SHA-512:44D5A0656032D61152C98B92E3ACA88197A73D87E2D0E8853D6A0E430BDF9290D3B718F9E5864840A6FFA59CDC0D4D47BCEE0471F176E62A05C1083CB35BEBB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Karachi) {. {-9223372036854775808 16092 0 LMT}. {-1988166492 19800 0 +0530}. {-862637400 23400 1 +0630}. {-764145000 19800 0 +0530}. {-576135000 18000 0 +05}. {38775600 18000 0 PKT}. {1018119600 21600 1 PKST}. {1033840800 18000 0 PKT}. {1212260400 21600 1 PKST}. {1225476000 18000 0 PKT}. {1239735600 21600 1 PKST}. {1257012000 18000 0 PKT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):169
              Entropy (8bit):4.920527043039276
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8s4YkdVAIgNrMvN2WFKu3e2WFKjvn:SlSWB9IZaM3yMGdVAIgWvN2wKulwKjvn
              MD5:9A66108527388564A9FBDB87D586105F
              SHA1:945E043A3CC45A4654C2D745A48E1D15F80A3CB5
              SHA-256:E2965AF4328FB065A82E8A21FF342C29A5942C2EDD304CE1C9087A23A91B65E1
              SHA-512:C3985D972AFB27E194CBE117E6CF8C45AA5A1B6504133FF85D52E8024387133D11F9EE7238FF87DC1D96F140B9467E6DB3F99B0B98299E6782A643288ABD3308
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Urumqi)]} {. LoadTimeZoneFile Asia/Urumqi.}.set TZData(:Asia/Kashgar) $TZData(:Asia/Urumqi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.8475287330512495
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKXIi7mFSXGm2OHF+VT5vUQKwMTXvv6QzFrRk8P4VvWVQC:SlSWB9X52wKYgyJm2OH0T5RNMzvSQhR5
              MD5:FEFB0E2021110BC9175AC505536BDE12
              SHA1:8366110D91C7EA929DB300871DDC70808D458F90
              SHA-256:C4E46CE4385C676F5D7AC4B123C42F153F7B3F3E9F434698E8D56E1907A9B7C9
              SHA-512:F8F9EE0B8648154B3E3BEF192C58F2415475422BED139F20FD3D3EF253E8137CBB39AB769704AB1F20EE03B398402BC5B4A3E55BE284D1785F347B951FECEF62
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kathmandu) {. {-9223372036854775808 20476 0 LMT}. {-1577943676 19800 0 +0530}. {504901800 20700 0 +0545}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.786408960928606
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8yIi7VyVAIgN1AIilHt2WFKSiZ1/2WFKXIi7v:SlSWB9IZaM3y7gVyVAIg5M2wKSg1/2wm
              MD5:A30FEA461B22B2CB3A67A616E3AE08FD
              SHA1:F368B215E15F6F518AEBC92289EE703DCAE849A1
              SHA-256:1E2A1569FE432CDA75C64FA55E24CA6F938C1C72C15FBB280D5B04F6C5E9AD69
              SHA-512:4F3D0681791C23EF19AFF239D2932D2CE1C991406F6DC8E313C083B5E03D806D26337ED2477700596D9A9F4FB1B7FC4A551F897A2A88CB7253CC7F863E586F03
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Kathmandu)]} {. LoadTimeZoneFile Asia/Kathmandu.}.set TZData(:Asia/Katmandu) $TZData(:Asia/Kathmandu).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2046
              Entropy (8bit):3.6162520408317844
              Encrypted:false
              SSDEEP:24:cQNobe1I6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikiA/:5NoV9InX4n7m84nPIzOtVEChbmAPD6
              MD5:0AB1CB51373021D2929AD3BB6A6A7B36
              SHA1:6A58A13DE2479D7C07DA574A2850DB5479F42106
              SHA-256:7C282AFCBC654495AD174C5679C0FDA9C65DED557389648F924E809E337DF6A5
              SHA-512:E865073DF7273319ADE90C0520D843C636679ACFF1FEEC4C62B85AB7458393A71EAAE32F507D90863BE4018212B497E41EFC7EA684DF821A0D4FF1A9895FDCD8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Khandyga) {. {-9223372036854775808 32533 0 LMT}. {-1579424533 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):324
              Entropy (8bit):4.554598325373998
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKvCm2OHEX3gYLXdUvvVQLpUFGZjSVVFJGTNsR/tckVVFJGTL/FG/+d:MBp523CmdHNYjWXVQtUEZjAJGJs55vJg
              MD5:FABB53074E1D767952C664BBA02E8975
              SHA1:36D2D438FEEBF585D7A0B546647C08B63A582EA1
              SHA-256:DAB02F68D5EEA0DAC6A2BBB7D12930E1B4DA62EBAEC7DE35C0AA55F72CCFF139
              SHA-512:E178779CE31F8D16DFEC5F71F228BCB05FDA1939B1BCE204C40B14904682283BDC99F27B662E3995EEEE607D0E8C70BE3CE3DF6EAD355399566CF360D5EC9E70
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kolkata) {. {-9223372036854775808 21208 0 LMT}. {-3645237208 21200 0 HMT}. {-3155694800 19270 0 MMT}. {-2019705670 19800 0 IST}. {-891581400 23400 1 +0630}. {-872058600 19800 0 IST}. {-862637400 23400 1 +0630}. {-764145000 19800 0 IST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1991
              Entropy (8bit):3.6170298534050245
              Encrypted:false
              SSDEEP:48:5Mi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9sC/:hjFRRCfQucXsNN0On
              MD5:83333A0E3E9810621A8BADA29B04F256
              SHA1:CDC375C93E7F3019562DE7CE1D9EE2776FE7FE9E
              SHA-256:00A9E8DDDC4314F7271F7490001ABD29B6F5EAEB9080645911FF5DA8BD7F671C
              SHA-512:08913E002C7D3D54F0E09029C70A0F2D18636F6F52B12F10593BECF732F40E180780D4C6127E0A3B321EAF54AF660A48E8C3E29A161B6ED6E0E46C06BBD309D6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Krasnoyarsk) {. {-9223372036854775808 22286 0 LMT}. {-1577513486 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {7804332
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):362
              Entropy (8bit):4.404454529095857
              Encrypted:false
              SSDEEP:6:SlSWB9X52wK1NLm2OHrPmdXiWOb/MVSYv/1MesF5X8dSMd0dMVSSm8kvScCvCIMY:MBp52PLmdHrPdDTMF/wFZMxcHClMxi
              MD5:B5FC8D431304F5C1ADF7D0B237DA5A52
              SHA1:79FC3057CD88E4DF71421AD52C34E0127FBD6FDA
              SHA-256:138912D754FBA8A1306063CCE897218972A4B0976EDDEC5C8E69A7965B0CD198
              SHA-512:27DC64B43958814E1A935D817CCFE7ADE8E6E6A778E27E391683FC491764EB77774A3D4A871C4E83BBA43FF8BA2383CBB8CC2D4F1FEB1AE063735C95651865E9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kuala_Lumpur) {. {-9223372036854775808 24406 0 LMT}. {-2177477206 24925 0 SMT}. {-2038200925 25200 0 +07}. {-1167634800 26400 1 +0720}. {-1073028000 26400 0 +0720}. {-894180000 27000 0 +0730}. {-879665400 32400 0 +09}. {-767005200 27000 0 +0730}. {378664200 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):646
              Entropy (8bit):3.99554344665026
              Encrypted:false
              SSDEEP:12:MBp52HLKmdHXXUBMxoWFMcDBMxkT9r5N2Xhf7JSX3lzHC3:cQHLKeHUzaMcDBkkN5N2XV7Ja3hi3
              MD5:2F27D1377C9EBBACDC260A50C195BDBB
              SHA1:397B8714F2C909A8EB88A7A1F4A1AEA0A5B8E80E
              SHA-256:519FDD455107270E6F8F3848C214D3D44CC1465B7B3E375318857D4A9093E1C0
              SHA-512:E4583E6C3FEB5ADAD41827D8ADCD7DA34CCB92D2B62B9D7C3D59F76719B9EE2FE44697CFD00943D9E2A4DBAEB929C97A1FF520FFF62EB6829C88D71EC8C51993
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kuching) {. {-9223372036854775808 26480 0 LMT}. {-1383463280 27000 0 +0730}. {-1167636600 28800 0 +08}. {-1082448000 30000 1 +08}. {-1074586800 28800 0 +08}. {-1050825600 30000 1 +08}. {-1042964400 28800 0 +08}. {-1019289600 30000 1 +08}. {-1011428400 28800 0 +08}. {-987753600 30000 1 +08}. {-979892400 28800 0 +08}. {-956217600 30000 1 +08}. {-948356400 28800 0 +08}. {-924595200 30000 1 +08}. {-916734000 28800 0 +08}. {-893059200 30000 1 +08}. {-885198000 28800 0 +08}. {-879667200 32400 0 +09}. {-767005200 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):168
              Entropy (8bit):4.82804794783422
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8t1zVAIgNsM1E2WFKdQWFK81S:SlSWB9IZaM3yN1zVAIgaM1E2wKdQwK8c
              MD5:6D6109F6EC1E12881C60EC44AAEB772B
              SHA1:B5531BEAC1C07DA57A901D0A48F4E1AC03F07467
              SHA-256:67BB9F159C752C744AC6AB26BBC0688CF4FA94C58C23B2B49B871CAA8774FC5D
              SHA-512:B0624B9F936E5C1392B7EBB3190D7E97EAE96647AB965BB9BE045D2C3082B1C7E48FF89A7B57FD3475D018574E7294D45B068C555A43AAEDFD65AC5C5C5D0A5B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Riyadh)]} {. LoadTimeZoneFile Asia/Riyadh.}.set TZData(:Asia/Kuwait) $TZData(:Asia/Riyadh).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):164
              Entropy (8bit):4.729350272507574
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8PpVAIgNz5YF2WFKf+WFKjn:SlSWB9IZaM3yxVAIgLYF2wKGwKjn
              MD5:DB6155900D4556EE7B3089860AD5C4E3
              SHA1:708E4AE427C8BAF589509F4330C389EE55C1D514
              SHA-256:8264648CF1EA3E352E13482DE2ACE70B97FD37FBB1F28F70011561CFCBF533EA
              SHA-512:941D52208FABB634BABCD602CD468F2235199813F4C1C5AB82A453E8C4CE4543C1CE3CBDB9D035DB039CFFDBC94D5D0F9D29363442E2458426BDD52ECDF7C3C5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Macau)]} {. LoadTimeZoneFile Asia/Macau.}.set TZData(:Asia/Macao) $TZData(:Asia/Macau).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2141
              Entropy (8bit):3.8815104664173843
              Encrypted:false
              SSDEEP:48:5o89px1D/MG/B/j/gf/d/iM/MW/C/2/Y/yf/9/y/l/v1EG/vFw/veE/K/Z/D/U/h:/p7DD5L2lRkWqOA6fVKdXqGXFwXeECRK
              MD5:DC20959BDB02CF86A33CE2C82D4D9853
              SHA1:90FC1820FA0E3B1C4BD2158185F95DCD1AA271D6
              SHA-256:6263F011537DB5CAF6B09F16D55DADE527A475AEE04F1BA38A75D13E9D125355
              SHA-512:8C6D0FA9584595B93A563D60387520CE9B28595C2C3880004275BAE66313A7606379646D27FB5EB91EC8D96D3B23959E2F9E3ABC97C203FD76E1DCC5ABB64374
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Macau) {. {-9223372036854775808 27250 0 LMT}. {-2056692850 28800 0 CST}. {-884509200 32400 0 +09}. {-873280800 36000 1 +09}. {-855918000 32400 0 +09}. {-841744800 36000 1 +09}. {-828529200 32400 0 +10}. {-765363600 28800 0 CT}. {-747046800 32400 1 CDT}. {-733827600 28800 0 CST}. {-716461200 32400 1 CDT}. {-697021200 28800 0 CST}. {-683715600 32400 1 CDT}. {-667990800 28800 0 CST}. {-654771600 32400 1 CDT}. {-636627600 28800 0 CST}. {-623322000 32400 1 CDT}. {-605178000 28800 0 CST}. {-591872400 32400 1 CDT}. {-573642000 28800 0 CST}. {-559818000 32400 1 CDT}. {-541674000 28800 0 CST}. {-528368400 32400 1 CDT}. {-510224400 28800 0 CST}. {-498128400 32400 1 CDT}. {-478774800 28800 0 CST}. {-466678800 32400 1 CDT}. {-446720400 28800 0 CST}. {-435229200 32400 1 CDT}. {-415258200 28800 0 CST}. {-403158600 32400 1 CDT}. {-383808600 2880
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2016
              Entropy (8bit):3.6746770806664517
              Encrypted:false
              SSDEEP:24:cQmecGdvBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNkna:5tvBHwRw/P2rFGAlODU9PZUEWQgmka
              MD5:18E80309362762B7757629B51F28AF99
              SHA1:502C70F24251BC062785A9349E6204CB719BF932
              SHA-256:6493D629E3CD4DB555A547F942BCCB4FFC7BBF7298FFBF9503F6DE3177ADBAC9
              SHA-512:C477E0DCF4E78E57E075FB5CAA45E70D4864EDFC40EAC2DD43D80F71408836E5BD468B15EB34B95020F2DB6CE531D67F076EF8EED4833ADEC1F6D37B2200CC84
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Magadan) {. {-9223372036854775808 36192 0 LMT}. {-1441188192 36000 0 +10}. {-1247565600 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):234
              Entropy (8bit):4.682322181661182
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKCm2OHUVRYQTLQTvUfkc3gEkNHkH8vScCxWv:MBp526mdHsrTD8cQJl7HCMv
              MD5:87D843314195847B6E4117119A1F701C
              SHA1:E51DC3A0BF20B09D8745AC682B4869A031A0A515
              SHA-256:22046165D40C8A553FE22A28E127514DF469E79581E0746101816A973456029D
              SHA-512:D241803442876A59170C1A90ACC66DEAF169CBF9B8CD7DE964BEF02D222B1D07511E241D441C3DA6AE7A7D1AAC1F4EDB5A21655C2923A3807BBFA8630071BCE9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Makassar) {. {-9223372036854775808 28656 0 LMT}. {-1577951856 28656 0 MMT}. {-1172908656 28800 0 +08}. {-880272000 32400 0 +09}. {-766054800 28800 0 WITA}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):406
              Entropy (8bit):4.4205762929520755
              Encrypted:false
              SSDEEP:12:MBp52G4JmdHnzZBPE6JwucQzX4rjJbmJtKn:cQG4Je11RbXzXqQ+
              MD5:3A833BF91AFE7FABBA98D11F29D84EAA
              SHA1:1622BEF54A12DE163B77309A0B7AF1C38AA6324B
              SHA-256:665E07B7A01E8A9D04B76B74B2EA0D11BDFC0BE6CA855DFDDBB5F9A6C9A97E90
              SHA-512:DFABB558CE2A8B96A976DD3B45B78CECE3633D51EE67F24E5AD59C7CF388538C5560EC133C60C3F0AFE8C68D88B1C05A12608A0408ACECBEEC38A84E3DC972FC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Manila) {. {-9223372036854775808 -57360 0 LMT}. {-3944621040 29040 0 LMT}. {-2229321840 28800 0 PST}. {-1046678400 32400 1 PDT}. {-1038733200 28800 0 PST}. {-873273600 32400 0 JST}. {-794221200 28800 0 PST}. {-496224000 32400 1 PDT}. {-489315600 28800 0 PST}. {259344000 32400 1 PDT}. {275151600 28800 0 PST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):165
              Entropy (8bit):4.754394427749078
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8DhVAIgN6Sn62WFKvE+H+WFKQo:SlSWB9IZaM3yjhVAIgMS62wKLewKQo
              MD5:5D8EBBC297A2258C352BC80535B7F7F1
              SHA1:684CAF480AF5B8A98D9AD1A1ECD4E07434F36875
              SHA-256:4709F2DA036EB96FB7B6CC40859BF59F1146FE8D3A7AFE326FBA3B8CB68049CE
              SHA-512:FD67E920D3D5FE69AF35535A8BBD2791204C6B63050EFECC0857F24D393712C4BC4660EA0A350D2A4DDA144073413BE013D71D73E6F3638CA30480541F9731FA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Dubai)]} {. LoadTimeZoneFile Asia/Dubai.}.set TZData(:Asia/Muscat) $TZData(:Asia/Dubai).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7368
              Entropy (8bit):3.620699686510499
              Encrypted:false
              SSDEEP:96:EPByq7VKviW/naKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEA:EPFi//uh2kNU4tB715pyzHy1gA
              MD5:21EEEC6314C94D1476C2E79BBACFEB77
              SHA1:2C9805CD01C84D446CBDB90B9542CB24CCDE4E39
              SHA-256:7AAB1AC67D96287EE468608506868707B28FCD27A8F53128621801DCF0122162
              SHA-512:D4B0A0E60B102E10E03CF5BD07C5783E908D5E7079B646177C57C30D67B44C114EFF4DCFC71AF8441D67BD5A351068FBFFD8C5E08F06F1D69946B3EA7D49FC2D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Nicosia) {. {-9223372036854775808 8008 0 LMT}. {-1518920008 7200 0 EET}. {166572000 10800 1 EEST}. {182293200 7200 0 EET}. {200959200 10800 1 EEST}. {213829200 7200 0 EET}. {228866400 10800 1 EEST}. {243982800 7200 0 EET}. {260316000 10800 1 EEST}. {276123600 7200 0 EET}. {291765600 10800 1 EEST}. {307486800 7200 0 EET}. {323820000 10800 1 EEST}. {338936400 7200 0 EET}. {354664800 10800 1 EEST}. {370386000 7200 0 EET}. {386114400 10800 1 EEST}. {401835600 7200 0 EET}. {417564000 10800 1 EEST}. {433285200 7200 0 EET}. {449013600 10800 1 EEST}. {465339600 7200 0 EET}. {481068000 10800 1 EEST}. {496789200 7200 0 EET}. {512517600 10800 1 EEST}. {528238800 7200 0 EET}. {543967200 10800 1 EEST}. {559688400 7200 0 EET}. {575416800 10800 1 EEST}. {591138000 7200 0 EET}. {606866400 10800 1 EEST}. {622587600 7200 0 EET}. {638316000 10800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1992
              Entropy (8bit):3.626746433557725
              Encrypted:false
              SSDEEP:48:5qi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9sCP:bjFRRCfQucXsNN0OX
              MD5:11B80F2A9B7B090DD146BD97E9DB7D43
              SHA1:4A2886799A50D031D79C935261B50363AA27768A
              SHA-256:4018CE273BC4D02057F66A4715626F0E4D8C7050391C00BB5AE054B4DA8DE2F8
              SHA-512:1F1650C1DBC3A171FF30C7657D7F99963A0C8D63B85460B45DE75AFABECE28F2A51236FB71DFF3EE567CC58E71B88623E4880DEBD18E9E9C9E527CF97D5FE926
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Novokuznetsk) {. {-9223372036854775808 20928 0 LMT}. {-1441259328 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2048
              Entropy (8bit):3.623418616375595
              Encrypted:false
              SSDEEP:48:5HNi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7F/zTXUVtrBju6waUwcTLTTWF:6jFRRCfQuozB7TQt
              MD5:46E5FB7DEB8041BC9A2ADC83728944A7
              SHA1:B5826E206EAA3E8789A0F9E4B7511CEBFD1B6764
              SHA-256:C241F732B9731FA141B03FF1F990556C9BF14A1B21C9757C7FF75E688908B8A0
              SHA-512:42B6BEEE9C15CB59C010013FE0673CB0DF46CD0AC388DF7D57DCCD54482C950F2935F8A8D7DC68CFFD184B698283589134901C9C597970D95C5B608CD160AF70
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Novosibirsk) {. {-9223372036854775808 19900 0 LMT}. {-1579476700 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {738090000 25200 0 +07}. {748987200 21600 0 +06}. {7647120
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1984
              Entropy (8bit):3.5988580260925795
              Encrypted:false
              SSDEEP:48:5aQyvONnwqeDinDL+8kSViqS6A+VzTXUVtrBju6waUwcTLTTW59OxJCT:IkHdiq5BzB7TQJ
              MD5:54E1F8C11C9CF4BF1DBCABF4AF31B7D4
              SHA1:3C428E50A02941B19AF2A2F1EA02763AA2C1A846
              SHA-256:5B9E95C813A184C969CC9808E136AD66C1231A55E66D4EE817BD2E85751C4EE9
              SHA-512:83DBFCC089AC902609FFFCA8E675430B9BF1EA452626E83173F83317884B6AC2620CE8AA96488ACF13445D9D1D4776EB908232BD8205B8F4F9B034A68864C9A9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Omsk) {. {-9223372036854775808 17610 0 LMT}. {-1582088010 18000 0 +05}. {-1247547600 21600 0 +07}. {354909600 25200 1 +07}. {370717200 21600 0 +06}. {386445600 25200 1 +07}. {402253200 21600 0 +06}. {417981600 25200 1 +07}. {433789200 21600 0 +06}. {449604000 25200 1 +07}. {465336000 21600 0 +06}. {481060800 25200 1 +07}. {496785600 21600 0 +06}. {512510400 25200 1 +07}. {528235200 21600 0 +06}. {543960000 25200 1 +07}. {559684800 21600 0 +06}. {575409600 25200 1 +07}. {591134400 21600 0 +06}. {606859200 25200 1 +07}. {622584000 21600 0 +06}. {638308800 25200 1 +07}. {654638400 21600 0 +06}. {670363200 18000 0 +06}. {670366800 21600 1 +06}. {686091600 18000 0 +05}. {695768400 21600 0 +07}. {701812800 25200 1 +07}. {717537600 21600 0 +06}. {733262400 25200 1 +07}. {748987200 21600 0 +06}. {764712000 25200 1 +07}. {780436800 2160
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1606
              Entropy (8bit):3.6164715895962876
              Encrypted:false
              SSDEEP:24:cQ3eHykSYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDSVbt8i9E603CRWeZunSbOi:5FkXlkhs7bqIwIoMpqDPiBRBlL
              MD5:38914E248C13912E33187496C5AD9691
              SHA1:94C3711FC5EED22FE1929F2250208AC53DB175AC
              SHA-256:581AF958787971BE487B37C2D2534E58FFA085AFD0D9F0E12E0EEFF03F476E53
              SHA-512:8C7F21C8FCE2614181A998774E7038BAC483E502C3C31EDB0F4954E1424A0C16AD7DC5003E9533BB47CA2C06DD027E989BD696B2A74A23F686F74B8C9650BAE6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Oral) {. {-9223372036854775808 12324 0 LMT}. {-1441164324 10800 0 +03}. {-1247540400 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {701816400 14400 0 +04}. {701820000 18000 1 +04}. {717544800 14400 0 +04}. {733269600 18000 1 +04}. {748994400 14400 0 +04}. {764719200 1800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.911861786274714
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8VLYO5YFwVAIgN8ELYOAvN2WFKeHKLNM0WFKELYOun:SlSWB9IZaM3y1LewVAIgKELUvN2wKTNp
              MD5:754059D3B44B7D60FB3BBFC97782C6CF
              SHA1:6AE931805E6A42836D65E4EBC76A58BBFB3DCAF4
              SHA-256:2C2DBD952FDA5CC042073B538C240B11C5C8E614DD4A697E1AA4C80E458575D0
              SHA-512:B5AA4B51699EEAE0D9F91BBAB5B682BD84537C4E2CCE282613E1FFA1DDBE562CA487FB2F8CD006EE9DBC9EFAEFA587EC9998F0364E5C932CDB42C14319328D46
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Bangkok)]} {. LoadTimeZoneFile Asia/Bangkok.}.set TZData(:Asia/Phnom_Penh) $TZData(:Asia/Bangkok).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.428640713376822
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKT5wFJm2OHUed9xMkc5k/MVSSmCLkvScCAdMVSSo1CkDF4mMVSSmT+:MBp52L5wFJmdHFxbc5kMxvLkHCQMxoRg
              MD5:81C643629BB417E38A5514BBEFEF55C8
              SHA1:7D91E7F00A1A0B795EF3FDD1B3DD052EA2F6122C
              SHA-256:998DFACE4BEE8A925E88D779D6C9FB9F9010BDB68010A9CCBC0B97BB5C49D452
              SHA-512:1291521B74984EC03557C4DC492DB4DD1312626F61612C1F143BA482E2C32CD331647D86507D3B3721D148B2ED3CED6678123BD801DAA6B4F2D9A0C07B90575F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Pontianak) {. {-9223372036854775808 26240 0 LMT}. {-1946186240 26240 0 PMT}. {-1172906240 27000 0 +0730}. {-881220600 32400 0 +09}. {-766054800 27000 0 +0730}. {-683883000 28800 0 +08}. {-620812800 27000 0 +0730}. {-189415800 28800 0 WITA}. {567964800 25200 0 WIB}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):263
              Entropy (8bit):4.653238218910832
              Encrypted:false
              SSDEEP:6:SlSWB9X52wK8cE4Lm2OHnNdRw8vm1T0vGLucjv7:MBp520cEWmdHnNLvjuD
              MD5:96754BB7D98975118E86B539D8F917B4
              SHA1:5D366D64E08F1E9869EA2E93B5C6C5C0C5E7E3BE
              SHA-256:10432381A63B2101A1218D357DA2075885F061F3A60BE00A32EED4DF868E5566
              SHA-512:58BFFF63D40CF899304D69468949B806F00F5F2F2BE47040D5704E8C463D7B502725846933749172AF94CCD0AA894E30AD3154CC953D917AC8040B00D331124E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Pyongyang) {. {-9223372036854775808 30180 0 LMT}. {-1948782180 30600 0 KST}. {-1830414600 32400 0 JST}. {-768646800 32400 0 KST}. {1439564400 30600 0 KST}. {1525446000 32400 0 KST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):169
              Entropy (8bit):4.800949065138005
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKK3vFSXGm2OHPFV4YvUQKb3VvVsRYvFF5FRVGsWYAvn:SlSWB9X52wKK3vTm2OHoYRcvSQFF5FR4
              MD5:E70F65EBF35BE045F43456A67DEBCD34
              SHA1:EE5669823D60518D0AAB07A7C539B8089807D589
              SHA-256:B8E3F98A20BE938B9B1A6CE1CE4218751393B33E933A8F9278AA3EEECB13D2C6
              SHA-512:9B142D27C92C2478ED086668F8E3DC4BD8E9FDA712D8888469816B4795B5DFDD7F5F22D7BA6A31CA4E32483ABE5A5B4C7CEFC91856B09DDF651E58867FC932C9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Qatar) {. {-9223372036854775808 12368 0 LMT}. {-1577935568 14400 0 +04}. {76190400 10800 0 +03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1583
              Entropy (8bit):3.64822959139346
              Encrypted:false
              SSDEEP:48:5UXlkhs7bqIwIoMpqDS7oXbPw+bBijbbyzIr1jA:ICOgZbWM
              MD5:E79902C294AEFC5A3A3DCFFF4142E54F
              SHA1:8F9E8413C8F2D1DCF7DB74BE3AF067CBFEF2E73C
              SHA-256:4A254C094E4F5955E33C19E01EF2B8D5B70AC0AD08203FD105F475C8F862F28C
              SHA-512:3283248979FC76BE94D705013728FF206A32B8820D475C4DFC0636D2329E8FA5D251EAE5A21D9A9DC30659A6B567E73A7C614D7DA3F60025BFEA617ACE2EE597
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Qyzylorda) {. {-9223372036854775808 15712 0 LMT}. {-1441167712 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {701812800 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):169
              Entropy (8bit):4.761776859195572
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8nvwFVAIgNnEYO62WFK02KQMFfh4WFKsv:SlSWB9IZaM3yHvwFVAIgZ2wK0GEJ4wKO
              MD5:6135C39675BB0F7BB94756F2057382CF
              SHA1:EB2C51837E721776BED5F3F1F4A014BA29DA0282
              SHA-256:E573ADFBB9935B7D0B56FAE699160226BF3416C50EB63D8EFEB1748C4B13BF91
              SHA-512:BC1E7C9F1F64FF7D6A50E70E62566F385A923A475E309A321FCC03964350E427A4AEE801A20B3293A289AD67E03C86B59A674F91F34238068DA6C35BBB3B4307
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Yangon)]} {. LoadTimeZoneFile Asia/Yangon.}.set TZData(:Asia/Rangoon) $TZData(:Asia/Yangon).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):142
              Entropy (8bit):4.928343799484186
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFK814tXGm2OHFukevSUi9VssWYAvn:SlSWB9X52wK81Hm2OHF7ePi9V1WYAv
              MD5:76E7F746F8663772A350A2E2C2F680C7
              SHA1:698E3C80122AC7B9E6EF7A45F87898334A1A622E
              SHA-256:7D2FAC4F33EE0FA667AF8A2BF8257638A37CE0308038AC02C7B5BE6E1D1E5EDD
              SHA-512:9B1C326D3B7C89957176540AB4F856780C57C495A44F80D998A4B0C5A10F358C2F727BF160FB49D17C104B4A8EB15AC5431CCB886AC59A92E56C964D757FA3B0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Riyadh) {. {-9223372036854775808 11212 0 LMT}. {-719636812 10800 0 +03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.899371908380106
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8I65eVyVAIgN2h659Q2WFKwJ6h4WFK365ev:SlSWB9IZaM3yJAVyVAIgA4s2wKl4wKKK
              MD5:A978C9AD6320DA94CB15324CA82C7417
              SHA1:585C232F3FB2693C78C7831C1AF1DC25D6824CA7
              SHA-256:73E1850BB0827043024EAFA1934190413CB36EA6FE18C90EA86B9DBC1D61EEBF
              SHA-512:AE48BFB2A348CA992F2BCD6B1AF7495713B0526C326678309133D3271D90600624C096B4B8678AD7ECD19822E3BB24E27D12680FCA7FAA455D3CE324CE0B88ED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ho_Chi_Minh)]} {. LoadTimeZoneFile Asia/Ho_Chi_Minh.}.set TZData(:Asia/Saigon) $TZData(:Asia/Ho_Chi_Minh).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2044
              Entropy (8bit):3.636696819312369
              Encrypted:false
              SSDEEP:48:5i1fvBHwRw/P2rFGAlODU9HOUDEChbmAP+:gDtP2rUfDEZDV1ZP+
              MD5:265EF8FD8FB07585726D3054289A1C48
              SHA1:DDFB1197C7A7455674AA085A6B8089124EB47689
              SHA-256:4CCF3795EF0EF42AA09A9225370E8E1537B53A0231363077DAC385F397208669
              SHA-512:1ACE8C173E87530FCC809814DEA779CB09ED8A277DB3B0519E57727AD3A93F3AFAFAF0F80419A8B6A8FAC1B30600716169BEAE397E34E6BE1A18D0E31DB69B3F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Sakhalin) {. {-9223372036854775808 34248 0 LMT}. {-2031039048 32400 0 +09}. {-768560400 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):848
              Entropy (8bit):3.8621003155318263
              Encrypted:false
              SSDEEP:24:cQtleA7NSYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo6SSYL:5hXlkhs7bqIwIoMpqDS7oXjSpL
              MD5:6E54D9946AC13DD77FDB8EA9C4FBD989
              SHA1:EF0A4BFD84EC369CB9581D830F20193D73187C0B
              SHA-256:28A76A0EAF55EEC9FE7BEFF3785FDEF8C3D93AAAA2E15EE37D861E73418AC9E4
              SHA-512:15522A5B85DCD54DC0143A38799A870268D74C8A26FED44D50A55C536D3738905597AE4F3F2AB767DE73A7EDBAE8FBF467A6014E2001FA03924C3F39E0361F27
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Samarkand) {. {-9223372036854775808 16073 0 LMT}. {-1441168073 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {694206000 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):719
              Entropy (8bit):4.129493275264732
              Encrypted:false
              SSDEEP:12:MBp525mdHjauvWz4aqceOcrIt04CaI8/HUYVfXzQD:cQ5edvWzJnJGIt047I8/Hp/zQD
              MD5:7F24687F220D3B7F3C08A1F09F86BAEF
              SHA1:2D96019AE5137935F7A43FCFD229645D656E21AF
              SHA-256:8DBBFEEDD583DBE60E88E381D511B72DDD7AE93FEB64A2F97D6CDBF6B92A0775
              SHA-512:BFD955BA4A284D91542D15CAE849C162D1470167D65365FF93B117D7B4361DB314ABEF5448CF5BA382002726D472FA74C3B9DD5B43CD539395FDC8241E4A0248
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Seoul) {. {-9223372036854775808 30472 0 LMT}. {-1948782472 30600 0 KST}. {-1830414600 32400 0 JST}. {-767350800 32400 0 KST}. {-498128400 30600 0 KST}. {-462702600 34200 1 KDT}. {-451733400 30600 0 KST}. {-429784200 34200 1 KDT}. {-418296600 30600 0 KST}. {-399544200 34200 1 KDT}. {-387451800 30600 0 KST}. {-368094600 34200 1 KDT}. {-356002200 30600 0 KST}. {-336645000 34200 1 KDT}. {-324552600 30600 0 KST}. {-305195400 34200 1 KDT}. {-293103000 30600 0 KST}. {-264933000 32400 0 KST}. {547578000 36000 1 KDT}. {560883600 32400 0 KST}. {579027600 36000 1 KDT}. {592333200 32400 0 KST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):887
              Entropy (8bit):4.102844989906348
              Encrypted:false
              SSDEEP:24:cQ8emvZMwq/Zkq/fYFq/J2Lzq/9mBq/Qq/LPq/Rq/HTq/Pjq/rzq/c2q/uq/4u:5YvZMT/d/fYc/JWG/M4/z/W/o/G/PW/f
              MD5:D3D88F264E5E44BAA890C19A4C87A24D
              SHA1:BA2E3F8D69D1092CE925D40FE31BEABA0DC22905
              SHA-256:90B585115252C37625B6BCDE14708AAE003E2D6F3408D8A9034ABB6FFFD66490
              SHA-512:14485EEC4C77DA6D7DD813A84F3F5B0DE17AE06C23FBCDB20727376C62D675ED675893B8B9A4DAAA00C21B7550F83593780CA538DB05B4ADDD4604FBCD3B0E51
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Shanghai) {. {-9223372036854775808 29143 0 LMT}. {-2177481943 28800 0 CST}. {-933667200 32400 1 CDT}. {-922093200 28800 0 CST}. {-908870400 32400 1 CDT}. {-888829200 28800 0 CST}. {-881049600 32400 1 CDT}. {-767869200 28800 0 CST}. {-745833600 32400 1 CDT}. {-733827600 28800 0 CST}. {-716889600 32400 1 CDT}. {-699613200 28800 0 CST}. {-683884800 32400 1 CDT}. {-670669200 28800 0 CST}. {-652348800 32400 1 CDT}. {-650016000 28800 0 CST}. {515527200 32400 1 CDT}. {527014800 28800 0 CST}. {545162400 32400 1 CDT}. {558464400 28800 0 CST}. {577216800 32400 1 CDT}. {589914000 28800 0 CST}. {608666400 32400 1 CDT}. {621968400 28800 0 CST}. {640116000 32400 1 CDT}. {653418000 28800 0 CST}. {671565600 32400 1 CDT}. {684867600 28800 0 CST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):359
              Entropy (8bit):4.370799489849578
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKfbdJm2OHxdPmIWOb/MVSYv/1MesF5X8dSMd0dMVSSm8kvScCvCIMY:MBp52nbdJmdHDPxDTMF/wFZMxcHClMxi
              MD5:DFABB80419B69BE34B2FCD475CFDFE22
              SHA1:2CF4F330E00397020328BCE28449B9F63E17067D
              SHA-256:B251FBDB0DB4ACBB3855063C32681A5F32E609FA3AA0DDC43225D056D07CB2D3
              SHA-512:EB362B7D0C5A4F1C605A8F2533A5CCAFCFA1F4D3B0F48C417CEA8C492834FE36822A75C726659786CBD4D5A544376D806E6BA8E952607997FBDDAF84E343B353
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Singapore) {. {-9223372036854775808 24925 0 LMT}. {-2177477725 24925 0 SMT}. {-2038200925 25200 0 +07}. {-1167634800 26400 1 +0720}. {-1073028000 26400 0 +0720}. {-894180000 27000 0 +0730}. {-879665400 32400 0 +09}. {-767005200 27000 0 +0730}. {378664200 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1993
              Entropy (8bit):3.7026922613316886
              Encrypted:false
              SSDEEP:24:cQHOedtdvBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNknK:5HxvBHwRw/P2rFGAlODU9PZUEWQgmkK
              MD5:0F445767A84A429787070F7CCFB4D35B
              SHA1:B524665DAC57E53A6D9A5386B5AEAAE52BD405A5
              SHA-256:07F4857391E114D4B958C02B8FF72BEBCED72AA730F4F4B09F68F57349473503
              SHA-512:8FE2AC4C1DCA60E597633377EF1F1C38EE027B7893DB77BA912F294B9B791B6762E62E87DAC17171B15629DD45BD7960D25ADAE96827DAB63FAA80E0956A8C80
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Srednekolymsk) {. {-9223372036854775808 36892 0 LMT}. {-1441188892 36000 0 +10}. {-1247565600 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {78041
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1298
              Entropy (8bit):3.983254382416919
              Encrypted:false
              SSDEEP:24:cQXbe9Z+zuzq/9mBq/Qq/LPq/wO3q/uq/PC9q/hq/Rq/Gq/fq/Aq/Vtyq/fQH+zp:5XwoKG/M4/z/W/Ta/1/V/Y/o/d/y/D/t
              MD5:16CF8E32D5B2933CE5A0F2F90B8090BA
              SHA1:F899656FE3FDDD5F63B18D4800F909CD2DA6A151
              SHA-256:E098A0A94ED53EC471841CDF6995AEF1F3A2699EDC143FF5DBDA7CB0AFD3FD6C
              SHA-512:4856AC8AE2BB0C8856A87C5E46AD478E697AACB46B8679870FD581706802772D333FEA5D1D840BDDB1EAB3B4FDD46883CFD2EC4017F9E5C06CAF2A24539FA808
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Taipei) {. {-9223372036854775808 29160 0 LMT}. {-2335248360 28800 0 CST}. {-1017820800 32400 0 JST}. {-766224000 28800 0 CST}. {-745833600 32400 1 CDT}. {-733827600 28800 0 CST}. {-716889600 32400 1 CDT}. {-699613200 28800 0 CST}. {-683884800 32400 1 CDT}. {-670669200 28800 0 CST}. {-652348800 32400 1 CDT}. {-639133200 28800 0 CST}. {-620812800 32400 1 CDT}. {-607597200 28800 0 CST}. {-589276800 32400 1 CDT}. {-576061200 28800 0 CST}. {-562924800 32400 1 CDT}. {-541760400 28800 0 CST}. {-528710400 32400 1 CDT}. {-510224400 28800 0 CST}. {-497174400 32400 1 CDT}. {-478688400 28800 0 CST}. {-465638400 32400 1 CDT}. {-449830800 28800 0 CST}. {-434016000 32400 1 CDT}. {-418208400 28800 0 CST}. {-402480000 32400 1 CDT}. {-386672400 28800 0 CST}. {-370944000 32400 1 CDT}. {-355136400 28800 0 CST}. {-339408000 32400 1 CDT}. {-323600400 2
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):847
              Entropy (8bit):3.8433853520749905
              Encrypted:false
              SSDEEP:24:cQZeQlNRSsOXEFCMiq90DIgb5j6gMJR/4TJTXSATo6SSYL:5HpFqq9iTVrXjSpL
              MD5:24587E02A79D02973DE32E4CDACBE84C
              SHA1:41B8CA1CAE10A9340359317EC8DD16C8637C0F1A
              SHA-256:46C2D8E86BACFDB8280862AD9E28F7A0867740726EF21D08138C9F9A900CC1E9
              SHA-512:07C939DCD5AB0DA3D3667D0D56421C6B40598C6DAB9641664E0ABB2CE4CC4562B10853C88DB51FBA5D1ED733E86193E88CE8984130FFF83955BD9335A59CF031
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tashkent) {. {-9223372036854775808 16631 0 LMT}. {-1441168631 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {694206000 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1669
              Entropy (8bit):3.588597734517364
              Encrypted:false
              SSDEEP:24:cQyGeHLQqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyYU7s9UU7UT:5+YTVOZmF7N76eHj2QqzM
              MD5:EEA5CEEDA499381B331676CF2D3B1189
              SHA1:BC1D3871CC170F0BCBAE567C0D934CC131A7E410
              SHA-256:260F3F9A9209170AC02961E881F02AA6D6C720BAACC29756CF1CC730FACCF662
              SHA-512:0E8FF6B4EF0E102152B20D3C819F2673B6426B3D56DF42F89F44EB4467D0CA45F3D49B6564DA6FCB88BDB1887AF39382766F75FE3A3977CFB4408E06C6D1C062
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tbilisi) {. {-9223372036854775808 10751 0 LMT}. {-2840151551 10751 0 TBMT}. {-1441162751 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {694213200 10800 0 +03}. {701816400 14400 1 +03}. {717537600 10800 0 +03}. {733266000 14400 1 +03}. {748987200 10800 0 +03}. {764715600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7021
              Entropy (8bit):3.4346704245463338
              Encrypted:false
              SSDEEP:96:BboVQCKYJ4cRvxoIDCMcuzf8mmU6gjilpM1Bdy6XaqYx7u0kLBT8U2nTEA4n8t/s:exqcFOIDCMcMrPqpIB8f9ZkF0EIk
              MD5:E179D37382F44D866D495F5D38FD5D88
              SHA1:35C5BFFE89795786B7ED0BB3B7822666D6BFCB5B
              SHA-256:41F1DBB61094C00E2424E22780930258BC99A71D182E7A181065B0A1A57306F1
              SHA-512:AF1A4AB0BD690F038EBC3AA5CB2CAEE575E639B4504E3BEBC8E1DE85081C780744CBAD5871D62D4F028314D165B4D71E9B3D0B68019FE9D1E49D702101602431
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tehran) {. {-9223372036854775808 12344 0 LMT}. {-1704165944 12344 0 TMT}. {-757394744 12600 0 +0330}. {247177800 14400 0 +04}. {259272000 18000 1 +04}. {277758000 14400 0 +04}. {283982400 12600 0 +0330}. {290809800 16200 1 +0330}. {306531000 12600 0 +0330}. {322432200 16200 1 +0330}. {338499000 12600 0 +0330}. {673216200 16200 1 +0330}. {685481400 12600 0 +0330}. {701209800 16200 1 +0330}. {717103800 12600 0 +0330}. {732745800 16200 1 +0330}. {748639800 12600 0 +0330}. {764281800 16200 1 +0330}. {780175800 12600 0 +0330}. {795817800 16200 1 +0330}. {811711800 12600 0 +0330}. {827353800 16200 1 +0330}. {843247800 12600 0 +0330}. {858976200 16200 1 +0330}. {874870200 12600 0 +0330}. {890512200 16200 1 +0330}. {906406200 12600 0 +0330}. {922048200 16200 1 +0330}. {937942200 12600 0 +0330}. {953584200 16200 1 +0330}. {969478200 12600 0 +
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.82789113675599
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85zFFwVAIgN0AzFzt2WFK+TT52WFKYzFp:SlSWB9IZaM3yZbwVAIgCAb2wKsswKY7
              MD5:D044282CC9B9F531D8136612B4AA938D
              SHA1:5FD01E48BFFC2B54BBA48926EFD2137A91B57E0F
              SHA-256:FE57D86184A7F4A64F3555DE3F4463531A86BB18F124534F17B09FAB825F83B4
              SHA-512:DBBA54D68F33E51D51E816D79D83B61490BD31262DFF6037C0834BADA48CBC02F4281203D7212EDF6D96F7FF1EF3843299698BF0DFE10B5F1383AA504594505A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Jerusalem)]} {. LoadTimeZoneFile Asia/Jerusalem.}.set TZData(:Asia/Tel_Aviv) $TZData(:Asia/Jerusalem).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):171
              Entropy (8bit):4.858169634371472
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8kNZ4pVAIgNqFNzO62WFK9Z752WFKvNZvn:SlSWB9IZaM3ykZ4pVAIgc3K62wKf12wc
              MD5:B678D97B4E6E6112299746833C06C70B
              SHA1:A49BD45DB59BDD3B7BF9159699272389E8EF77AC
              SHA-256:6AEAE87CAD7FE358A5A1BABE6C0244A3F89403FC64C5AA19E1FFDEDCEB6CF57B
              SHA-512:BEA10EAE5941E027D8FE9E5D5C03FAE5DCFEF7603088E71CA7CCD0461851E175AE1CC7592DFBEC63F91D840E4E0AA04B54549EB71303666E6EA16AFFF6EDA058
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Thimphu)]} {. LoadTimeZoneFile Asia/Thimphu.}.set TZData(:Asia/Thimbu) $TZData(:Asia/Thimphu).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.838482422690701
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKvNZLXGm2OHEQUTFnvSVaJKuc/v6QzFtV9gmZVFSTL:SlSWB9X52wKVZCm2OHEfnjKuc/SQnV9y
              MD5:A52B235D91207E823482EEC1EE8C6433
              SHA1:84826EAC8043739256E34D828D6BE8E17172A8F8
              SHA-256:21CE1FAEDD45DED62E78D6DB24F47ED9DEC5642E4A4D7ADDF85B33F8AB82D8CA
              SHA-512:08E8C68BF6BE5E876A59130C207D4911732EBA0F4E72603213A0AD0CC5DA8EF6AC6389AF8A0781F01B0E72CA030C9A47C46CC0FB422F5C0104A7365D818A4EB9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Thimphu) {. {-9223372036854775808 21516 0 LMT}. {-706341516 19800 0 +0530}. {560025000 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):374
              Entropy (8bit):4.405484223376936
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKvm2OHOx5PvYvmoZsOXzvmof67zd6avmoFc87e+zvmT0TgvmL:MBp52XmdHOx5PAbZ3zbi7xtbFD7e+zou
              MD5:4549B66A26A96C10DB196B8957BB6127
              SHA1:B2B96699AE70CA47F2B180B9AEF8FB9864AE98A1
              SHA-256:EC533BBE242CE6A521BAED1D37E0DD0247A37FE8D36D25205520B93CF51E4595
              SHA-512:A6C147DF80BB6D41877AD99673C49FF6AD5C1C03B587D71A70C8F7BD8D321817D9E99BFAE11F7F7C27C1A7563C9A101B6C3E65D962B3524C95113A807720ED4E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tokyo) {. {-9223372036854775808 33539 0 LMT}. {-2587712400 32400 0 JST}. {-683802000 36000 1 JDT}. {-672310800 32400 0 JST}. {-654771600 36000 1 JDT}. {-640861200 32400 0 JST}. {-620298000 36000 1 JDT}. {-609411600 32400 0 JST}. {-588848400 36000 1 JDT}. {-577962000 32400 0 JST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2043
              Entropy (8bit):3.6031458640952554
              Encrypted:false
              SSDEEP:48:539i17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9se:ijFRRCfQucXsQk7TQy
              MD5:436E5AA70DD662E337E0144558EA277B
              SHA1:E268AAD83CE3CC32CB23647E961509EBB4C8AA2C
              SHA-256:9917B2A1BFAAD1378B90879C92F157BD7912A4072BE21A2A4CB366A38F310D3B
              SHA-512:C714CFBB58170E2291A78AD4F725613049BC9D52DB9F8685803E8F7E181D7E0C2AAF7E603D29243D2E5F4F1D8A3B0272559E7CBCB51736A8115A44E6D56FA7CC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tomsk) {. {-9223372036854775808 20391 0 LMT}. {-1578807591 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433200 252
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.8489855608543575
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8pYFwVAIgNzB0L2WFKPQOrFJ4WFKvn:SlSWB9IZaM3yWFwVAIg8L2wKPQOrFJ4H
              MD5:AF91CF42CFBA12F55AF3E6D26A71946D
              SHA1:673AC77D4E5B6ED7CE8AE67975372462F6AF870B
              SHA-256:D9BCAE393D4B9EE5F308FA0C26A7A6BCE716E77DB056E75A3B39B33A227760C8
              SHA-512:1FD61EA39FF08428486E07AF4404CEA67ACCCB600F11BA74B340A4F663EB8221BC7BF84AE677566F7DDEC0CB42F1946614CD11A9CD7824E0D6CAA804DF0EF514
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Makassar)]} {. LoadTimeZoneFile Asia/Makassar.}.set TZData(:Asia/Ujung_Pandang) $TZData(:Asia/Makassar).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1535
              Entropy (8bit):3.6833061173791726
              Encrypted:false
              SSDEEP:24:cQlTer9uN1xJSIA+SN16zSacGjSvtHpS9xZzS1ZjSnZS3owShjS+5MzSDZmSA/SN:569YXoIA9N0+acGuRIvc1Zun43oDhu+x
              MD5:9C497C3C57F4FEE50C6BF35D0A3A7E5F
              SHA1:FAFB3456CADE6AD6FFBADC699AB882FAE2591739
              SHA-256:19855D4B0EEF8CD85D502262DF7B7F15B069B1A4D169FAB0F20F803C598C1D83
              SHA-512:255CDF3333789771240A37CECBEB87EEAAE4561616A7066C935B67B8CA930F026F68A82315083190B175C54FBB4B2DB0126F25FDDD6C09DC374E09833225DFB8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ulaanbaatar) {. {-9223372036854775808 25652 0 LMT}. {-2032931252 25200 0 +07}. {252435600 28800 0 +08}. {417974400 32400 1 +08}. {433782000 28800 0 +08}. {449596800 32400 1 +08}. {465318000 28800 0 +08}. {481046400 32400 1 +08}. {496767600 28800 0 +08}. {512496000 32400 1 +08}. {528217200 28800 0 +08}. {543945600 32400 1 +08}. {559666800 28800 0 +08}. {575395200 32400 1 +08}. {591116400 28800 0 +08}. {606844800 32400 1 +08}. {622566000 28800 0 +08}. {638294400 32400 1 +08}. {654620400 28800 0 +08}. {670348800 32400 1 +08}. {686070000 28800 0 +08}. {701798400 32400 1 +08}. {717519600 28800 0 +08}. {733248000 32400 1 +08}. {748969200 28800 0 +08}. {764697600 32400 1 +08}. {780418800 28800 0 +08}. {796147200 32400 1 +08}. {811868400 28800 0 +08}. {828201600 32400 1 +08}. {843922800 28800 0 +08}. {859651200 32400 1 +08}. {875372400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.675919405724711
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8TcXHVAIgNrfcXKxL2WFKhrMEBQWFKucXu:SlSWB9IZaM3yIVAIg7xL2wKhrMEewKI
              MD5:73C6A7BC088A3CD92CAC2F8B019994A0
              SHA1:74D5DCE1100F6C97DFCFAD5EFC310196F03ABED5
              SHA-256:8F075ACF5FF86E5CDE63E178F7FCB692C209B6023C80157A2ABF6826AE63C6C3
              SHA-512:4EAD916D2251CF3A9B336448B467282C251EE5D98299334F365711CCA8CAF9CA83600503A3346AEC9DFA9E9AF064BA6DEF570BABCC48AE5EB954DBF574A769B2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ulaanbaatar)]} {. LoadTimeZoneFile Asia/Ulaanbaatar.}.set TZData(:Asia/Ulan_Bator) $TZData(:Asia/Ulaanbaatar).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):143
              Entropy (8bit):4.962709386113539
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52WFKjmcXGm2OHEVPvUWA0GVFSTL:SlSWB9X52wKjmTm2OHEVPXA0CUn
              MD5:6E79B04FC6FE96C90277593719BECD36
              SHA1:81798A9F349A7DEAF9218A21B8C2D8A3E641E9B7
              SHA-256:A73686D7BF4EE44DC7BBD1CAAF2D212D7D12478F1521BF5A628EDBEA79B99725
              SHA-512:F6781EDA72F4B62FE128332AC2B6BDDFFF6E94DF79914C467C2A30BBE05ABE005B23C0F8A5682095FA874CB3787BD499DBBA8F1644515B6914180A68C9AB6066
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Urumqi) {. {-9223372036854775808 21020 0 LMT}. {-1325483420 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1987
              Entropy (8bit):3.684365782602096
              Encrypted:false
              SSDEEP:24:cQueIlfR30vBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNknhT:5YJkvBHwRw/P2rFGAlODU9PZUEWQgmkl
              MD5:F648B8CDF0F44BF2733AD480D91602C2
              SHA1:FCDB62F1D2781836AAAFF1C1B651E91A8E79A901
              SHA-256:C94B072DDB28C27AAA936D27D5A2F1400E47E8BBFCB3EF370BF2C7252E69FB98
              SHA-512:39E793B707C2EEF99BAE8E926A1C8CAF4A1989F71842C348A5819CC4BE3D6DC81D2781BF20CB95631EC532A345B7CD41BA88505B301CA7928E676F55252C6DDD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ust-Nera) {. {-9223372036854775808 34374 0 LMT}. {-1579426374 28800 0 +08}. {354898800 43200 0 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 39600 0 +11}. {796143600 43
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.808435832735883
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8VLYO5YFwVAIgN8ELYOAvN2WFKgTjEHp4WFKELYOun:SlSWB9IZaM3y1LewVAIgKELUvN2wKgsI
              MD5:6372DA942647071A0514AEBF0AFEB7C7
              SHA1:C9FB6B05DA246224D5EB016035AB905657B9D3FA
              SHA-256:7B1A3F36E9A12B850DC06595AAE6294FAEAC98AD933B3327B866E83C0E9A1999
              SHA-512:DC7D8753AD0D6908CA8765623EC1C4E4717833D183435957BB43E7ADB8A0D078F87319408F4C1D284CFB24BE010141B3254A36EF50C5DDCC59D7DEE5B3E33B7F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Bangkok)]} {. LoadTimeZoneFile Asia/Bangkok.}.set TZData(:Asia/Vientiane) $TZData(:Asia/Bangkok).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1991
              Entropy (8bit):3.617868789838068
              Encrypted:false
              SSDEEP:24:cQ6EeBGZKFyW3bEH6i4bfwRpiTQNuTHDMOFOnJfioEkfhbZUAPQ:56aZWf3bw6HfavuLoOUDEChbmAPQ
              MD5:589D58D0819C274BD76648B290E3B6A7
              SHA1:8EF67425A86E1663263C380B81C878EFEE107261
              SHA-256:F7CA7543A15D0EA7380552E9CA4506E1527D5A0C9081B21A6A6CAEAD51085293
              SHA-512:38A4264039866E82CC2CCAF52FF1AB3384A72AD9F2FF0060FC49B3D2C09CB072700F28F2CA3A0850B3E5BAB62F6AA6031ECAB2EAB09EB08833D8CD778B338BDD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Vladivostok) {. {-9223372036854775808 31651 0 LMT}. {-1487321251 32400 0 +09}. {-1247562000 36000 0 +11}. {354895200 39600 1 +11}. {370702800 36000 0 +10}. {386431200 39600 1 +11}. {402238800 36000 0 +10}. {417967200 39600 1 +11}. {433774800 36000 0 +10}. {449589600 39600 1 +11}. {465321600 36000 0 +10}. {481046400 39600 1 +11}. {496771200 36000 0 +10}. {512496000 39600 1 +11}. {528220800 36000 0 +10}. {543945600 39600 1 +11}. {559670400 36000 0 +10}. {575395200 39600 1 +11}. {591120000 36000 0 +10}. {606844800 39600 1 +11}. {622569600 36000 0 +10}. {638294400 39600 1 +11}. {654624000 36000 0 +10}. {670348800 32400 0 +10}. {670352400 36000 1 +10}. {686077200 32400 0 +09}. {695754000 36000 0 +11}. {701798400 39600 1 +11}. {717523200 36000 0 +10}. {733248000 39600 1 +11}. {748972800 36000 0 +10}. {764697600 39600 1 +11}. {7804224
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1987
              Entropy (8bit):3.6163895181017764
              Encrypted:false
              SSDEEP:24:cQVe7Ox4ER6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikL:5Q+9InX4n7m84nPIzOtfjQhGT+
              MD5:29C007E4E3E0015DBF39D78DF39CB790
              SHA1:C3311ED4D7774A7DC14E0436D0B90C88ADD9BDA5
              SHA-256:C2DD93EEAFC3E2FD6CCE0EED0633C40D8BF34331760D23A75ADCEA1719A11AE6
              SHA-512:24609B8C01F3420CC19CA8F5AC78867DCAD1DD1A09A4B1C5356F90F0041BBCA322BC0C64D5DE4F565331674CFE15B7BF66AF6B69ACE9D18765A91B044962F781
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yakutsk) {. {-9223372036854775808 31138 0 LMT}. {-1579423138 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000 3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):235
              Entropy (8bit):4.635396864572362
              Encrypted:false
              SSDEEP:6:SlSWB9X52wKsCm2OHGVQPZN6FCm+UlDVkvScChY/s5Uq:MBp52zmdHGuPZNAkHCpr
              MD5:12B1D08ED6DFAB647D8F1D1371D771F6
              SHA1:2AC1CE6E85533D6B99A8E9725F43A867833B956E
              SHA-256:DCC9323EF236D2E3B6DAA296EB14B9208754FCD449D2351067201BCEC15381A2
              SHA-512:C563B6A3F1B21B5FFD0F092CAF6344D5A6D74F5AC03DA44DCA6FB1B4BC0D321C6E0E8F315248D41C0D1D0FFD35F8DE31D96FBD4AE1CFE15DA52E40EE3FF7F8E3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yangon) {. {-9223372036854775808 23087 0 LMT}. {-2840163887 23087 0 RMT}. {-1577946287 23400 0 +0630}. {-873268200 32400 0 +09}. {-778410000 23400 0 +0630}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2023
              Entropy (8bit):3.6129679767742124
              Encrypted:false
              SSDEEP:48:5iKkhr7YqXZIoLybDNUoXKXmpsuNjcgy8TmQ28N7Wdw+5vDT7L:w2xd8kCdf
              MD5:9C578B55160C4CDE22E0CD3AE449AA89
              SHA1:DAEB24B867A835AA97E7E6A67C1AD4278015D6BB
              SHA-256:924E60D3C57F296CDEA175D4E970FF3C68A92ADBBBA23EF37B76D7AD5D41DCE9
              SHA-512:E3F2798038F897DF5D1D112F294BFD4E3FDBFCF4D568C4038C85289F84E0844010A6C88659C4B9D94720DBB680F2628CECEB17E6C6D0DFC231E6DCBA75068458
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yekaterinburg) {. {-9223372036854775808 14553 0 LMT}. {-1688270553 13505 0 PMT}. {-1592610305 14400 0 +04}. {-1247544000 18000 0 +06}. {354913200 21600 1 +06}. {370720800 18000 0 +05}. {386449200 21600 1 +06}. {402256800 18000 0 +05}. {417985200 21600 1 +06}. {433792800 18000 0 +05}. {449607600 21600 1 +06}. {465339600 18000 0 +05}. {481064400 21600 1 +06}. {496789200 18000 0 +05}. {512514000 21600 1 +06}. {528238800 18000 0 +05}. {543963600 21600 1 +06}. {559688400 18000 0 +05}. {575413200 21600 1 +06}. {591138000 18000 0 +05}. {606862800 21600 1 +06}. {622587600 18000 0 +05}. {638312400 21600 1 +06}. {654642000 18000 0 +05}. {670366800 14400 0 +05}. {670370400 18000 1 +05}. {686095200 14400 0 +04}. {695772000 18000 0 +06}. {701816400 21600 1 +06}. {717541200 18000 0 +05}. {733266000 21600 1 +06}. {748990800 18000 0 +05}. {764
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1959
              Entropy (8bit):3.554930605948629
              Encrypted:false
              SSDEEP:24:cQO4LeuVrqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyuUgUU2heQ:5x79TVOZmF7N76eHvdSB4tJFFWmvN
              MD5:013DD03BE28257101FC72E3294709AC6
              SHA1:2EBBB3DA858B1BBC0C3CDFCBED3A4BAA0D6CE1B2
              SHA-256:15CBC98425C074D9D5D1B107483BF68C75C318C240C7CDBDA390F8D102D76D53
              SHA-512:10A651C82E6D5386FDC1FC95EF15F1CB0A4D8850A2324E7D62F63E1D3FBA87812045FFCF1DF013D7A3E90BBF514A4C5B2B23C547905737193B369644986D6A42
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yerevan) {. {-9223372036854775808 10680 0 LMT}. {-1441162680 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {701823600 14400 1 +03}. {717548400 10800 0 +03}. {733273200 14400 1 +03}. {748998000 10800 0 +03}. {764722800 14400 1 +03}. {780447600 10800 0 +03}. {796172400 14
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9474
              Entropy (8bit):3.4598088631836625
              Encrypted:false
              SSDEEP:192:Mw7Jfsud5vCGy0luUDHaXZgsN/FWVFjHv0:Mwdf/d5vCGy0luZN9WVFjHv0
              MD5:E9C33EAACFD20C021CE94292068CC1D8
              SHA1:9F8C0A4E07C33349C6ACDB0564771AEB11098B9D
              SHA-256:8E2B427733BF8DBCE5171DC57F0892F0987CF1BD7941DA40048CB53B86B23E0D
              SHA-512:8C77CF236855C51E03911A8203A2E81FC728C21A904B4962EA18F5FD39B00174D8A365FC0CA42E4EDE12DA84DD6445CFBB1B3E922189EB6B13AF6BC802E2B405
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Azores) {. {-9223372036854775808 -6160 0 LMT}. {-2713904240 -6872 0 HMT}. {-1830376800 -7200 0 -02}. {-1689548400 -3600 1 -01}. {-1677794400 -7200 0 -02}. {-1667430000 -3600 1 -01}. {-1647730800 -7200 0 -02}. {-1635807600 -3600 1 -01}. {-1616194800 -7200 0 -02}. {-1604358000 -3600 1 -01}. {-1584658800 -7200 0 -02}. {-1572735600 -3600 1 -01}. {-1553036400 -7200 0 -02}. {-1541199600 -3600 1 -01}. {-1521500400 -7200 0 -02}. {-1442444400 -3600 1 -01}. {-1426806000 -7200 0 -02}. {-1379286000 -3600 1 -01}. {-1364770800 -7200 0 -02}. {-1348441200 -3600 1 -01}. {-1333321200 -7200 0 -02}. {-1316386800 -3600 1 -01}. {-1301266800 -7200 0 -02}. {-1284332400 -3600 1 -01}. {-1269817200 -7200 0 -02}. {-1221433200 -3600 1 -01}. {-1206918000 -7200 0 -02}. {-1191193200 -3600 1 -01}. {-1175468400 -7200 0 -02}. {-1127689200 -3600 1 -01}. {-111196440
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7684
              Entropy (8bit):3.7376923223964162
              Encrypted:false
              SSDEEP:192:UdPvxrPGgFEUlpde9pXbO53oVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kV6kef4E:lJv
              MD5:E55A91A96E1DC267AAEFAF27866F0A90
              SHA1:A3E8DB332114397F4F487256E9168E73784D3637
              SHA-256:A2EB47B25B3A389907DD242C86288073B0694B030B244CCF90421C0B510267BD
              SHA-512:9A8140365D76F1A83A98A35593638F2C047B3D2B1E9D0F6ACB2B321EBDB9CC5B6C8CCD3C110B127A12DCDB7D9ED16A8F7DB7DA7A8B4587486D060FACCA23F993
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Bermuda) {. {-9223372036854775808 -15558 0 LMT}. {-1262281242 -14400 0 AST}. {136360800 -10800 0 ADT}. {152082000 -14400 0 AST}. {167810400 -10800 1 ADT}. {183531600 -14400 0 AST}. {189316800 -14400 0 AST}. {199260000 -10800 1 ADT}. {215586000 -14400 0 AST}. {230709600 -10800 1 ADT}. {247035600 -14400 0 AST}. {262764000 -10800 1 ADT}. {278485200 -14400 0 AST}. {294213600 -10800 1 ADT}. {309934800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}. {357112800 -10800 1 ADT}. {372834000 -14400 0 AST}. {388562400 -10800 1 ADT}. {404888400 -14400 0 AST}. {420012000 -10800 1 ADT}. {436338000 -14400 0 AST}. {452066400 -10800 1 ADT}. {467787600 -14400 0 AST}. {483516000 -10800 1 ADT}. {499237200 -14400 0 AST}. {514965600 -10800 1 ADT}. {530686800 -14400 0 AST}. {544600800 -10800 1 ADT}. {562136400 -14400 0 AST}. {576050
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6609
              Entropy (8bit):3.7165368441152715
              Encrypted:false
              SSDEEP:96:KXu/30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:KX5IMj544IrvfMsbxZTH7qwQ
              MD5:230C7B4BB6D64818889E573ADBE97E35
              SHA1:97E6D43C3F9446C9A224DAF69F31CA55721BFC59
              SHA-256:6CDA69514774093B7219BB079077322F5C783DBAD137F89181E8434D8BD2A6CF
              SHA-512:A17246BC44C1FDC971304E0D2E8F721E254880FB725F1AACCA05645FFE82F2AF3791234F02824E357CBDD51D529C882E21B8712735C32420074F3B75813DE27C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Canary) {. {-9223372036854775808 -3696 0 LMT}. {-1509663504 -3600 0 -01}. {-733874400 0 0 WET}. {323827200 3600 1 WEST}. {338950800 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 3600 1 WEST}. {780454800 0 0 WET}. {796179600 3600 1 WEST}. {811904400 0 0 WET
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):237
              Entropy (8bit):4.579111187402317
              Encrypted:false
              SSDEEP:6:SlSWB9X52RQ7Sm2OHDVJlvQV2FlRo/FFuykVvQV2FR+nmY:MBp5267SmdHDVwiHoGyLiomY
              MD5:51BE50511F1FA17A6AF9D4AE892FAFDA
              SHA1:2491743E429AAE5DF70CC3E791DC9875E30F152D
              SHA-256:E444B51A4511F83D616E816B770A60088EA94B9286112F47331122F44119541D
              SHA-512:A509146E25174D9938AF13B78CF052E45F50A61B834C276607B281EF7B81C6696A793A3769B355C8C804A74F37ADDEBBCDC2A69E3B938EB5A2A9742BE135A4A7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Cape_Verde) {. {-9223372036854775808 -5644 0 LMT}. {-1830376800 -7200 0 -02}. {-862610400 -3600 1 -01}. {-764118000 -7200 0 -02}. {186120000 -3600 0 -01}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.655846706649014
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqLG4E2wFVAIgvMG4EeL2RQqG4EZrB/4RQqG4Ei:SlSWB9IZaM3yCwFVAIgvgL2RQ1rB/4R/
              MD5:08C5EE09B8BE16C5E974BA8070D448EA
              SHA1:D171C194F6D61A891D3390FF6492AEFB0F67646A
              SHA-256:7C6A6BCF5AAEAB1BB57482DF1BBC934D367390782F6D8C5783DBBBE663169A9B
              SHA-512:E885F3C30DBE178F88464ED505BA1B838848E6BB15C0D27733932CD0634174D9645C5098686E183CC93CB46DE7EB0DBF2EB64CB77A50FC337E2581E25107C9A6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Atlantic/Faroe)]} {. LoadTimeZoneFile Atlantic/Faroe.}.set TZData(:Atlantic/Faeroe) $TZData(:Atlantic/Faroe).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6551
              Entropy (8bit):3.7148806034051316
              Encrypted:false
              SSDEEP:96:9bd30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:8IMj544IrvfMsbxZTH7qwQ
              MD5:918E1825106C5C73B203B718918311DC
              SHA1:7C31B3521B396FE6BE7162BAECC4CFB4740F622B
              SHA-256:B648E691D8F3417B77EFB6D6C2F5052B3C4EAF8B5354E018EE2E9BD26F867B71
              SHA-512:5B1B5FE82A13127E3C63C8FB0A8CBD45A7277EF29720B937BB3174E8301830018755416D604F3551622E2E4D365D35E4EE1DF39B587A73E43AE0C68D1996B771
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Faroe) {. {-9223372036854775808 -1624 0 LMT}. {-1955748776 0 0 WET}. {347155200 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 3600 1 WEST}. {780454800 0 0 WET}. {796179600 3600 1 WEST}. {811904400 0 0 WET}. {828234000 3600 1 WEST}. {846378000 0 0 WET}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.92967249261586
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVyWJooedVAIgoqxWJ0YF2RQqG0EHEcAg/h8QasWJ/n:SlSWB9IZaM3ymSDdVAIgo2Q2RQaK8H
              MD5:AD9B5217497DBC1CE598573B85F3C056
              SHA1:60984544F5BBD4A5B2B8F43741D66A573A2CF1DC
              SHA-256:BE291E952254B6F0C95C2E2497BE12410D7F1E36D0D1035B3A9BC65D0EDCB65F
              SHA-512:F5D47008495425C386EBAB426195393168E402726405CF23826571E548A3CEFABBA51D87D637C0724FF2CC4F1276D81EACF14D0F9CFC7CBFCC025EEFA0960278
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Oslo)]} {. LoadTimeZoneFile Europe/Oslo.}.set TZData(:Atlantic/Jan_Mayen) $TZData(:Europe/Oslo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9307
              Entropy (8bit):3.715509739111961
              Encrypted:false
              SSDEEP:192:jZqAUb1iF0Rf0IMj544IrvfMsbxZTH7qwQ:jZqAUb1iF0RffMUM8xZTH7qwQ
              MD5:5D2EAAA0D116DD1C7965FCB229678FB4
              SHA1:DA59652A8E57DE9FAF02ED6EB9D863CD34642E6C
              SHA-256:8AAF754C1F9AABEA185808F21B864B02815D24451DB38BE8629DA4C57141E8F5
              SHA-512:E561B09A53CEC764B0B2B2544E774577553F6DFEFB80AEC04698C2B0FBEBBC7F03E11C31627654346752B4F85BB3EF669397162599F3ED6B8B8D286521447361
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Madeira) {. {-9223372036854775808 -4056 0 LMT}. {-2713906344 -4056 0 FMT}. {-1830380400 -3600 0 -01}. {-1689552000 0 1 +00}. {-1677798000 -3600 0 -01}. {-1667433600 0 1 +00}. {-1647734400 -3600 0 -01}. {-1635811200 0 1 +00}. {-1616198400 -3600 0 -01}. {-1604361600 0 1 +00}. {-1584662400 -3600 0 -01}. {-1572739200 0 1 +00}. {-1553040000 -3600 0 -01}. {-1541203200 0 1 +00}. {-1521504000 -3600 0 -01}. {-1442448000 0 1 +00}. {-1426809600 -3600 0 -01}. {-1379289600 0 1 +00}. {-1364774400 -3600 0 -01}. {-1348444800 0 1 +00}. {-1333324800 -3600 0 -01}. {-1316390400 0 1 +00}. {-1301270400 -3600 0 -01}. {-1284336000 0 1 +00}. {-1269820800 -3600 0 -01}. {-1221436800 0 1 +00}. {-1206921600 -3600 0 -01}. {-1191196800 0 1 +00}. {-1175472000 -3600 0 -01}. {-1127692800 0 1 +00}. {-1111968000 -3600 0 -01}. {-1096848000 0 1 +00}. {-10805184
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1962
              Entropy (8bit):3.623004596418002
              Encrypted:false
              SSDEEP:24:cQleDGC/2qdDW4saQCwjoDWFGKRJYHL/Tc7PjEWlyvKekkdoUOCOfNOaRqOjo/Kj:5r2cd5fmYEfAfYaRDjys/
              MD5:0E3020348755C67F6A48F4C3F0F4E51D
              SHA1:FBA44F3DEBC47274A1C9CC4AE5A5F9B363157BF1
              SHA-256:83566E49A37703E11CF0884558BE3DD8827BD79409D04C5D053BCA69D666CEC8
              SHA-512:97F78A8C98B03705188B6F4D622F3B88D7C85B2FF1578DA24C4CD85C163FB05DBD908413B5F355F001755705F22943B1DA6C2A58A902751787238110D2A81F95
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Reykjavik) {. {-9223372036854775808 -5280 0 LMT}. {-1956609120 -3600 0 -01}. {-1668211200 0 1 -01}. {-1647212400 -3600 0 -01}. {-1636675200 0 1 -01}. {-1613430000 -3600 0 -01}. {-1605139200 0 1 -01}. {-1581894000 -3600 0 -01}. {-1539561600 0 1 -01}. {-1531350000 -3600 0 -01}. {-968025600 0 1 -01}. {-952293600 -3600 0 -01}. {-942008400 0 1 -01}. {-920239200 -3600 0 -01}. {-909957600 0 1 -01}. {-888789600 -3600 0 -01}. {-877903200 0 1 -01}. {-857944800 -3600 0 -01}. {-846453600 0 1 -01}. {-826495200 -3600 0 -01}. {-815004000 0 1 -01}. {-795045600 -3600 0 -01}. {-783554400 0 1 -01}. {-762991200 -3600 0 -01}. {-752104800 0 1 -01}. {-731541600 -3600 0 -01}. {-717631200 0 1 -01}. {-700092000 -3600 0 -01}. {-686181600 0 1 -01}. {-668642400 -3600 0 -01}. {-654732000 0 1 -01}. {-636588000 -3600 0 -01}. {-623282400 0 1 -01}. {-605
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):154
              Entropy (8bit):4.967019958156088
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx52RQqGtlN62/EUXGm2OHXT14YvXhFvdQVIK:SlSWB9X52RQrlo2Mbm2OHXqYPTFQV7
              MD5:421C0110145FB8288B08133DD1409E75
              SHA1:CD2D62E739FF1715268B6DFB2C523ED3C76B7A90
              SHA-256:4B78F3E086B2A8B4366362AB5CEF2DF6A28E2B0EA8279C0FE9414E974BBC2E08
              SHA-512:3B20413C6E15A846B3CC730EBCD77D8AA170ECC262E160BB996AA79173F30D42588352C38EA1B44539A62D77B2BC8418A3C4B7507997AF4F15FBD647BF567A88
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/South_Georgia) {. {-9223372036854775808 -8768 0 LMT}. {-2524512832 -7200 0 -02}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.831929124818878
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2RQqGt4r+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2RQr4rC
              MD5:8F4668F0D79577139B59A80D714E45A5
              SHA1:BCD79EDCCB687A2E74794B8CFDE99A7FEC294811
              SHA-256:C78C4E980A378B781ED6D2EA72ABAEF8FFED186538DEB18B61D94B575734FC6A
              SHA-512:08D1472377229BC76A496259344263993791B4DF3F83D94F798779249A5CAE15F6B4341A665387780EA8B1278E9D5FFBCA1BCDE06B3E54750E32078FA482ABD6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Atlantic/St_Helena) $TZData(:Africa/Abidjan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2181
              Entropy (8bit):3.570822154620431
              Encrypted:false
              SSDEEP:48:50wIS1SbSRxS5Sh/ScoOG2S+SZSgSsSs/SYS6SDSF3SLShS7KXS6SkSGSn/S+7SG:PIEg8CCcOFVOfjl/nxw6cmrXlXdgj7E6
              MD5:747D86EC0B020967D989E3D6C4DD273F
              SHA1:567F9E398FEDF58D68F73EB16CE33F8483B44ECE
              SHA-256:F88641114EC11D4129EEFE59CCD587AAD9C1898C3AFEE8A7CB85962312637640
              SHA-512:B7A97E1DCC9E52A0565B50C8865A955924AFED08C21BC1DCCF73A3327C98D0A98706C03913A4872BD24DD2167B2170A6134CA177B20305DEF23D72ADDD668FB0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Stanley) {. {-9223372036854775808 -13884 0 LMT}. {-2524507716 -13884 0 SMT}. {-1824235716 -14400 0 -04}. {-1018209600 -10800 1 -04}. {-1003093200 -14400 0 -04}. {-986760000 -10800 1 -04}. {-971643600 -14400 0 -04}. {-954705600 -10800 1 -04}. {-939589200 -14400 0 -04}. {-923256000 -10800 1 -04}. {-908139600 -14400 0 -04}. {-891806400 -10800 1 -04}. {-876690000 -14400 0 -04}. {-860356800 -10800 1 -04}. {420606000 -7200 0 -03}. {433303200 -7200 1 -03}. {452052000 -10800 0 -03}. {464151600 -7200 1 -03}. {483501600 -10800 0 -03}. {495597600 -14400 0 -04}. {495604800 -10800 1 -04}. {514350000 -14400 0 -04}. {527054400 -10800 1 -04}. {545799600 -14400 0 -04}. {558504000 -10800 1 -04}. {577249200 -14400 0 -04}. {589953600 -10800 1 -04}. {608698800 -14400 0 -04}. {621403200 -10800 1 -04}. {640753200 -14400 0 -04}. {652852800 -10800 1 -04}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.813373101386862
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjpMFBx/h4QWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DCeMFB/4D2
              MD5:F48AD4B81CD3034F6E5D3CA1B5A8BDD4
              SHA1:676FE3F50E3E132C1FD185A1EE1D8C830763204F
              SHA-256:553D7DA9A2EDBD933E8920573AE6BCBAA00302817939046CF257CAEACEC19FAD
              SHA-512:36A4E2286FBEF2F4ED4B9CD1A71136E227FEF4B693F9F43649B790E859221EE470679A7E3C283770DA5CB0113A1C8C1F99480E7020328FFE3E9C870798B092F5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/ACT) $TZData(:Australia/Sydney).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8099
              Entropy (8bit):3.812665609163787
              Encrypted:false
              SSDEEP:96:JPtFF+Wc4CNphbQbPzpRtYac1w6N5HxnLmPaod/gWFXht/c+u8dRYaaiqcdtXHVf:JP5+zNMdYacv5HhLmPajSXz5HV5x
              MD5:4E73BDB571DBF2625E14E38B84C122B4
              SHA1:B9D7B7D2855D102800B53FB304633F5BC961A8D0
              SHA-256:9138DF8A3DE8BE4099C9C14917B5C5FD7EB14751ACCD66950E0FDB686555FFD6
              SHA-512:CF9AB3E9A7C1A76BCC113828ABAF88FE83AAF5CAD7BD181201E06A0CF43E30BA8817AAA88AB3F0F14F459599D91F63ECE851F095154050263C5AD08B2275B4C7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Adelaide) {. {-9223372036854775808 33260 0 LMT}. {-2364110060 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}. {31501800 34200 0 ACST}. {57688200 37800 1 ACDT}. {67969800 34200 0 ACST}. {89137800 37800 1 ACDT}. {100024200 34200 0 ACST}. {120587400 37800 1 ACDT}. {131473800 34200 0 ACST}. {152037000 37800 1 ACDT}. {162923400 34200 0 ACST}. {183486600 37800 1 ACDT}. {194977800 34200 0 ACST}. {215541000 37800 1 ACDT}. {226427400 34200 0 ACST}. {246990600 37800 1 ACDT}. {257877000 34200 0 ACST}. {278440200 37800 1 ACDT}. {289326600 34200 0 ACST}. {309889800 37800 1 ACDT}. {320776200 34200 0 ACST}. {341339400 37800 1 ACDT}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):651
              Entropy (8bit):4.265580091557009
              Encrypted:false
              SSDEEP:12:MBp52nmdHLOYPv+tCdd8xdsWz9ag5J4UVdKcWWC:cQne6skVk
              MD5:296B4B78CEE05805E5EE53B4D5F7284F
              SHA1:DDB5B448E99F278C633B2DBD5A816C4DE28DC726
              SHA-256:2580C3EEEC029572A1FF629E393F64E326DEDAA96015641165813718A8891C4D
              SHA-512:9DE71000BB8AC48A82D83399BD707B661B50882EEBFE2A7E58A81A2F6C04B1F711DAE3AA09A77A9EE265FB633B8883D2C01867AF96F8BE5137119E4FB447DF8C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Brisbane) {. {-9223372036854775808 36728 0 LMT}. {-2366791928 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {625593600 39600 1 AEDT}. {636480000 36000 0 AEST}. {657043200 39600 1 AEDT}. {667929600 36000 0 AEST}. {688492800 39600 1 AEDT}. {699379200 36000 0 AEST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8162
              Entropy (8bit):3.820479465698825
              Encrypted:false
              SSDEEP:96:EkxtFF+Wc4Yphbhd1zCRtYac1w6N5HxnLmPaod/gWFXht/c+u8dRYaaiqcdtXHVf:Ekx5+X5sYacv5HhLmPajSXz5HV5x
              MD5:B4AF947B4737537DF09A039D1E500FB8
              SHA1:CCC0DC52D586BFAA7A0E70C80709231B4BB93C54
              SHA-256:80BBD6D25D4E4EFA234EAD3CB4EB801DC576D1348B9A3E1B58F729FEB688196D
              SHA-512:3B27C36FA3034CB371DD07C992B3A5B1357FC7A892C35910DA139C7DA560DDC0AA1E95966438776F75397E7219A7DA0AD4AD6FB922B5E0BE2828D3534488BFD0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Broken_Hill) {. {-9223372036854775808 33948 0 LMT}. {-2364110748 36000 0 AEST}. {-2314951200 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}. {31501800 34200 0 ACST}. {57688200 37800 1 ACDT}. {67969800 34200 0 ACST}. {89137800 37800 1 ACDT}. {100024200 34200 0 ACST}. {120587400 37800 1 ACDT}. {131473800 34200 0 ACST}. {152037000 37800 1 ACDT}. {162923400 34200 0 ACST}. {183486600 37800 1 ACDT}. {194977800 34200 0 ACST}. {215541000 37800 1 ACDT}. {226427400 34200 0 ACST}. {246990600 37800 1 ACDT}. {257877000 34200 0 ACST}. {278440200 37800 1 ACDT}. {289326600 34200 0 ACST}. {309889800 37800 1 ACDT}. {320776200 34200 0 ACS
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.80238049701662
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjnSV1+QWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DCcq+DCyu
              MD5:16F9CFC4C5B9D5F9F9DB9346CECE4393
              SHA1:ED1ED7BA73EB287D2C8807C4F8EF3EFA516F5A68
              SHA-256:853A159B8503B9E8F42BBCE60496722D0A334FD79F30448BAD651F18BA388055
              SHA-512:9572CCB1BC499BADA72B5FE533B56156DB9EB0DEDFD4AE4397AD60F2A8AF5991F7B1B06A1B8D14C73832543AF8C12F5B16A9A80D093BF0C7ED6E38FF8B66E197
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/Canberra) $TZData(:Australia/Sydney).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8097
              Entropy (8bit):3.7668602204696375
              Encrypted:false
              SSDEEP:96:GJiG+HuKIyymp8tLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:GJqXytLhbVXdnPQler
              MD5:7E0D1435E11C9AE84EF1A863D1D90C61
              SHA1:CE76A3D902221F0EF9D8C25EB2D46A63D0D09D0B
              SHA-256:3C0B35627729316A391C5A0BEE3A0E353A0BAEAD5E49CE7827E53D0F49FD6723
              SHA-512:D262294AC611396633184147B0F6656290BF97A298D6F7EC025E1D88AAC5343363744FD1CB849CDE84F3C1B2CF860CFA7CA43453ADBF68B0903DA1361F0DCD69
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Currie) {. {-9223372036854775808 34528 0 LMT}. {-2345794528 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {47138400 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):422
              Entropy (8bit):4.4678452003570435
              Encrypted:false
              SSDEEP:12:MBp52umdHPPZUj/sVdFFtf/FFAXFFwFFgh:cQuenZq/sVd/tH/AX/w/C
              MD5:FC9689FEF4223726207271E2EAAE6548
              SHA1:26D0B4FC2AD943FCAC90F179F7DF6C18EE12EBB8
              SHA-256:C556C796CCD3C63D9F694535287DC42BB63140C8ED39D31FDA0DA6E94D660A1C
              SHA-512:7898C0DE77297FBAA6AAF9D15CB9765DAF63ED4761BA181D0D1A590A6F19A6B7F6E94564A80EB691ED2D89C96D68449BF57816E4093E5011B93D30C3E1624D60
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Darwin) {. {-9223372036854775808 31400 0 LMT}. {-2364108200 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):734
              Entropy (8bit):4.049000512576295
              Encrypted:false
              SSDEEP:12:MBp527JmdHvOYPV2oV2NF2AUV2ikUF2XV2ouwF2aUF2giV2XHVKF2qV2sF2jV2oA:cQ7JemssNLdUpouw5o5X0mszo4Ui/MXu
              MD5:F997E4624049132CEC09AC77FBA839E3
              SHA1:7BD0097EF75621646CE1969A61596F7FA2E75188
              SHA-256:C3E63F8BC7739A23C21DE71425EDDA7927C31D00BC9E23D3A265C93885248991
              SHA-512:B50EDBBA11D1B8FC7DF13A9DBDE9314E1694E36F2CB810C0160406406161CC8FD52BDBFD13D10EEABE2859FA7AEBC35EBF9AB826EB92BBF26D92EEDD15633649
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Eucla) {. {-9223372036854775808 30928 0 LMT}. {-2337928528 31500 0 +0945}. {-1672562640 35100 1 +0945}. {-1665387900 31500 0 +0945}. {-883637100 35100 1 +0945}. {-876123900 31500 0 +0945}. {-860395500 35100 1 +0945}. {-844674300 31500 0 +0945}. {-836473500 35100 0 +0945}. {152039700 35100 1 +0945}. {162926100 31500 0 +0945}. {436295700 35100 1 +0945}. {447182100 31500 0 +0945}. {690311700 35100 1 +0945}. {699383700 31500 0 +0945}. {1165079700 35100 1 +0945}. {1174756500 31500 0 +0945}. {1193505300 35100 1 +0945}. {1206810900 31500 0 +0945}. {1224954900 35100 1 +0945}. {1238260500 31500 0 +0945}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8325
              Entropy (8bit):3.767204262183229
              Encrypted:false
              SSDEEP:96:8xKiG+HuKIyymp8tLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:8xKqXytLhbVXdnPQler
              MD5:67AF9A2B827308DD9F7ABEC9441C3250
              SHA1:CD87DD4181B41E66EFEA9C7311D5B7191F41EA3A
              SHA-256:814BD785B5ACDE9D2F4FC6E592E919BA0FE1C3499AFC1071B7FA02608B6032AB
              SHA-512:BC6B8CE215B3B4AC358EB989FB1BB5C6AD61B39B7BBD36AAA924A2352E823C029131E79DA927FEEBDD5CF759FDE527F39089C93B0826995D37052362BEAE09F6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Hobart) {. {-9223372036854775808 35356 0 LMT}. {-2345795356 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {-94730400 36000 0 AEST}. {-71136000 39600 1 AEDT}. {-55411200 36000 0 AEST}. {-37267200 39600 1 AEDT}. {-25776000 36000 0 AEST}. {-5817600 39600 1 AEDT}. {5673600 36000 0 AEST}. {25632000 39600 1 AEDT}. {37728000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):194
              Entropy (8bit):4.865814837459796
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3yIoGEowFVAIgjG/L2DCkx/2DCPGT:MBaIMje0QL2a7
              MD5:1221FC8932CA3DCA431304AF660840F0
              SHA1:5E023E37D98EA1321B10D36A79B26DF1A017F9D5
              SHA-256:EB8FDBCFDE9E2A2AA829E784D402966F61A5BF6F2034E0CB06A24FACB5B87874
              SHA-512:EB19FE74DC13456D0F9F1EDC9C444793A4011D3B65ADF6C7E7A405504079EB3A0C27F69DDA662F797FE363948E93833422F5DC3C1891AA7D414B062BE4DD3887
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Lord_Howe)]} {. LoadTimeZoneFile Australia/Lord_Howe.}.set TZData(:Australia/LHI) $TZData(:Australia/Lord_Howe).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):796
              Entropy (8bit):4.1890768067004
              Encrypted:false
              SSDEEP:12:MBp52gCmdHVP/+tCdd8xdsWz9ag5J4UVdKcWW3ty/yJATUJrRxC:cQgCeRUVfl7w
              MD5:08E88B2169BC76172E40515F9DA2C147
              SHA1:5C03B7C9748E63C2B437C97F8ED923A9F3E374E7
              SHA-256:9E3558C8514E97274D9F938E9841C5E3355E738BBD55BCB17FA27FF0E0276AEA
              SHA-512:39E10639C97DE82428818B9C5D059BA853A17113351BAEE2512806AC3066EDDF0294859519AFBE425E0D1315B1A090F84C08CEFEDCE2A3D3A38EEF782234D8C4
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Lindeman) {. {-9223372036854775808 35756 0 LMT}. {-2366790956 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {625593600 39600 1 AEDT}. {636480000 36000 0 AEST}. {657043200 39600 1 AEDT}. {667929600 36000 0 AEST}. {688492800 39600 1 AEDT}. {699379200 36000 0 AEST}. {709912800 36000 0 AEST}. {719942400 39600 1 AEDT}. {731433600 36000 0 AEST}. {751996800 39600 1 AEDT}. {762883200 36000 0 AEST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7519
              Entropy (8bit):3.4688530726187112
              Encrypted:false
              SSDEEP:96:zVjDVP0Izj1cdhsARcuhb4F3LbSZYt2U/gTpxxM3a6Z/nEgAmQso4QgDD:zv3qrcuhb4FbbCegi
              MD5:169FF1BE6B6407E853AAF9F6E9A9A047
              SHA1:C573582B8EF897D3AE5CA0FB089BE31F6ED076EB
              SHA-256:3C7C5CF7300957F73E9249FC8BF282F7CEE262849DD5D326F476E1AE8A7B8DD5
              SHA-512:BD8315022E8B190976FCED98252FCA0C248D857AC5045D741F6902871F0E3C158B248628DF9BA124A38AE878398F8BEA614254400F329D01F60EE50666AEE118
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Lord_Howe) {. {-9223372036854775808 38180 0 LMT}. {-2364114980 36000 0 AEST}. {352216800 37800 0 +1030}. {372785400 41400 1 +1030}. {384273000 37800 0 +1030}. {404839800 41400 1 +1030}. {415722600 37800 0 +1030}. {436289400 41400 1 +1030}. {447172200 37800 0 +1030}. {467739000 41400 1 +1030}. {478621800 37800 0 +1030}. {488984400 37800 0 +1030}. {499188600 39600 1 +1030}. {511282800 37800 0 +1030}. {530033400 39600 1 +1030}. {542732400 37800 0 +1030}. {562087800 39600 1 +1030}. {574786800 37800 0 +1030}. {594142200 39600 1 +1030}. {606236400 37800 0 +1030}. {625591800 39600 1 +1030}. {636476400 37800 0 +1030}. {657041400 39600 1 +1030}. {667926000 37800 0 +1030}. {688491000 39600 1 +1030}. {699375600 37800 0 +1030}. {719940600 39600 1 +1030}. {731430000 37800 0 +1030}. {751995000 39600 1 +1030}. {762879600 37800 0 +1030}. {78344
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8069
              Entropy (8bit):3.769669933493392
              Encrypted:false
              SSDEEP:96:sriG+vi8GyddsYtLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:sr/2tLhbVXdnPQler
              MD5:E38FDAF8D9A9B1D6F2B1A8E10B9886F4
              SHA1:6188BD62E94194DB469BE93224A396D08A986D4D
              SHA-256:399F727CB39D90520AD6AE78A8963F918A490A813BC4FF2D94A37B0315F52D99
              SHA-512:79FDCFF5066636C3218751C8B2B658C6B7A6864264DCC28B47843EAEFDD5564AC5E4B7A66E3D1B0D25DB86D6C6ED55D1599F1FE2C169085A8769E037E0E954BE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Melbourne) {. {-9223372036854775808 34792 0 LMT}. {-2364111592 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}. {352224000 36000 0 AEST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.8456659038249
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjREeQWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DC5eDCyu
              MD5:AE3539C49047BE3F8ABAD1AC670975F1
              SHA1:62CD5C3DB618B9FE5630B197AB3A9729B565CA41
              SHA-256:938A557C069B8E0BE8F52D721119CBA9A694F62CF8A7A11D68FD230CC231E17C
              SHA-512:6F143B50C1EEC1D77F87DD5B0FFCF6625800E247400AA58361748BFEA0626E2CDA9C3FD2A4C269B3218D28FF1FB8533F4F6741F6B2C5E83F9C84A5882C86716B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/NSW) $TZData(:Australia/Sydney).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.780732237583773
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjboFVAIgoXjbhvN2QWCCjsrQWCCjb/:SlSWB9IZaM3yIiFVAIgg2DCZrDCy
              MD5:70EF2A87B4538500CFADB63B62DDCBC6
              SHA1:8D737E6E8D37323D3B41AD419F1CA9B5991E2E99
              SHA-256:59B67F2C7C62C5F9A93767898BA1B51315D2AC271075FAFC1A24313BB673FF27
              SHA-512:E148FC32894A7138D1547910CBD590891120CE5FB533D1348243539C35CE2994DC9F3E7B6A952BF871882C8D6ECA47E13E08AF59AB52A55F790508F2DB9B0EB6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Darwin)]} {. LoadTimeZoneFile Australia/Darwin.}.set TZData(:Australia/North) $TZData(:Australia/Darwin).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):714
              Entropy (8bit):4.257489685002088
              Encrypted:false
              SSDEEP:12:MBp52wmdHCBdPmzKfkzm2z75izhNhaP0YqozBqmjj4zl5fV59Bhg8lfU:cQweCBpYd7IzrhaMYR8mP4znhf9U
              MD5:B354B9525896FDED8769CF5140E76FFF
              SHA1:8494E182E3803F2A6369261B4B4EAC184458ECC4
              SHA-256:C14CAAD41E99709ABF50BD7F5B1DAFE630CA494602166F527DBDA7C134017FB0
              SHA-512:717081F29FBACEE2722399DD627045B710C14CF6021E4F818B1768AF972061232412876872F113C468446D79A366D7FFD2E852563DC44A483761D78C7A16F74A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Perth) {. {-9223372036854775808 27804 0 LMT}. {-2337925404 28800 0 AWST}. {-1672559940 32400 1 AWDT}. {-1665385200 28800 0 AWST}. {-883634400 32400 1 AWDT}. {-876121200 28800 0 AWST}. {-860392800 32400 1 AWDT}. {-844671600 28800 0 AWST}. {-836470800 32400 0 AWST}. {152042400 32400 1 AWDT}. {162928800 28800 0 AWST}. {436298400 32400 1 AWDT}. {447184800 28800 0 AWST}. {690314400 32400 1 AWDT}. {699386400 28800 0 AWST}. {1165082400 32400 1 AWDT}. {1174759200 28800 0 AWST}. {1193508000 32400 1 AWDT}. {1206813600 28800 0 AWST}. {1224957600 32400 1 AWDT}. {1238263200 28800 0 AWST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):198
              Entropy (8bit):4.75392731256171
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3yIaWhvFVAIgPWzCxL2DCoRWJvFBx+DC7W6:MBaIMjoTL2rOvFey
              MD5:D12C6F15F8BFCA19FA402DAE16FC9529
              SHA1:0869E6D11681D74CC3301F4538D98A225BE7C2E1
              SHA-256:77EA0243A11D187C995CE8D83370C6682BC39D2C39809892A48251123FF19A1E
              SHA-512:A98D1AF1FC3E849CCF9E9CC090D3C65B7104C164762F88B6048EA2802F17D635C2E66BE2661338C1DD604B550A267678245DE867451A1412C4C06411A21BE3A9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Brisbane)]} {. LoadTimeZoneFile Australia/Brisbane.}.set TZData(:Australia/Queensland) $TZData(:Australia/Brisbane).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):193
              Entropy (8bit):4.701653352722385
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3yIDRpGvFVAIgSRFL2DCa7QDCuRpv:MBaIMjdp5YFL23QHpv
              MD5:23671880AC24D35F231E2FCECC1A5E3A
              SHA1:5EE2EFD5ADE268B5114EB02FDA77F4C5F507F3CB
              SHA-256:9823032FFEB0BFCE50B6261A848FE0C07267E0846E9F7487AE812CEECB286446
              SHA-512:E303C7DE927E7BAA10EE072D5308FEE6C4E9B2D69DDD8EF014ED60574E0855EE803FE19A7CB31587E62CAE894C087D47A91A130213A24FCCD152736D82F55AB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Adelaide)]} {. LoadTimeZoneFile Australia/Adelaide.}.set TZData(:Australia/South) $TZData(:Australia/Adelaide).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8066
              Entropy (8bit):3.763781985138297
              Encrypted:false
              SSDEEP:96:GZCiG+CiRyddsYtLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:GZCm2tLhbVXdnPQler
              MD5:B3498EEA194DDF38C732269A47050CAA
              SHA1:C32B703AA1FA34D890D151300A2B21E0FA8F55D3
              SHA-256:0EE9BE0F0D6EC0CE10DEA1BE7A9F494C74B747418E966B85EC1FFB15F6F22A4F
              SHA-512:A9419B797B1518AAEEE27A1796D0D024847F7A61D26238F1643EBD6131A6B36007FBABD9E766C3D4ED61B006FD31FC4555CB54B8681E7DBDEC26B38144D64BC9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Sydney) {. {-9223372036854775808 36292 0 LMT}. {-2364113092 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}. {352224000 36000 0 AEST}. {3
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.7264864039237215
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjKD4YFedVAIgoXjKgVAt2QWCCjiiieQWCCjKDvn:SlSWB9IZaM3yI4DVyVAIgxkAt2DC3ne0
              MD5:C7C9CDC9EC855D2F0C23673FA0BAFFB6
              SHA1:4C79E1C17F418CEE4BE8F638F34201EE843D8E28
              SHA-256:014B3D71CE6BD77AD653047CF185EA03C870D78196A236693D7610FED7F30B6F
              SHA-512:79AE11CE076BFB87C0AAD35E9AF6E760FC592F1D086EB78E6DF88744F502ED4248853A0EAD72ADA8EA9583161925802EE5E46E3AA8CE8CF873852C26B4FDC05B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Hobart)]} {. LoadTimeZoneFile Australia/Hobart.}.set TZData(:Australia/Tasmania) $TZData(:Australia/Hobart).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):199
              Entropy (8bit):4.7697171393457936
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3yIvFfkvFVAIgoFFL2DCzyQDCMFB:MBaIMj9fHaFL2xQzB
              MD5:BD2EA272B8DF472E29B7DD0506287E92
              SHA1:55BF3A3B6398F9FF1DB3A46998A4EFF44F6F325C
              SHA-256:EE35DF8BBCD6A99A5550F67F265044529BD7AF6A83087DD73CA0BE1EE5C8BF51
              SHA-512:82B18D2C9BA7113C2714DC79A87101FFB0C36E5520D61ADEAB8A31AD219E51A6402A6C8A8FD7120A330FE8847FF8F083397A1BF5889B73484FBAA6F99497DE48
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Melbourne)]} {. LoadTimeZoneFile Australia/Melbourne.}.set TZData(:Australia/Victoria) $TZData(:Australia/Melbourne).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.781808870279912
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjXFedVAIgoXjbOAt2QWCCjH0QWCCj5:SlSWB9IZaM3yIYVAIg9At2DC00DCa
              MD5:9E0EF0058DDA86016547F2BFE421DE74
              SHA1:5DB6AEAC6B0A42FEAE28BB1A45679BC235F4E5BF
              SHA-256:FC952BE48F11362981CDC8859F9C634312E5805F2F1513159F25AEFCE664867C
              SHA-512:C60E5A63378F8424CE8D862A575DFE138646D5E88C6A34562A77BEC4B34EA3ED3085424E2130E610197164C7E88805DC6CDE46416EB45DC256F387F632F48CA7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Perth)]} {. LoadTimeZoneFile Australia/Perth.}.set TZData(:Australia/West) $TZData(:Australia/Perth).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):207
              Entropy (8bit):4.871861105493913
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3yIcKCFVAIgJKfF2DCkuM0DC9Kl:MBaIMjcKCQJKt2kVSKl
              MD5:5C3CED24741704A0A7019FA66AC0C0A1
              SHA1:88C7AF3B22ED01ED99784C3FAB4F5112AA4659F3
              SHA-256:71A56C71CC30A46950B1B4D4FBB12CB1CBAA24267F994A0F223AE879F1BB6EEC
              SHA-512:771A7AC5D03DD7099F565D6E926F7B97E8A7BA3795339D3FD78F7C465005B55388D8CC30A62978042C354254E1BA5467D0832C0D29497E33D6EF1DA217528806
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Broken_Hill)]} {. LoadTimeZoneFile Australia/Broken_Hill.}.set TZData(:Australia/Yancowinna) $TZData(:Australia/Broken_Hill).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):189
              Entropy (8bit):4.84045343046357
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sMhS4edVAIg20sMhStQ1bNW1h4IAcGEsMhSA:SlSWB9IZaM3y7thtedVAIgpthKQxWh4y
              MD5:DF4D752BEEAF40F081C03B4572E9D858
              SHA1:A83B5E4C3A9EB0CF43263AFF65DB374353F65595
              SHA-256:1B1AD73D3FE403AA1F939F05F613F6A3F39A8BA49543992D836CD6ED14B92F2C
              SHA-512:1F96F1D8AACD6D37AC13295B345E761204DAE6AA1DF4894A11E00857CCB7247FA7BEBD22407EA5D13193E2945EB1F4210E32669069F157F1459B26643A67F445
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Rio_Branco)]} {. LoadTimeZoneFile America/Rio_Branco.}.set TZData(:Brazil/Acre) $TZData(:America/Rio_Branco).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.826795532956443
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0wKy4oedVAIg20wK+F1bIAJl0IAcGEwKyvn:SlSWB9IZaM3y7/rDdVAIgp/mxIAE90/8
              MD5:86B9E49F604AD5DBC4EC6BA735A513C7
              SHA1:BE3AB32339DF9830D4F445CCF883D79DDBA8708E
              SHA-256:628A9AE97682B98145588E356948996EAE18528E34A1428A6B2765CCAA7A8A1F
              SHA-512:EE312624EC0193C599B2BDBFA57CC4EA7C68890955E0D888149172DF8F2095C553BFBB80BF76C1B8F3232F3A5863A519FF59976BBAEA622C64737890D159AA22
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Noronha)]} {. LoadTimeZoneFile America/Noronha.}.set TZData(:Brazil/DeNoronha) $TZData(:America/Noronha).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):186
              Entropy (8bit):4.9019570219911275
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tQJXvedVAIg20tQJX1bJHIAcGEtQJXv:SlSWB9IZaM3y7tIGdVAIgptExR90tIv
              MD5:FBF6B9E8B9C93B1B9E484D88EF208F38
              SHA1:44004E19A485B70E003687CB1057B8A2421D1BF0
              SHA-256:C89E831C4A0525C3CEFF17072843386369096C08878A4412FB208EF5D3F156D8
              SHA-512:4E518FC4CED0C756FF45E0EDE72F6503C4B3AE72E785651DE261D3F261D43F914721EFCEAB272398BC145E41827F35D46DE4E022EAF413D95F64E8B3BD752002
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Sao_Paulo)]} {. LoadTimeZoneFile America/Sao_Paulo.}.set TZData(:Brazil/East) $TZData(:America/Sao_Paulo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.853909262702622
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0znQZFwFVAIg20znQoCxL1bbAWVIAcGEznQb:SlSWB9IZaM3y7zn+wFVAIgpznzCxLxnJ
              MD5:116F0F146B004D476B6B86EC0EE2D54D
              SHA1:1F39A84EF3DFF676A844174D9045BE388D3BA8C0
              SHA-256:F24B9ED1FAFA98CD7807FFFEF4BACA1BCE1655ABD70EB69D46478732FA0DA573
              SHA-512:23BD7EC1B5ADB465A204AAA35024EE917F8D6C3136C4EA973D8B18B586282C4806329CEBE0EDBF9E13D0032063C8082EC0D84A049F1217C856943A4DDC4900D0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Manaus)]} {. LoadTimeZoneFile America/Manaus.}.set TZData(:Brazil/West) $TZData(:America/Manaus).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7471
              Entropy (8bit):3.710275786382764
              Encrypted:false
              SSDEEP:96:ht6CvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:PSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:AE72690EF7063F0B9F640096204E2ECE
              SHA1:4F815B51DA9BCA97DFF71D191B74D0190890F946
              SHA-256:BB2C5E587EE9F9BF85C1D0B6F57197985663D4DFF0FED13233953C1807A1F11C
              SHA-512:F7F0911251BC7191754AF0BA2C455E825BF16EA9202A740DC1E07317B1D74CDAF680E161155CC1BD5E862DCEE2A58101F419D8B5E0E24C4BA7134999D9B55C48
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:CET) {. {-9223372036854775808 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766623600 3600 0 CET}. {228877200 7200 1 CEST}. {243997200 3600 0 CET}. {260326800 7200 1 CEST}. {276051600 3600 0 CET}. {291776400 7200 1 CEST}. {307501200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8227
              Entropy (8bit):3.723597525146651
              Encrypted:false
              SSDEEP:192:KxrIOdXkqbfkeTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbo:KxrIOdXkqbfNTzZSJw5/9/yuvQ6crD5r
              MD5:B5AC3FA83585957217CA04384171F0FF
              SHA1:827FF1FBDADDDE3754453E680B4E719A50499AE6
              SHA-256:17CBE2F211973F827E0D5F9F2B4365951164BC06DA065F6F38F45CB064B29457
              SHA-512:A56485813C47758F988A250FFA97E2DBD7A69DDD16034E9EF2834AF895E8A374EEB4DA3F36E6AD80285AC10F84543ECF5840670805082E238F822F85D635651F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:CST6CDT) {. {-9223372036854775808 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-84384000 -18000 1 CDT}. {-68662800 -21600 0 CST}. {-52934400 -18000 1 CDT}. {-37213200 -21600 0 CST}. {-21484800 -18000 1 CDT}. {-5763600 -21600 0 CST}. {9964800 -18000 1 CDT}. {25686000 -21600 0 CST}. {41414400 -18000 1 CDT}. {57740400 -21600 0 CST}. {73468800 -18000 1 CDT}. {89190000 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -216
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.754307292225081
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx02NEO4FVAIg202NEtYF0nalGe2IAcGE2NEOv:SlSWB9IZaM3y7UEO4FVAIgpUEqF0af2b
              MD5:B0E220B9CD16038AAF3EA21D60064B62
              SHA1:333410CB7D4F96EF836CDC8097A1DCE34A2B961A
              SHA-256:6F71D7ED827C9EF6E758A44D2A998673E1225EB8005AD557A1713F5894833F92
              SHA-512:F879F60E36C739280E8FC255D2792BB24BCA90A265F8F90B5FB85630D5A58CE4FDBD24EA5594924375C3CD31DBC6D49C06CBFA43C52D0B9A1E9D799914A164F7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Halifax)]} {. LoadTimeZoneFile America/Halifax.}.set TZData(:Canada/Atlantic) $TZData(:America/Halifax).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):186
              Entropy (8bit):4.814426408072182
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0po4FVAIg20peRL0nPQox/h4IAcGEpov:SlSWB9IZaM3y7phFVAIgppOL0d490py
              MD5:8374E381BC8235B11B7C5CA215FA112C
              SHA1:181298556253D634B09D72BD925C4DBB92055A06
              SHA-256:1B87273B264A3243D2025B1CFC05B0797CBC4AA95D3319EEE2BEF8A09FDA8CAD
              SHA-512:12800E49B8094843F66454E270B4BE154B053E5FB453C83269AF7C27B965071C88B02AF7BB404E7F5A07277DB45E58D1C5240B377FC06172087BB29749C7543B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Winnipeg)]} {. LoadTimeZoneFile America/Winnipeg.}.set TZData(:Canada/Central) $TZData(:America/Winnipeg).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.860347334610986
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW60nbP2/8S64IAcGEsAz1:SlSWB9IZaM3y7hzipVAIgphzGCW60L5X
              MD5:F5CB42BC029315088FAD03C9235FFB51
              SHA1:7773ECE0B85D66E4FA207A26EE4395F38BAC4068
              SHA-256:AF04A4558E31C9864B92FE3403011F7A2FBD837E1314A7BB5AF552D5AED06457
              SHA-512:0533B9D98834866FAA3C6E67A6F61A8A22C2BFDBA8C5336388C0894FBA550611C9112515F17E20E7B3508EC2318D58EA7CA814EC10C3451954C3CC169EDA0F8C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:Canada/East-Saskatchewan) $TZData(:America/Regina).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.7067203041014185
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qMKLRXIVAIg20qMKLRI60nbHboxp4IAcGEqMKLRXv:SlSWB9IZaM3y7RQ+VAIgpRQ+60Dboxp2
              MD5:22453AC70F84F34868B442E0A7BDC20A
              SHA1:730049FF6953E186C197601B27AB850305961FD0
              SHA-256:545B992E943A32210F768CB86DEF3203BE956EE03A3B1BC0D55A5CD18A4F064D
              SHA-512:91FE33FAD3954019F632A771BCBD9FF3FDCCDA1F51DD25E0E5808A724F2D9B905E5E2DEE32D415BEA9A9ADB74186D83548584414BB130DF1A166D49373AC7BEF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Toronto)]} {. LoadTimeZoneFile America/Toronto.}.set TZData(:Canada/Eastern) $TZData(:America/Toronto).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.768148288986999
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx07nKL5zFVAIg207nKLKN0nNYLo/4IAcGE7nKLun:SlSWB9IZaM3y77GzFVAIgp7DN0W8/49s
              MD5:5E0D3D1A7E9F800210BB3E02DFF2ECD3
              SHA1:F2471795A9314A292DEAA3F3B94145D3DE5A2792
              SHA-256:A8B3A4D53AA1CC73312E80951A9E9CEA162F4F51DA29B897FEB58B2DF3431821
              SHA-512:F80C7CDFE20E5FAD9E4BA457446F067ACE0C3F4659761E3B4A2422D3456CDE92C20589954DE5E0DC64619E3B6AB3A55AE0E0E783F8EFB24D74A5F6DFBF5ABB16
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Edmonton)]} {. LoadTimeZoneFile America/Edmonton.}.set TZData(:Canada/Mountain) $TZData(:America/Edmonton).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):191
              Entropy (8bit):4.953647576523321
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tVZMYFwFVAIg20tVZoYvxL0nJBJi6FBx/2IAcGEt3:SlSWB9IZaM3y7tgYmFVAIgptMqL0xdB7
              MD5:3A4E193C8624AE282739867B22B7270A
              SHA1:AC93EEDA7E8AB7E40834FFBA83BAE5D803CB7162
              SHA-256:70EF849809F72741FA4F37C04C102A8C6733639E905B4E7F554F1D94737BF26B
              SHA-512:BE2AACEE2A6F74520F4F1C0CCBBB750ED6C7375D4368023BAB419184F8F717D52981106C03F487B24A943907E60784136C0E5F8C1D5B3D1C67C20E23A4F412B3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/St_Johns)]} {. LoadTimeZoneFile America/St_Johns.}.set TZData(:Canada/Newfoundland) $TZData(:America/St_Johns).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):189
              Entropy (8bit):4.839589386398345
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0oELSTAWFwVAIg20oELSTAQO0L0nie2IAcGEoELSTH:SlSWB9IZaM3y7ZLgXwVAIgpZLgJJL0Nu
              MD5:6AA0FCE594E991D6772C04E137C7BE00
              SHA1:6C53EE6FEBEC2BD5271DD80D40146247E779CB7B
              SHA-256:D2858621DA914C3F853E399F0819BA05BDE68848E78F59695B84B2B83C1FDD2A
              SHA-512:7B354BB9370BB61EB0E801A1477815865FDE51E6EA43BF166A6B1EED127488CC25106DEE1C6C5DC1EF3E13E9819451E10AFBC0E189D3D3CDE8AFFA4334C77CA3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Vancouver)]} {. LoadTimeZoneFile America/Vancouver.}.set TZData(:Canada/Pacific) $TZData(:America/Vancouver).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.83938055689947
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW60nogS64IAcGEsAzEun:SlSWB9IZaM3y7hzipVAIgphzGCW60Hd9
              MD5:927FD3986F83A60C217A3006F65A3B0A
              SHA1:022D118024BFC5AE0922A1385288C3E4B41903DB
              SHA-256:BB457E954DB625A8606DD0F372DA9BFFAA01F774B4B82A2B1CEE2E969C15ABC3
              SHA-512:3EA932FA5416A9C817977F9D31C8A15C937A453B4D6A6409A7966E76D66A685C91F1117C82BEBEBA2AF5516556DA2BDEC898AD718C78FB8B690F31692174DA6C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:Canada/Saskatchewan) $TZData(:America/Regina).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):4.841592909599599
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0peR2pVkvFVAIg20peR2zxL0nTOK8x/h4IAcGEpeRu:SlSWB9IZaM3y7peR2fkvFVAIgppeR2FF
              MD5:9F2A7F0D8492F67F764F647638533C3F
              SHA1:3785DACD1645E0630649E411DC834E8A4FB7F40B
              SHA-256:F2A81B7E95D49CEC3C8952463B727129B4DC43D58ADC64BB7CAB642D3D191039
              SHA-512:0133870BB96851ECD486D55FD10EB4BCB1678772C1BFFADE85FC5644AC8445CDB4C6284BEFFED197E9386C9C6EF74F5F718F2CB43C4C7B8E65FE413C8EC51CD0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Whitehorse)]} {. LoadTimeZoneFile America/Whitehorse.}.set TZData(:Canada/Yukon) $TZData(:America/Whitehorse).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):189
              Entropy (8bit):4.762021566751952
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tfEJ5YyVAIg20tfEJvYvWAt0dKLRMyREGH/h4IAcB:SlSWB9IZaM3y7tfEJHVAIgptfEJAvN0+
              MD5:B2BDB6C027FF34D624EA8B992E5F41AB
              SHA1:425AB0D603C3F5810047A7DC8FD28FDF306CC2DB
              SHA-256:F2E3C1E88C5D165E1D38B0D2766D64AA4D2E6996DF1BE58DADC9C4FC4F503A2E
              SHA-512:6E5A8DC6F5D5F0218C37EE719441EBDC7EDED3708F8705A98AEF7E256C8DC5D82F4BF82C529282E01D8E6E669C4F843B143730AD9D8BBF43BCC98ECB65B52C9B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Santiago)]} {. LoadTimeZoneFile America/Santiago.}.set TZData(:Chile/Continental) $TZData(:America/Santiago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.758503564906338
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG7ZAJpVAIgObT7ZA6xL0bxOdBx/nUDH7ZAen:SlSWB9IZaM3ycJA3VAIgObJA6xL04dB4
              MD5:E9DF5E3D9E5E242A1B9C73D8F35C9911
              SHA1:9905EF3C1847CFF8156EC745779FCF0D920199B7
              SHA-256:AA305BEC168C0A5C8494B81114D69C61A0D3CF748995AF5CCC3E2591AC78C90C
              SHA-512:7707AC84D5C305F40A1713F1CBBED8A223553A5F989281CCDB278F0BD0D408E6FC9396D9FA0CCC82168248A30362D2D4B27EDEF36D9A3D70E286A5B668686FDE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Easter)]} {. LoadTimeZoneFile Pacific/Easter.}.set TZData(:Chile/EasterIsland) $TZData(:Pacific/Easter).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):170
              Entropy (8bit):4.8073098952422395
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx02TEMVFwVAIg202TEKN0lIAcGE2TEMv:SlSWB9IZaM3y76EHVAIgp6EKN0l906Eu
              MD5:BA8EE8511A2013E791A3C50369488588
              SHA1:03BF30F56FB604480A9F5ECD8FB13E3CF82F4524
              SHA-256:2F9DFE275B62EFBCD5F72D6A13C6BB9AFD2F67FDDD8843013D128D55373CD677
              SHA-512:29C9E9F4B9679AFD688A90A605CFC1D7B86514C4966E2196A4A5D48D4F1CF16775DFBDF1C9793C3BDAA13B6986765531B2E11398EFE5662EEDA7B37110697832
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Havana)]} {. LoadTimeZoneFile America/Havana.}.set TZData(:Cuba) $TZData(:America/Havana).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7189
              Entropy (8bit):3.6040923024580884
              Encrypted:false
              SSDEEP:96:WB8kMKVCy+Hk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lf:AroXPzh2kNU4tB715pyzHy1gA
              MD5:9AE4C7EC014649393D354B02DF00F8B9
              SHA1:D82195DEF49CFFEAB3791EA70E6D1BB8BC113155
              SHA-256:4CB6582052BE7784DD08CE7FD97ACC56234F07BCF80B69E57111A8F88454908E
              SHA-512:6F0C138AF98A4D4A1028487C29267088BD4C0EC9E7C1DB9818FA31A61C9584B67B3F5909C6E6FDB0F7183629E892A77BA97654D39FCE7DDEF6908F8146B7BE72
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EET) {. {-9223372036854775808 7200 0 EET}. {228877200 10800 1 EEST}. {243997200 7200 0 EET}. {260326800 10800 1 EEST}. {276051600 7200 0 EET}. {291776400 10800 1 EEST}. {307501200 7200 0 EET}. {323830800 10800 1 EEST}. {338950800 7200 0 EET}. {354675600 10800 1 EEST}. {370400400 7200 0 EET}. {386125200 10800 1 EEST}. {401850000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {449024400 10800 1 EEST}. {465354000 7200 0 EET}. {481078800 10800 1 EEST}. {496803600 7200 0 EET}. {512528400 10800 1 EEST}. {528253200 7200 0 EET}. {543978000 10800 1 EEST}. {559702800 7200 0 EET}. {575427600 10800 1 EEST}. {591152400 7200 0 EET}. {606877200 10800 1 EEST}. {622602000 7200 0 EET}. {638326800 10800 1 EEST}. {654656400 7200 0 EET}. {670381200 10800 1 EEST}. {686106000 7200 0 EET}. {701830800 10800 1 EEST}. {717555600 7200 0 EET}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):106
              Entropy (8bit):4.879680803636454
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yLWkXGm2OHLVvain:SlSWB9X5y2m2OHLViin
              MD5:33221E0807873CC5E16A55BF4450B6D4
              SHA1:A01FD9D1B8E554EE7A25473C2FBECA3B08B7FD02
              SHA-256:5AA7D9865554BCE546F1846935C5F68C9CA806B29B6A45765BA55E09B14363E4
              SHA-512:54A33B239BBFCFC645409FBC8D9DDBFCAE56067FA0427D0BE5F49CB32EB8EEC8E43FC22CE1C083FDC17DD8591BE9DB28A2D5006AFA473F10FB17EF2CE7AED305
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EST) {. {-9223372036854775808 -18000 0 EST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8227
              Entropy (8bit):3.723178863172678
              Encrypted:false
              SSDEEP:96:W4UwdaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:Cwdrn+qvOTFhPI1jFIL
              MD5:1A7BDED5B0BADD36F76E1971562B3D3B
              SHA1:CF5BB82484C4522B178E25D14A42B3DBE02D987D
              SHA-256:AFD2F12E50370610EA61BA9DD3838129785DFDEE1EBCC4E37621B54A4CF2AE3F
              SHA-512:4803A906E2C18A2792BF812B8D26C936C71D8A9DD9E87F7DA06630978FCB5DE1094CD20458D37973AA9967D51B97F94A5785B7B15F807E526C13D018688F16D9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EST5EDT) {. {-9223372036854775808 -18000 0 EST}. {-1633280400 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1601830800 -14400 1 EDT}. {-1583690400 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-84387600 -14400 1 EDT}. {-68666400 -18000 0 EST}. {-52938000 -14400 1 EDT}. {-37216800 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {162370800 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -180
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):165
              Entropy (8bit):4.812476042768195
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsPHVyVAIgNGE7JW6yCh0DcPHv:SlSWB9IZaM3y7AVAIgNTFW6yg0DY
              MD5:3708D7ED7044DE74B8BE5EBD7314371B
              SHA1:5DDC75C6204D1A2A59C8441A8CAF609404472895
              SHA-256:07F4B09FA0A1D0BA63E17AD682CAD9535592B372815AB8FD4884ACD92EC3D434
              SHA-512:A8761601CD9B601E0CE8AC35B6C7F02A56B07DC8DE31DEB99F60CB3013DEAD900C74702031B5F5F9C2738BA48A8420603D46C3AE0E0C87D40B9D9D44CE0EAE81
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Cairo)]} {. LoadTimeZoneFile Africa/Cairo.}.set TZData(:Egypt) $TZData(:Africa/Cairo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):167
              Entropy (8bit):4.85316662399069
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV5QH+owFVAIgoq6QH7W6yMQs/h8QanQHpn:SlSWB9IZaM3ymnQeowFVAIgonQbNyM/R
              MD5:AA0DEB998177EB5208C4D207D46ECCE3
              SHA1:DD8C7CE874EE12DD77F467B74A9C8FC74C7045FF
              SHA-256:16A42F07DE5233599866ECC1CBB1FC4CD4483AC64E286387A0EED1AFF919717D
              SHA-512:D93A66A62304D1732412CAAAB2F86CE5BCD07D07C1315714D81754827D5EFD30E36D06C0DC3CF4A8C86B750D7D6A144D609D05E241FADC7FF78D3DD2044E4CBB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Dublin)]} {. LoadTimeZoneFile Europe/Dublin.}.set TZData(:Eire) $TZData(:Europe/Dublin).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):105
              Entropy (8bit):4.883978227144926
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDMWkXGm2OHvDd:SlSWB9X5yRQCm2OHB
              MD5:94CDB0947C94E40D59CB9E56DB1FA435
              SHA1:B73907DAC08787D3859093E8F09828229EBAA6FD
              SHA-256:17AF31BD69C0048A0787BA588AD8641F1DC000A8C7AEC66386B0D9F80417ABBF
              SHA-512:5F47A2864F9036F3FD61FC65ED4969330DD2A1AC237CB2BD8E972DDFED75120D8D377D5C84060015DCFC163D03F384DC56DC8C6F29E65528C04F1FDA8BBC688E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT) {. {-9223372036854775808 0 0 GMT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):154
              Entropy (8bit):4.862090278972909
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDOm7/8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRSw8RQvn
              MD5:4AC2027A430A7343B74393C7FE1D6285
              SHA1:C675A91954EC82EB67E1B7FA4B0C0ED11AAF83DA
              SHA-256:01EEF5F81290DBA38366D8BEADAD156AAC40D049DBFA5B4D0E6A6A8641D798D1
              SHA-512:61943A348C4D133B0730EAA264A15EF37E0BBE2F767D87574801EAAA9A457DA48D854308B6ABADA21D33F4D498EB748BCB66964EB14BB8DC1367F77A803BA520
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT+0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.936955816757987
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOvedSXGm2OH1VOY:SlSWB9X5yRSvwJm2OH1VOY
              MD5:B8D9D5AF8CE887722F92207393F93481
              SHA1:3F33F97F96AE9C30A616B8A84888B032A3E1A59A
              SHA-256:049ABD0DCEC9C4128FF6F5BBB1F1D64F53AB7E4A1BD07D0650B0B67D1F581C64
              SHA-512:7A10D28DA75FCBF5AF43FEECB91801E97CB161A6909E9463A2F1218323EE3B4ECA10E11438D20E876B6EF912E21D26264FFBD04C75D702D2386A4E959EB5FFAC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+1) {. {-9223372036854775808 -3600 0 -01}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):113
              Entropy (8bit):4.92045957745591
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOgFkXGm2OH1VYU8Cn:SlSWB9X5yRS0m2OH1VYQn
              MD5:33022DF11BC5459AA1DD968CEF24EA03
              SHA1:45DE6AD3B142C1768B410C047DFD45444E307AB8
              SHA-256:15F72B4F2C04EDDC778AAD999B5A329F55F0D10AC141862488D2DCE520541A85
              SHA-512:0C13040965135D199A29CFE8E1598AA8E840B141B85CCF1A45611B367AF046107FDA8478B1779E2AC665534DC4E84630267B42F902DB3A2CB78DD6D20939010E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+10) {. {-9223372036854775808 -36000 0 -10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):113
              Entropy (8bit):4.959312316620187
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOeLXGm2OHaBBKn:SlSWB9X5yRShm2OHa7Kn
              MD5:5FC01E15A719B73A5AA5B0A6E7F16B0C
              SHA1:E1AAEF7C52DF944A9AEDCC74E6A07FABE09BAFCE
              SHA-256:69A82F9EB9E120FABFA88C846BC836B85A08FFF4B304914256E6C3A72CB371D0
              SHA-512:86659001C159730C012C385D505CD822F5CE6E59C0BD7899F90070372A56D348F0292F74C34A4E960E721D113DB5F65751A513D7C1A3CFBF09CBA22118323DED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+11) {. {-9223372036854775808 -39600 0 -11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):113
              Entropy (8bit):4.934932781202811
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOK/kXGm2OH3FNyU7n:SlSWB9X5yRSKTm2OH3Xyan
              MD5:BEE0C510C41F541B4E919183459488B2
              SHA1:DA028394973155C52EDDDB4EB4CCACA7F3A74188
              SHA-256:3B3DA9CF6FEB6E90772E9EC391D857D060A2F52A34191C3A0472794FEC421F5F
              SHA-512:9EBE1FAD2B47DDA627F52F97094556F3A8C0D03BF2DD4C12CC8611BD2D59FE3A2C1016FFBDF0B95F2C5C56D81C8B2020EBF1D2AB4AAAFE33AB5469AFE1C596A1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+12) {. {-9223372036854775808 -43200 0 -12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.876100974396153
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOcFwFFkXGm2OHnFQVIK:SlSWB9X5yRS0wTm2OHnFQV7
              MD5:316ED84A4318F8641592A0959395EFA3
              SHA1:970C97E6F433524BE88031098DD4F5F479FB4AA6
              SHA-256:8323CA90E2902CAAD2EBCFFBF681FC3661424AE5B179140581AA768E36639C93
              SHA-512:6DD62C72E24A24F8FCD8EC085942920A04A55DD03D54C712ADA2BE0EDD6166F34A1229E045C50384808735C40CF72B98458E0329B9762B4B3E95E7ACABB0017E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+2) {. {-9223372036854775808 -7200 0 -02}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.904010922708719
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOCcXGm2OHBFVGHC:SlSWB9X5yRSCTm2OHBFAHC
              MD5:899F1AAB147D5A13D7E22CBE374F3F8D
              SHA1:C132B5E0859EB6C95C64D50408D4A310893D1E8F
              SHA-256:3C2EF9B7218D133E7611527CE1CD5F03FF6FED5DE245F082FF21F4571A7D9EA4
              SHA-512:63C8F98BAE437BB9717A3D13C70424FBB43CBA392A1750DE8EAB31C825F190C5DE1987B391591361F80CE084896B838BE78CBE56C1E1C4DC0A1A6D280742FD91
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+3) {. {-9223372036854775808 -10800 0 -03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.92751033740291
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOqLXGm2OHBvG9:SlSWB9X5yRStm2OHBO9
              MD5:9D050C35FCDFD703C387CF2065E6250B
              SHA1:EEE8A277CB49D03085A5C6FCEA94961790D23339
              SHA-256:B43B685B6B168FD964590BC6C4264511155DB76EBCB7A5BCB20C35C0AD9B8CC4
              SHA-512:D56449C34A7F63DCCE79F4A6C4731454BB909C6DA49593FFE6B59DD3DE755720931BFD245A799B7FB1397FC0AE0AF89E88AD4DAA91AB815740328B27D301DCDE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+4) {. {-9223372036854775808 -14400 0 -04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.911642645675445
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOEkXGm2OHLVvyV9C:SlSWB9X5yRSQm2OHLVKV9C
              MD5:81856E9473F48AB0F53B09CB6BEF61B1
              SHA1:52A906EE5B706091E407CA8A0D036A46727790EA
              SHA-256:B0224DBA144B1FE360E2922B1E558E79F6960A173045DE2A1EDACDC3F24A3E36
              SHA-512:7C9679A2C299741E98FF1E759313D1CDC050B73B7E4FB097FF3186B4C35271C203D54E12D758675639A3D3F3F1EB43D768834B9CE7D22376BEA71FB0ACF164A7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+5) {. {-9223372036854775808 -18000 0 -05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.930765051479699
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOAkEXGm2OHvTmUK:SlSWB9X5yRSbLm2OHvin
              MD5:757E578CE6FCD34966D9FF90D9F9A7BF
              SHA1:091E3FC890BF7A4C61CF6558F7984FD41F61803B
              SHA-256:28F4E6F7FDE80AE412D364D33A1714826F9F53FF980D2926D13229B691978979
              SHA-512:442FEBA01108124692A0F76ACA4868D5B7754C3527B9301AC0271DD5A379AF3675CE40B6C017310856D4CE700E3171B5EEA5EF89D5F8432EC3D6D27F48F2EEE8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+6) {. {-9223372036854775808 -21600 0 -06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.884164328721898
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDONedFkXGm2OHrXVYVe:SlSWB9X5yRSNwJm2OHriVe
              MD5:723CE2E217F73927FE030E4E004C68B5
              SHA1:40E46C8F3631298C3FFBF0DDC72E48E13A42A3F4
              SHA-256:2D2B6A351501CB1023F45CE9B16B759D8971E45C2B8E1348A6935707925F0280
              SHA-512:25E1C37047CD2411B6F986F30EC54B53A3D3841FD275D05732A0DF6C0718981F2343CEE77E241F347030244B22EC4A23FDEE077EB4D18BC1788F4E5AF4FDB804
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+7) {. {-9223372036854775808 -25200 0 -07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.869188292977557
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOOFwFSXGm2OHmFvGRvn:SlSWB9X5yRSqwTm2OHaOJ
              MD5:A94A70486CE0942B538D855647EDFE78
              SHA1:1A20872C6D577DB332F0A536695CE677BC28F294
              SHA-256:9CF2C86CC6173F19E0DA78CCA46C302469AB5C01752DCEA6A20DC151E2D980CC
              SHA-512:3B6456D217A08A6DBAC0DB296384F4DED803F080FD5C0FD1527535D85397351C67B3D2BEDF8C4E2FEFD5C0B9297A8DA938CF855CDAA2BB902498B15E75A0F776
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+8) {. {-9223372036854775808 -28800 0 -08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.912907908622555
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDOwcXGm2OHNmuvn:SlSWB9X5yRSwTm2OHNmuv
              MD5:821C0743B99BBD9B672D1B1606B2DADD
              SHA1:152C09F6E8079A4036BA8316BE3E739D2ECE674B
              SHA-256:532D16E2CDBE8E547F54DC22B521153D2215E8B6653336A36F045E0D338B0D1B
              SHA-512:CCFC5BC6246B4C9EF77081E79F0A0B1DACC79449388AD08F38912E857E77E12824835C447F769A2C9C707C7E6353010A9907CDF3468A94263CF2B21FC1BF4710
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+9) {. {-9223372036854775808 -32400 0 -09}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):154
              Entropy (8bit):4.849103265985896
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDIyHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRUyJ8RQvn
              MD5:FA608B6E2F9D0E64D2DF81B277D40E35
              SHA1:55A7735ACCF6A759D2069388B2943323E23EE56D
              SHA-256:48A929080C1E7C901246DC83A7A7F87396EAF9D982659460BF33A85B4C3FAE64
              SHA-512:35A8899B7084E85165886B07B6DD553745558EAF4297F702829A08BF71E5AA18790F0D02229093FA42515C97A1DDA7292F4D019DDB1251370D9896E94738D32A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT-0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):110
              Entropy (8bit):4.936514686189307
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDI4cXGm2OHMKUbvn:SlSWB9X5yRU4Tm2OHtUbv
              MD5:CCC4BDA6EDA4933FB64F329E83EB6118
              SHA1:7C1B47D376966451540B4D095D16973763A73A73
              SHA-256:A82AA68616ADEB647456EA641587D76981888B3A022C98EA11302D458295A4FA
              SHA-512:ACC3DF6AA6025B45F06326062B2F0803BB6FD97AAAEBB276731E5DC5C496731C0853D54B2A4476A4A2EC2DD4FFDF69D78255FC8BCAB2412CE86925A94CE0559D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-1) {. {-9223372036854775808 3600 0 +01}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.919647975606158
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDINFedFkXGm2OHMUUJv:SlSWB9X5yRUNCm2OHXQ
              MD5:566FBA546E6B7668830D1812659AE671
              SHA1:EF3AF5CE0BB944973D5B2DCC872903F0C3B7F0FF
              SHA-256:962E810E02BAE087AD969FEB91C07F2CBB868D09E1BA4A453EB4773F7897157A
              SHA-512:F42BB5ACDE563A8A875D7B3F1C10CE9A5CE7E52FA9EF2D14BDA2C45BCD5A6D9B44227D079853551BAA13EAED32F4CA3C34BAD88E616B528DEF7DFAE7F42929CB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-10) {. {-9223372036854775808 36000 0 +10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.958847614227257
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIVEXGm2OHlVVmv:SlSWB9X5yRUVLm2OHlVAv
              MD5:02F46CC589D114C57B5687A703EB11C6
              SHA1:5199683CC7E5D18ED686B44E94FB72EA8C978A9A
              SHA-256:B1BEE376A0CBEA180391835DB97F8EB32873B2B58AD1AA1098E79FAC357799C5
              SHA-512:A0CDDCD3208D096712868FED0557CDF5FEC5E9FA5FB25864129D2A9047BCD1AFAA8270C1E41368D32DE2A7B1B66157BDCFC17F8CDF3EF6A9F0C74B42814B096F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-11) {. {-9223372036854775808 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.934250404386511
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIjWkXGm2OHwvv0UIvYv:SlSWB9X5yRUjCm2OHwvv0a
              MD5:F6AF5C34BDE9FFF73F8B9631C0173EE9
              SHA1:A717214203F4B4952AE12374AE78992084CD5A61
              SHA-256:622E51EE9D4601DB90818F4B8E324F790F4D2405D66B899FC018A41E00473C0F
              SHA-512:0B898328A19DA7FE1BD2FB161EF1511684B569E4262C8149A789855C6F86C84360BC9E6BF82BC571BD7C585A30E0658560029FCC7C3C180BC0D2EA1872860753
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-12) {. {-9223372036854775808 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.951215891260531
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIsXGm2OH1dNv74v:SlSWB9X5yRUjm2OHmv
              MD5:B505D6A064B6D976BD1BDE61AE937F1C
              SHA1:DBA0EA8DCCB50CC999397129369A340CA8A4C5B5
              SHA-256:EF28D4D6DAFE3AB08BE1CE9C32FAF7BF8F750332DF0D39314131F88DF463DFAC
              SHA-512:86A4CA670FBFFF95C9B22DA4E8957A4BE8A805457032AF47BDF08B5047881F692D665BEF8A76045EF50587149EDD52C8994A19CEE9675A3D12939D9CB9DE4649
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-13) {. {-9223372036854775808 46800 0 +13}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):112
              Entropy (8bit):4.946259136243175
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIxmcXGm2OH0FVtQCn:SlSWB9X5yRUxmTm2OH8Jn
              MD5:6BD2D15FA9AAF7F44D88BED0F6C969F3
              SHA1:3080291F9C9C9422995583175C560338F626E4CD
              SHA-256:748D443DA743D385497A43198A114BD8349310494ECC85F47D39745D53F6E291
              SHA-512:651983293BAD1EDE1211EEAA3CAA28C73F84FFE2B8554CF198DF014BEF6B7413C4C49C3080FC73430804ECCA3D2BDB316B6B735B72E7BA3525B330E6A5352715
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-14) {. {-9223372036854775808 50400 0 +14}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):110
              Entropy (8bit):4.8751066179878215
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDInHkXGm2OH/VXCYvn:SlSWB9X5yRUnLm2OH/VSC
              MD5:DAE7D42076F09E2E2A51A58CC253837D
              SHA1:44C587A71AE31A7424E0F2B005D11F9E0B463E80
              SHA-256:9D0D3FAD960E9EBF599218213F3AE8A22766B6CB15C8CDBC7ABD8A3FFD75C29A
              SHA-512:CEE724EEC6EC86FB417CD4D06B3FC17A404953CCE8740A03B024C05C0436340D9B056F3F1B2706284F57CC49FA229EE311D088AFE3D65F0BF946B0A18282ED46
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-2) {. {-9223372036854775808 7200 0 +02}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.903159871492102
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIYdSXGm2OHkNsWYAvn:SlSWB9X5yRUGJm2OHkKWYAv
              MD5:3CABCADD8398567F6489C263BF55CA89
              SHA1:0981F225619E92D4B76ECB2C6D186156E46DA63D
              SHA-256:74EEBD9C48312D68DC5E54B843FACF3DB869E214D37214F1096AF1D6ECF6D9AF
              SHA-512:1FF86CFDAA407D7EFD0B0DBC32FC8ED03DAADF6D0D83463B4C6DA97B4B8D77FC381C4C140168AA06FA9A5444DDADBB39DBD8F22E4570EE86F2F7608AAFB0C7FC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-3) {. {-9223372036854775808 10800 0 +03}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.92687099262498
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIbSXGm2OHkVsRYvC:SlSWB9X5yRUtm2OHkSQC
              MD5:C157F79ADE92A69E46472EA921E1370F
              SHA1:4B9E5AFA769D5BDF3FDF05BC24A6A632C6D86ECB
              SHA-256:0606FBAB9374A74D4B2ED17DD04D9DCED7131768CCF673C5C3B739727743383F
              SHA-512:B6814282465ABF4DF31341306050F11ECAAFC5915C420A8E7F8D787E66308C58FF7C348D6CBDB4064C346800564000C7C763BDD01CB8CE3A8A81550F65C9A74C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-4) {. {-9223372036854775808 14400 0 +04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.91086034871979
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDI7wkXGm2OHM0VQL:SlSWB9X5yRU7Em2OHnVQL
              MD5:AF742680C5A3BA5981DD7F0646EF6CCA
              SHA1:0753749D4636D561A8942BB1641BDBCC42349A9B
              SHA-256:5E2D90AF8A161D47F30E1C4A0F5E1CAB5E9F24201557864A02D3009B1ECFEDE0
              SHA-512:9B738675FC02613929BF90A7C78DD632AB782D20B5E660578AB590858D22BCD79E5AFB191D41E9DF94E2E586B5D2A163AB7D8364A02A5DE60E5B838F8B85D2FD
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-5) {. {-9223372036854775808 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.930155028450208
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIgwcXGm2OHETNSTL:SlSWB9X5yRUgwTm2OHETMn
              MD5:298F4671F470C4628B3174D5D1D0608D
              SHA1:5626202FB7186B4555C03F94CEE38AD0FAB81F40
              SHA-256:19760989015244E4F39AC12C07E6665038AE08282DAF8D6DB0BB5E2F642C922D
              SHA-512:F81B901249D3FAED3805471F256F55463A7A2FC8CB612FF95E698D63F9609D5D1B3B57DD87021C5DD809D971709EC3831351D54E971E25643B67161E9EAD5E25
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-6) {. {-9223372036854775808 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.883134479361256
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIu/kXGm2OHAXUVSYvC:SlSWB9X5yRUuTm2OHAXUVSYvC
              MD5:2317D02708980D7F17B1A4BDE971D15F
              SHA1:2E78CDE3608F6B03DEB534D14D069D3D89DE85EF
              SHA-256:0BF01EEEBAA49CE9859C2A5835C6A826B158A7BC3B14C473FBB0167ABA9EA4B9
              SHA-512:21083EAEACD689FD07D458DB82BC2559445A1C558EB8BAF098B71CFD3A599BB756336F847CBE536648AF473E22E0000B2A8C44A45D0866994F03A78D4E841FC5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-7) {. {-9223372036854775808 25200 0 +07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.8680235243759755
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIlEXGm2OHN/VsdYK:SlSWB9X5yRUlLm2OHUJ
              MD5:B940D187558341DBF4D619248C13C7CA
              SHA1:0C6B11AA9DBC0A395345F79B4B7325FBE870A414
              SHA-256:DAB4C0E14D2850BF917C5891E864834CA4BFD38D5470F119F529582976551862
              SHA-512:042176822D8BFD72FFC0727176596430B656E4986636E9869F883B7078389F936EFA8CCFA9BA7ED0963899BD7D134DB9CD25F24C42040781CC37F2701D0CA28A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-8) {. {-9223372036854775808 28800 0 +08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):111
              Entropy (8bit):4.91213701043219
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRDIedSXGm2OHENScCC:SlSWB9X5yRUwJm2OHsScCC
              MD5:DD58339761ECF5503A48267CFD8E3837
              SHA1:B58511A80448D74B38365EA537BBE0D21956F0E2
              SHA-256:383EFE43E20963058BFCD852813BDA3FCCC0B4A7AC26317E621589B4C97C1B90
              SHA-512:C865244051882FD141D369435CFEED0A1E1D254C0313C1EFE55F5AF72412BE11F2B76484170B94BC4E9FCC0D2EEC373D523732FF7945999717D5827FCE68F54F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-9) {. {-9223372036854775808 32400 0 +09}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):153
              Entropy (8bit):4.836974611939794
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDVMFHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRC1p8RQvn
              MD5:BE8C5C3B3DACB97FADEB5444976AF56A
              SHA1:A0464B66E70A1AF7963D2BE7BC1D88E5842EC99A
              SHA-256:89F4624DC69DE64B7AF9339FE17136A88A0C28F5F300575540F8953B4A621451
              SHA-512:A0E11D9DF5AD2C14A012E82F24298921780E091EEDD680535658F9CD1337A4103BA0676DF9B58865DD7D2CFA96AEED7BF786B88786FAF31B06713D61B4C0308A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):158
              Entropy (8bit):4.862741414606617
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRp+FB5yRDMvn:SlSWB9IZaM3yF4FVAIgJtyRp6BURQvn
              MD5:2DADDAD47A64889162132E8DA0FFF54F
              SHA1:EC213743939D699A4EE4846E582B236F8C18CB29
              SHA-256:937970A93C2EB2D73684B644E671ACA5698BCB228810CC9CF15058D555347F43
              SHA-512:CA8C45BA5C1AF2F9C33D6E35913CED14B43A7AA37300928F14DEF8CB5E7D56B58968B9EE219A0ACCB4C17C52F0FBD80BD1018EF5426C137628429C7DAA41ACA2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/Greenwich) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):105
              Entropy (8bit):4.857741203314798
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yR5FkXGm2OHv1CCn:SlSWB9X5yRHm2OHNLn
              MD5:415F102602AFB6F9E9F2B58849A32CC9
              SHA1:002C7D99EBAA57E8599090CFBF39B8BEAABE4635
              SHA-256:549D4CC4336D35143A55A09C96FB9A36227F812CA070B2468BD3BB6BB4F1E58F
              SHA-512:6CA28E71F941D714F3AACA619D0F4FEEF5C35514E05953807C225DF976648F257D835B59A03991D009F738C6FD94EB50B4ECA45A011E63AFDCA537FBAC2B6D1B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/UCT) {. {-9223372036854775808 0 0 UCT}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):105
              Entropy (8bit):4.857741203314798
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5yRF3dFkXGm2OHvr:SlSWB9X5yR9dJm2OHj
              MD5:6343442DDDC19AF39CADD82AC1DDA9BD
              SHA1:9D20B726C012F14D99E701A69C60F81CB33E9DA6
              SHA-256:48B88EED5EF95011F41F5CA7DF48B6C71BED711B079E1132B2C1CD538947EF64
              SHA-512:4CFED8C80D9BC2A75D4659A14F22A507CF55D3DCC88318025BCB8C99AE7909CAF1F11B1ADC363EF007520BF09473CB68357644E41A9BBDAF9DB0B0A44ECC4FBF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/UTC) {. {-9223372036854775808 0 0 UTC}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):158
              Entropy (8bit):4.825049978035721
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLyRYzXDJMFfh8RFu:SlSWB9IZaM3yzUFVAIgBLyRY7VMr8RI
              MD5:7BE0766999E671DDD5033A61A8D84683
              SHA1:D2D3101E78919EB5FE324FFC85503A25CFD725E0
              SHA-256:90B776CF712B8FE4EEC587410C69A0EC27417E79006132A20288A9E3AC5BE896
              SHA-512:A4CA58CD4DC09393BBE3C43D0B5E851DEBEEDC0C5CEC7DCED4D24C14796FD336D5607B33296985BD14E7660DCE5C85C0FB625B2F1AD9AC10F1631A76ECEB04B8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Etc/Universal) $TZData(:Etc/UTC).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):153
              Entropy (8bit):4.824450775594084
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLyRaQEBURFu:SlSWB9IZaM3yzUFVAIgBLyRYaRI
              MD5:64ED445C4272D11C85BD2CFC695F180F
              SHA1:EDE76B52D3EEBCC75C50E17C053009A453D60D42
              SHA-256:A68D32DA2214B81D1C0C318A5C77975DE7C4E184CB4D60F07858920B11D065FE
              SHA-512:4CE8FC2B7C389BD2058CE77CD7234D4EA3F81F40204C9190BF0FB6AA693FB40D0638BFB0EB0D9FA20CB88804B73F6EE8202439C1F553B1293C6D2E5964216A1D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Etc/Zulu) $TZData(:Etc/UTC).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8792
              Entropy (8bit):3.8152682180965747
              Encrypted:false
              SSDEEP:96:nK5UUH6mek6EvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVab:K5VfSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:C107BB0AC411789418982B201FF1F857
              SHA1:71691B3E9FCC3503943BAFD872A881C1F1EE8451
              SHA-256:2794B605AE149FFB58D88508A663BB54034FD542BF14B56DAE62801971612F5B
              SHA-512:BFC79B3245526ED54615F613D3158DC4CF44DAF3DB758DBA65977EC91263CEFFA628D36E7CA536E140AF727EC321D9047C36D56303718D1EC5B49F5A8BCAE2E9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Amsterdam) {. {-9223372036854775808 1172 0 LMT}. {-4260212372 1172 0 AMT}. {-1693700372 4772 1 NST}. {-1680484772 1172 0 AMT}. {-1663453172 4772 1 NST}. {-1650147572 1172 0 AMT}. {-1633213172 4772 1 NST}. {-1617488372 1172 0 AMT}. {-1601158772 4772 1 NST}. {-1586038772 1172 0 AMT}. {-1569709172 4772 1 NST}. {-1554589172 1172 0 AMT}. {-1538259572 4772 1 NST}. {-1523139572 1172 0 AMT}. {-1507501172 4772 1 NST}. {-1490566772 1172 0 AMT}. {-1470176372 4772 1 NST}. {-1459117172 1172 0 AMT}. {-1443997172 4772 1 NST}. {-1427667572 1172 0 AMT}. {-1406672372 4772 1 NST}. {-1396217972 1172 0 AMT}. {-1376950772 4772 1 NST}. {-1364768372 1172 0 AMT}. {-1345414772 4772 1 NST}. {-1333318772 1172 0 AMT}. {-1313792372 4772 1 NST}. {-1301264372 1172 0 AMT}. {-1282256372 4772 1 NST}. {-1269814772 1172 0 AMT}. {-1250720372 4772 1 NST}. {-123836517
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6690
              Entropy (8bit):3.730744509734253
              Encrypted:false
              SSDEEP:96:u7rRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:uXRNH4Mn82rlo6XIZ9ALeBO
              MD5:13F10BC59FB9DBA47750CA0B3BFA25E9
              SHA1:992E50F4111D55FEBE3CF8600F0B714E22DD2B16
              SHA-256:E4F684F28AD24B60E21707820C40A99E83431A312D26E6093A198CB344C249DC
              SHA-512:DA5255BDE684BE2C306C6782A61DE38BFCF9CFF5FD117EBDE5EF364A5ED76B5AB88E6F7E08337EEB2CEC9CB03238D9592941BDAA01DFB061F21085D386451AFA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Andorra) {. {-9223372036854775808 364 0 LMT}. {-2177453164 0 0 WET}. {-733881600 3600 0 CET}. {481078800 7200 0 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST}. {749005200 3600 0 CET}. {764730000 7200 1 CEST}. {780454800 3600 0 CET}. {796179600 7200 1 CEST}. {811904400 3600 0 CET}. {828234000 7200 1 CEST}. {846378000 3600 0 CET}. {859683600 7200 1 CEST}. {877827600 3600 0 CET}. {891133200 7200 1 CEST}. {909277200 3600 0 CET}. {922582800 7200 1 CEST}. {941331600 3600 0 CET}. {9540
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1992
              Entropy (8bit):3.5867428099003957
              Encrypted:false
              SSDEEP:24:ce0exLWtjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUH9mt:iDTZVemFLN7NBx333+ix6b0JiGef
              MD5:103F48F9DDAC5D94F2BECDA949DE5E50
              SHA1:0582454439DD4E8D69E7E8EE9B8A3F041F062E89
              SHA-256:823A0A0DBA01D9B34794EB276F9ABB9D2EC1E60660B20EAA2BA097884E3934F2
              SHA-512:7419A8F5CF49BE76D7CD7D070FF4467CED851EC76E38A07BD590ED64B96DA446968195096DE2F8298C448778E0A40CAE717C8F234CCDBDF5C3C21B7D056EA4C1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Astrakhan) {. {-9223372036854775808 11532 0 LMT}. {-1441249932 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {7961724
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7686
              Entropy (8bit):3.635151038354021
              Encrypted:false
              SSDEEP:96:JAK3+9wAuy+Hk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2l:JAKOK1XPzh2kNU4tB715pyzHy1gA
              MD5:D64695F05822EF0DF9E3762A1BC440A0
              SHA1:F17F03CFD908753E28F2C67D2C8649B8E24C35F7
              SHA-256:118289C1754C06024B36AE81FEE96603D182CB3B8D0FE0A7FD16AD34DB81374D
              SHA-512:3C5BDE2004D6499B46D9BAB8DBFDCC1FC2A729EEA4635D8C6CB4279AEE9B5655CE93D2E3F09B3E7295468007FFB5BE6FEC5429501E8FB4D3C2BCC05177C2158A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Athens) {. {-9223372036854775808 5692 0 LMT}. {-2344642492 5692 0 AMT}. {-1686101632 7200 0 EET}. {-1182996000 10800 1 EEST}. {-1178161200 7200 0 EET}. {-906861600 10800 1 EEST}. {-904878000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844477200 7200 1 CEST}. {-828237600 3600 0 CET}. {-812422800 7200 0 EET}. {-552362400 10800 1 EEST}. {-541652400 7200 0 EET}. {166485600 10800 1 EEST}. {186184800 7200 0 EET}. {198028800 10800 1 EEST}. {213753600 7200 0 EET}. {228873600 10800 1 EEST}. {244080000 7200 0 EET}. {260323200 10800 1 EEST}. {275446800 7200 0 EET}. {291798000 10800 1 EEST}. {307407600 7200 0 EET}. {323388000 10800 1 EEST}. {338936400 7200 0 EET}. {347148000 7200 0 EET}. {354675600 10800 1 EEST}. {370400400 7200 0 EET}. {386125200 10800 1 EEST}. {401850000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {4490
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.827362756219521
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQahs3QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUy70U
              MD5:19134F27463DEDF7E25BC72E031B856F
              SHA1:40D9E60D26C592ED79747D1253A9094FCDE5FD33
              SHA-256:5D31D69F259B5B2DFE016EB1B2B811BD51A1ED93011CBB34D2CF65E4806EB819
              SHA-512:B80202194A9D547AEC3B845D267736D831FB7E720E171265AC3F0074C8B511518952BF686A235E6DDEFC11752C3BD8A48A184930879B68980AC60E9FAECBFB44
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Belfast) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7059
              Entropy (8bit):3.733102701717456
              Encrypted:false
              SSDEEP:96:TX6TRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:TWRNH4Mn82rlo6XIZ9ALeBO
              MD5:841E21EED6229503BF41A858601453B0
              SHA1:6F5632B23F2C710106211FBCD2C17DC40B026BFB
              SHA-256:813B4B4F13401D4F92B0F08FC1540936CCFF91EFD8B8D1A2C5429B23715C2748
              SHA-512:85863B12F17A4F7FAC14DF4D3AB50CE33C7232A519F7F10CC521AC0F695CD645857BD0807F0A9B45C169DD7C1240E026C567B35D1D157EE3DB3C80A57063E8FE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Belgrade) {. {-9223372036854775808 4920 0 LMT}. {-2713915320 3600 0 CET}. {-905824800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-777942000 7200 1 CEST}. {-766623600 3600 0 CET}. {407199600 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CES
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7746
              Entropy (8bit):3.733442486698092
              Encrypted:false
              SSDEEP:96:hgt67dAtcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:hiGRNH4Mn82rlo6XIZ9ALeBO
              MD5:D1E45A4660E00A361729FCD7413361C1
              SHA1:BCC709103D07748E909DD999A954DFF7034F065F
              SHA-256:EAD23E3F58706F79584C1F3F9944A48670F428CACBE9A344A52E19B541AB4F66
              SHA-512:E3A0E6B4FC80A8D0215C81E95F9D3F71C0D9371EE0F6B2B7E966744C42FC64055370D322918EEA2917BFBA07030629C4493ADA257F9BD9C9BF6AD3C4A7FB1E70
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Berlin) {. {-9223372036854775808 3208 0 LMT}. {-2422054408 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-776559600 10800 0 CEMT}. {-765936000 7200 1 CEST}. {-761180400 3600 0 CET}. {-757386000 3600 0 CET}. {-748479600 7200 1 CEST}. {-733273200 3600 0 CET}. {-717631200 7200 1 CEST}. {-714610800 10800 1 CEMT}. {-710380800 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.89628096026481
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVtXrAevFVAIgoquXrELyQahcvEB5yQazXrY:SlSWB9IZaM3ymzbAevFVAIgozbELy7cY
              MD5:7C0606BC846344D78A85B4C14CE85B95
              SHA1:CEDFDC3C81E519413DDD634477533C89E8AF2E35
              SHA-256:D7DF89C23D2803683FE3DB57BF326846C9B50E8685CCCF4230F24A5F4DC8E44E
              SHA-512:8F07791DE5796B418FFD8945AE13BAB1C9842B8DDC073ED64E12EA8985619B93472C39DD44DA8FAEF5614F4E6B4A9D96E0F52B4ECA11B2CCA9806D2F8DDF2778
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Prague)]} {. LoadTimeZoneFile Europe/Prague.}.set TZData(:Europe/Bratislava) $TZData(:Europe/Prague).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8907
              Entropy (8bit):3.75854119398076
              Encrypted:false
              SSDEEP:96:BMlf+jdXtSYv9HMn2vDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHL:BMQSY1RSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:FA802B103E8829C07AE7E05DE7F3CD1F
              SHA1:46AFB26E3E9102F0544C5294DA67DC41E8B2E8FC
              SHA-256:AEB5860C2F041842229353E3F83CC2FEBC9518B115F869128E94A1605FB4A759
              SHA-512:488CE6B524071D2B72F8AD73C2DC00F5F4C1C3C93F91165BDA0BCCB2B2C644B792C4220B785E84835ABE81584FDC87A1DCDA7679A69318052C3854167CB43C61
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Brussels) {. {-9223372036854775808 1050 0 LMT}. {-2840141850 1050 0 BMT}. {-2450953050 0 0 WET}. {-1740355200 3600 0 CET}. {-1693702800 7200 0 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1613826000 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585530000 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1473642000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301263200 0 0 WET}. {-1284328800 3600 1 WEST}. {-126
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7706
              Entropy (8bit):3.6365022673390808
              Encrypted:false
              SSDEEP:96:nQrdI+sYixX215VaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:nQrbEm1Oh2kNU4tB715pyzHy1gA
              MD5:79AAB44507DD6D06FA673CA20D4CF223
              SHA1:A2F1AA0E3F38EF24CD953C6B5E1EC29EA3EDB8C0
              SHA-256:C40DC0C9EE5FFF9F329823325A71F3F38BE940F159E64E0B0CED27B280C1F318
              SHA-512:BBEBB29FFD35A1F8B9D906795032976B3F69A0097ED7D764E3EB45574E66641C35F9006B3295FB090472FF5C09FC4D88D9249E924011A178EFB68D050AA6F871
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Bucharest) {. {-9223372036854775808 6264 0 LMT}. {-2469404664 6264 0 BMT}. {-1213148664 7200 0 EET}. {-1187056800 10800 1 EEST}. {-1175479200 7200 0 EET}. {-1159754400 10800 1 EEST}. {-1144029600 7200 0 EET}. {-1127700000 10800 1 EEST}. {-1111975200 7200 0 EET}. {-1096250400 10800 1 EEST}. {-1080525600 7200 0 EET}. {-1064800800 10800 1 EEST}. {-1049076000 7200 0 EET}. {-1033351200 10800 1 EEST}. {-1017626400 7200 0 EET}. {-1001901600 10800 1 EEST}. {-986176800 7200 0 EET}. {-970452000 10800 1 EEST}. {-954727200 7200 0 EET}. {296604000 10800 1 EEST}. {307486800 7200 0 EET}. {323816400 10800 1 EEST}. {338940000 7200 0 EET}. {354672000 10800 0 EEST}. {370396800 7200 0 EET}. {386121600 10800 1 EEST}. {401846400 7200 0 EET}. {417571200 10800 1 EEST}. {433296000 7200 0 EET}. {449020800 10800 1 EEST}. {465350400 7200 0 EET}. {481075200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7975
              Entropy (8bit):3.7352769955376464
              Encrypted:false
              SSDEEP:96:ZpduGm56n0PcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:ZpMypRNH4Mn82rlo6XIZ9ALeBO
              MD5:25864F8E5372B8E45B71D08667ED093C
              SHA1:83463D25C839782E2619CD5BE613DA1BD08ACBB5
              SHA-256:EF5CF8C9B3CA3F772A9C757A2CC1D561E00CB277A58E43ED583A450BBA654BF1
              SHA-512:0DAB3CA0C82AA80A4F9CC04C191BE180EB41CCF87ADB31F26068D1E6A3A2F121678252E36E387B589552E6F7BA965F7E3F4633F1FD066FC7849B1FD554F39EC7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Budapest) {. {-9223372036854775808 4580 0 LMT}. {-2500938980 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1640998800 3600 0 CET}. {-1633212000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1600466400 7200 1 CEST}. {-1581202800 3600 0 CET}. {-906771600 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-778471200 7200 1 CEST}. {-762660000 3600 0 CET}. {-749689200 7200 1 CEST}. {-733359600 3600 0 CET}. {-717634800 7200 1 CEST}. {-701910000 3600 0 CET}. {-686185200 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {-621990000 7200 1 CEST}. {-605660400 3600 0 CET}. {-492656400 7200 1 CEST}. {-481168800 3600 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.905738881351689
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVnCMPwVAIgoqkCMJW6yQahDZALMFB5h8Qa5CMP:SlSWB9IZaM3ym5XwVAIgo5Py7D17/8jH
              MD5:811B7E0B0EDD151E52DF369B9017E7C0
              SHA1:3C17D157A626F3AD7859BC0F667E0AB60E821D05
              SHA-256:221C8BA73684ED7D8CD92978ED0A53A930500A2727621CE1ED96333787174E82
              SHA-512:7F980E34BBCBC65BBF04526BF68684B3CE780611090392560569B414978709019D55F69368E98ADADC2C47116818A437D5C83F4E6CD40F4A1674D1CF90307CB5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Zurich)]} {. LoadTimeZoneFile Europe/Zurich.}.set TZData(:Europe/Busingen) $TZData(:Europe/Zurich).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7824
              Entropy (8bit):3.674889638637008
              Encrypted:false
              SSDEEP:96:J2rdkayurpKXlGYtXfVA6bN3E48WLCtSYxUFtj2DVXvR2YuXOZp+eiXGEsTVVHU:J2r6G81T9bN3E48GCujWYqK
              MD5:92966EE642028D4C44C90F86CA1440AA
              SHA1:95F286585FF3A880F2F909E82F4C22C8F1D12BE3
              SHA-256:E92FFABF4705F93C2A4AD675555AEBC3C9418AC71EEB487AF0F7CD4EAB0431CE
              SHA-512:1D6018C83CA5998C590448FE98C59F3FCD0D5D7688B679B7F3C82B6F3209F25323BB302BF847FCCBD950F08A79AF36CA83DBDD4DB8A3557A682152A6B731B663
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Chisinau) {. {-9223372036854775808 6920 0 LMT}. {-2840147720 6900 0 CMT}. {-1637114100 6264 0 BMT}. {-1213148664 7200 0 EET}. {-1187056800 10800 1 EEST}. {-1175479200 7200 0 EET}. {-1159754400 10800 1 EEST}. {-1144029600 7200 0 EET}. {-1127700000 10800 1 EEST}. {-1111975200 7200 0 EET}. {-1096250400 10800 1 EEST}. {-1080525600 7200 0 EET}. {-1064800800 10800 1 EEST}. {-1049076000 7200 0 EET}. {-1033351200 10800 1 EEST}. {-1017626400 7200 0 EET}. {-1001901600 10800 1 EEST}. {-986176800 7200 0 EET}. {-970452000 10800 1 EEST}. {-954727200 7200 0 EET}. {-927165600 10800 1 EEST}. {-898138800 7200 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-800154000 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {4179
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7458
              Entropy (8bit):3.736544358182077
              Encrypted:false
              SSDEEP:96:1Fpd6z8cRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyo:1FpoRNH4Mn82rlo6XIZ9ALeBO
              MD5:8FBF425E5833012C0A6276222721A106
              SHA1:78C5788ED4184A62E0E2986CC0F39EED3801AD76
              SHA-256:D2D091740C425C72C46ADDC23799FC431B699B80D244E4BCD7F42E31C1238EEB
              SHA-512:6DF08142EEBC7AF8A575DD7510B83DBD0E15DDA13801777684355937338CDA3D09E37527912F4EBBCC1B8758E3D65185E6006EB5C1349D1DC3AE7B6131105691
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Copenhagen) {. {-9223372036854775808 3020 0 LMT}. {-2524524620 3020 0 CMT}. {-2398294220 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680490800 3600 0 CET}. {-935110800 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 0 CEST}. {-769388400 3600 0 CET}. {-747010800 7200 1 CEST}. {-736383600 3600 0 CET}. {-715215600 7200 1 CEST}. {-706748400 3600 0 CET}. {-683161200 7200 1 CEST}. {-675298800 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9452
              Entropy (8bit):3.675115548319436
              Encrypted:false
              SSDEEP:192:fIfr7ZO/H8XKKRg3psTZ+wfAIt3/LIjzI9jJeK:fIHZO/Hk5RmpsT7/sjzI9jJeK
              MD5:D9787AD03D1A020F01FFF1F9AB346C09
              SHA1:C194A0A7F218ABBEB7DB53E3B2062DC349A8C739
              SHA-256:E1DCBC878C8937FBE378033AEE6B0D8C72827BE3D9C094815BFA47AF92130792
              SHA-512:4C596C9BDE55605381C9B6F90837BA8C9EA2992EBC7F3ACDC207CFAE7612E8B13415FD4962DC8D3FD2A75D98025D0E052B8B8486F6C31742D791C6A2C1D1827F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Dublin) {. {-9223372036854775808 -1500 0 LMT}. {-2821649700 -1521 0 DMT}. {-1691962479 2079 1 IST}. {-1680471279 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1517011200 0 0 IST}. {-1507500000 3600 1 IST}. {-1490565600 0 0 IST}. {-1473631200 3600 1 IST}. {-1460930400 0 0 IST}. {-1442786400 3600 1 IST}. {-1428876000 0 0 IST}. {-1410732000 3600 1 IST}. {-1396216800 0 0 IST}. {-1379282400 3600 1 IST}. {-1364767200 0 0 IST}. {-1348437600 3600 1 IST}. {-1333317600 0 0 IST}. {-1315778400 3600 1 IST}. {-1301263200 0 0 IST}. {-1284328800 3600 1 IST}. {-1269813600 0 0 IST}. {-1253484000 3600 1 IST}. {-1238364000 0 0 IST}. {-
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9181
              Entropy (8bit):3.7982744899840535
              Encrypted:false
              SSDEEP:96:i2elBN44y3UKdDDMjEZtcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIV0:i44y1xZGRNH4Mn82rlo6XIZ9ALeBO
              MD5:F8AEFE8F561ED7E1DC81117676F7D0E0
              SHA1:1148176C2766B205B5D459A620D736B1D28283AA
              SHA-256:FB771A01326E1756C4026365BEE44A6B0FEF3876BF5463EFAB7CF4B97BF87CFC
              SHA-512:7C06CB215B920911E0DC9D24F0DD6E24DEC3D75FB2D0F175A9B4329304C9761FFFEE329DD797FF4343B41119397D7772D1D3DFC8F90C1DE205380DE463F42854
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Gibraltar) {. {-9223372036854775808 -1284 0 LMT}. {-2821649916 0 0 GMT}. {-1691964000 3600 1 BST}. {-1680472800 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1507500000 3600 1 BST}. {-1490565600 0 0 GMT}. {-1473631200 3600 1 BST}. {-1460930400 0 0 GMT}. {-1442786400 3600 1 BST}. {-1428876000 0 0 GMT}. {-1410732000 3600 1 BST}. {-1396216800 0 0 GMT}. {-1379282400 3600 1 BST}. {-1364767200 0 0 GMT}. {-1348437600 3600 1 BST}. {-1333317600 0 0 GMT}. {-1315778400 3600 1 BST}. {-1301263200 0 0 GMT}. {-1284328800 3600 1 BST}. {-1269813600 0 0 GMT}. {-1253484000 3600 1 BST}. {-1238364000 0 0 GMT}. {-1221429600 3600 1 BST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.830450830776494
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQakQAL/yQavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUyYL5
              MD5:DC2B3CAC4AF70A61D0F4C53288CC8D11
              SHA1:A423E06F88FDEED1960AF3C46A67F1CB9F293CAF
              SHA-256:9CB6E6FEC9461F94897F0310BFC3682A1134E284A56C729E7F4BCE726C2E2380
              SHA-512:8B455DA1D1A7AA1259E6E5A5CF90E62BA8073F769DCB8EB82503F2DFB70AA4539A688DC798880339A2722AA1871E8C8F16D8827064A2D7D8F2F232880359C78D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Guernsey) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7120
              Entropy (8bit):3.635790220811118
              Encrypted:false
              SSDEEP:96:wQbXHk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ9A:w6XPzh2kNU4tB715pyzHy1gA
              MD5:E7A6AA8962067EF71174CD5AE79A8624
              SHA1:1250689DF0DFCCDD4B6B21C7867C4AA515D19ECD
              SHA-256:5FDBE427BC604FAC03316FD08138F140841C8CF2537CDF4B4BB20F2A9DFC4ECB
              SHA-512:5C590164499C4649D555F30054ECB5CF627CCCA8A9F94842328E90DD40477CADB1042D07EA4C368ABB7094D7A59A8C2EE7619E5B3458A0FAC066979B14AF44A6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Helsinki) {. {-9223372036854775808 5989 0 LMT}. {-2890258789 5989 0 HMT}. {-1535938789 7200 0 EET}. {-875671200 10800 1 EEST}. {-859773600 7200 0 EET}. {354672000 10800 1 EEST}. {370396800 7200 0 EET}. {386121600 10800 1 EEST}. {401846400 7200 0 EET}. {410220000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {449024400 10800 1 EEST}. {465354000 7200 0 EET}. {481078800 10800 1 EEST}. {496803600 7200 0 EET}. {512528400 10800 1 EEST}. {528253200 7200 0 EET}. {543978000 10800 1 EEST}. {559702800 7200 0 EET}. {575427600 10800 1 EEST}. {591152400 7200 0 EET}. {606877200 10800 1 EEST}. {622602000 7200 0 EET}. {638326800 10800 1 EEST}. {654656400 7200 0 EET}. {670381200 10800 1 EEST}. {686106000 7200 0 EET}. {701830800 10800 1 EEST}. {717555600 7200 0 EET}. {733280400 10800 1 EEST}. {749005200 7200 0 EET}. {764730000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.866592240835745
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQaqpfioxp8QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUycqO
              MD5:9E18F66C32ADDDBCEDFE8A8B2135A0AC
              SHA1:9D2DC5BE334B0C6AEA15A98624321D56F57C3CB1
              SHA-256:6A03679D9748F4624078376D1FD05428ACD31E7CABBD31F4E38EBCCCF621C268
              SHA-512:014BAD4EF0209026424BC68CBF3F5D2B22B325D61A4476F1E4F020E1EF9CD4B365213E01C7EC6D9D40FA422FE8FE0FADB1E4CBB7D46905499691A642D813A379
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Isle_of_Man) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3974
              Entropy (8bit):3.7140382290341214
              Encrypted:false
              SSDEEP:96:kICNapz9QnPPWDeP/vamdc2MKJ9k2gsh6YlnG:kuQnPo+CWJipP
              MD5:5F2F14127F11060A57C53565A24CB8F8
              SHA1:E79FC982C018CC7E3C29A956048ED3D0CFFE3311
              SHA-256:EAD62B6D04AA7623B9DF94D41E04C9E30C7BA8EB2CE3504105A0496A66EB87AE
              SHA-512:E709849DEF7F7CDAE3CA44F1939DF49D6FE5DE9C89F541343256FC0F7B9E55390AC496FF599D94B7F594D6BAE724AE4608A43F5870C18210525B061E801CC36B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Istanbul) {. {-9223372036854775808 6952 0 LMT}. {-2840147752 7016 0 IMT}. {-1869875816 7200 0 EET}. {-1693706400 10800 1 EEST}. {-1680490800 7200 0 EET}. {-1570413600 10800 1 EEST}. {-1552186800 7200 0 EET}. {-1538359200 10800 1 EEST}. {-1522551600 7200 0 EET}. {-1507514400 10800 1 EEST}. {-1490583600 7200 0 EET}. {-1440208800 10800 1 EEST}. {-1428030000 7200 0 EET}. {-1409709600 10800 1 EEST}. {-1396494000 7200 0 EET}. {-931140000 10800 1 EEST}. {-922762800 7200 0 EET}. {-917834400 10800 1 EEST}. {-892436400 7200 0 EET}. {-875844000 10800 1 EEST}. {-857358000 7200 0 EET}. {-781063200 10800 1 EEST}. {-764737200 7200 0 EET}. {-744343200 10800 1 EEST}. {-733806000 7200 0 EET}. {-716436000 10800 1 EEST}. {-701924400 7200 0 EET}. {-684986400 10800 1 EEST}. {-670474800 7200 0 EET}. {-654141600 10800 1 EEST}. {-639025200 7200 0 EET}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.831245786685746
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQap6cEBx/yQavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUyzO5
              MD5:F43ABA235B8B98F5C64181ABD1CEEC3A
              SHA1:A4A7D71ED148FBE53C2DF7497A89715EB24E84B7
              SHA-256:8E97798BE473F535816D6D9307B85102C03CC860D3690FE59E0B7EEF94D62D54
              SHA-512:B0E0FC97F08CB656E228353594FC907FC94A998859BB22648BF78043063932D0FC7282D31F63FCB79216218695B5DCDF298C37F0CB206160798CF3CA2C7598E1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Jersey) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2397
              Entropy (8bit):3.8622541648513464
              Encrypted:false
              SSDEEP:48:cGv6a621nwJ2JoJrv0WvXlnDqVV0Qv3LEevBFoBGrjI9q1F008bBJd8:cGvt67yurvxXl6V/DYtX6
              MD5:FE44AD99AF96A031D21D308B0E534928
              SHA1:36A666585D0895155D31A6E5AFD6B7395C7334AA
              SHA-256:0C65366AB59C4B8734DE0F69E7081269A367116363EB3863D16FB7184CCC5EB9
              SHA-512:2789E8FC8FD73A0D3C915F5CBAD158D2A4995EE51607C4368F3AE1CC6418E93E204E4FCE6F796CDC60BB2E0ED8F79650DA4549C7663589B58E189D0D10F059C5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kaliningrad) {. {-9223372036854775808 4920 0 LMT}. {-2422056120 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 7200 0 CET}. {-778730400 10800 1 CEST}. {-762663600 7200 0 CET}. {-757389600 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7202
              Entropy (8bit):3.6738341956502953
              Encrypted:false
              SSDEEP:96:j/fE2JyurpyVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:j/fN8GHh2kNU4tB715pyzHy1gA
              MD5:4E693AC10DD3FC66700A878B94D3701D
              SHA1:692200B78A3EA482577D13BE5588FEB0BF94DF01
              SHA-256:3AAC94E73BB4C803BBB4DE14826DAA0AC82BAE5C0841FD7C58B62A5C155C064D
              SHA-512:9B68D418B98DDF855C257890376AEC300FC6024E08C85AF5CFFE70BE9AC39D75293C35D841DB8A7BE5574FD185D736F5CB72205531736A202D25305744A2DD15
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kiev) {. {-9223372036854775808 7324 0 LMT}. {-2840148124 7324 0 KMT}. {-1441159324 7200 0 EET}. {-1247536800 10800 0 MSK}. {-892522800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-825382800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {638319600 14400 1 MSD}. {646786800 10800 1 EEST}. {686102400 7200 0 EET}. {701820000 10800 1 EEST}. {717541200 7200 0 EET}. {733269600 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1959
              Entropy (8bit):3.5751912319178496
              Encrypted:false
              SSDEEP:24:c1e/5gjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUH9mUBR:dWDTZVemFLN7NBx333+ix6b0JiG1
              MD5:249037A8019D3A5244DD59D8C3316403
              SHA1:2DABDE83753CE65D1A2D3949FF9B94401A2DD8C3
              SHA-256:5FE8535DD9A4729B68BF5EC178C6F978753A4A01BDC6F5529C2F8A3872B470D1
              SHA-512:4180DE17FDDA1417DD24229F775DD45FDE99078E71F2A583E6629D022DCD1B30CEB1ABCEEC78286CAE286E8CBAFC5A7AB20464D53B8BE2615B4681302C05B120
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kirov) {. {-9223372036854775808 11928 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {796172400 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9471
              Entropy (8bit):3.738653060534981
              Encrypted:false
              SSDEEP:192:1SgVSz+IZHX68PlXIFj544IrvfMsbxZTH7qwQ:1SYSz+IZHX68PlYFUM8xZTH7qwQ
              MD5:AD82B05F966F0EAD5B2F4FD7B6D56718
              SHA1:DE5A9BB8B0FCA79C38DD35905FF074503D5AAF13
              SHA-256:EE61A08BED392B75FBE67666BDCF7CE26DFA570FC2D1DEC9FFEF51E5D8CD8DF7
              SHA-512:68DC078090E2AF1EAF0150BBCF63E52E4675BF22E2FF6BBA4B4D0B244BFF23C73310A3E63365A4217B8466F2C2E7A4384D05D778F70513183B3A59016A55DDB0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Lisbon) {. {-9223372036854775808 -2205 0 LMT}. {-2713908195 -2205 0 LMT}. {-1830384000 0 0 WET}. {-1689555600 3600 1 WEST}. {-1677801600 0 0 WET}. {-1667437200 3600 1 WEST}. {-1647738000 0 0 WET}. {-1635814800 3600 1 WEST}. {-1616202000 0 0 WET}. {-1604365200 3600 1 WEST}. {-1584666000 0 0 WET}. {-1572742800 3600 1 WEST}. {-1553043600 0 0 WET}. {-1541206800 3600 1 WEST}. {-1521507600 0 0 WET}. {-1442451600 3600 1 WEST}. {-1426813200 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1221440400 3600 1 WEST}. {-1206925200 0 0 WET}. {-1191200400 3600 1 WEST}. {-1175475600 0 0 WET}. {-1127696400 3600 1 WEST}. {-1111971600 0 0 WET}. {-1096851600 3600 1 WEST}. {-1080522000
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.901869793666386
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQavPSJ5QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqm
              MD5:5F2AEC41DECD9E26955876080C56B247
              SHA1:4FDEC0926933AE5651DE095C519A2C4F9E567691
              SHA-256:88146DA16536CCF587907511FB0EDF40E392E6F6A6EFAB38260D3345CF2832E1
              SHA-512:B71B6C21071DED75B9B36D49EB5A779C5F74817FF070F70FEAB9E3E719E5F1937867547852052AA7BBAE8B842493FBC7DFAFD3AC47B70D36893541419DDB2D74
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Ljubljana) $TZData(:Europe/Belgrade).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9839
              Entropy (8bit):3.737361476589814
              Encrypted:false
              SSDEEP:192:Gj4y1xZfvm8nKrhFs3XRnRaQqTLJaMt/VZ1R6Y+:GjPxZfvmgEhS3XRmau/VZ1R6Y+
              MD5:2A53A87C26A5D2AF62ECAAD8CECBF0D7
              SHA1:025D31C1D32F1100C1B00858929FD29B4E66E8F6
              SHA-256:2A69A7C9A2EE3057EBDB2615DBE5CB08F5D334210449DC3E42EA88564C29583A
              SHA-512:81EFA13E4AB30A9363E80EC1F464CC51F8DF3C492771494F3624844E074BA9B84FE50EF6C32F9467E6DAB41BD5159B492B752D0C97F3CB2F4B698C04E68C0255
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/London) {. {-9223372036854775808 -75 0 LMT}. {-3852662325 0 0 GMT}. {-1691964000 3600 1 BST}. {-1680472800 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1507500000 3600 1 BST}. {-1490565600 0 0 GMT}. {-1473631200 3600 1 BST}. {-1460930400 0 0 GMT}. {-1442786400 3600 1 BST}. {-1428876000 0 0 GMT}. {-1410732000 3600 1 BST}. {-1396216800 0 0 GMT}. {-1379282400 3600 1 BST}. {-1364767200 0 0 GMT}. {-1348437600 3600 1 BST}. {-1333317600 0 0 GMT}. {-1315778400 3600 1 BST}. {-1301263200 0 0 GMT}. {-1284328800 3600 1 BST}. {-1269813600 0 0 GMT}. {-1253484000 3600 1 BST}. {-1238364000 0 0 GMT}. {-1221429600 3600 1 BST}. {-120
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8826
              Entropy (8bit):3.7634145613638657
              Encrypted:false
              SSDEEP:96:TYt4c9+dcVhv9HMLftvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAr:0w2h1QSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:804A17ED0B32B9751C38110D28EB418B
              SHA1:24235897E163D33970451C48C4260F6C10C56ADD
              SHA-256:00E8152B3E5CD216E4FD8A992250C46E600E2AD773EEDDD87DAD31012BE55693
              SHA-512:53AFDDE8D516CED5C6CF0A906DBF72AF09A62278D1FC4D5C1562BBCE853D322457A6346C3DE8F112FCF665102E19A2E677972E941D0C80D0AB7C8DD0B694628E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Luxembourg) {. {-9223372036854775808 1476 0 LMT}. {-2069713476 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1662343200 7200 1 CEST}. {-1650157200 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1612659600 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585519200 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552258800 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520550000 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490572800 0 0 WET}. {-1473642000 3600 1 WEST}. {-1459119600 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427673600 0 0 WET}. {-1411866000 3600 1 WEST}. {-1396224000 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301270400 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269813600 0 0 WET}. {-1253484000 3600 1 WEST}. {-
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8225
              Entropy (8bit):3.745589534746728
              Encrypted:false
              SSDEEP:96:kHF0p8d9VPb/aKrwSSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVab:oNHzy8STRNH4Mn82rlo6XIZ9ALeBO
              MD5:795CAAE9AECE3900DEA1F5EBD0ED668B
              SHA1:61F1745E7B60E19F1286864B7A4285E8CCF11202
              SHA-256:4BE326DD950DDAD6FB9C392A31CEED1CB1525D043F1F7C14332FEB226AEA1859
              SHA-512:BBBABBE86A757D3EE9267128E7DA810346E74FD9CD3EF37192A831958FF0EDBBE47F14DA63669F6799056081D0365194E22D64D14B97490E4333504DFE22D151
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Madrid) {. {-9223372036854775808 -884 0 LMT}. {-2177452800 0 0 WET}. {-1631926800 3600 1 WEST}. {-1616889600 0 0 WET}. {-1601168400 3600 1 WEST}. {-1585353600 0 0 WET}. {-1442451600 3600 1 WEST}. {-1427673600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316390400 3600 1 WEST}. {-1301270400 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269820800 0 0 WET}. {-1026954000 3600 1 WEST}. {-1017619200 0 0 WET}. {-1001898000 3600 1 WEST}. {-999482400 7200 1 WEMT}. {-986090400 3600 1 WEST}. {-954115200 0 0 WET}. {-940208400 3600 0 CET}. {-873079200 7200 1 CEST}. {-862621200 3600 0 CET}. {-842839200 7200 1 CEST}. {-828320400 3600 0 CET}. {-811389600 7200 1 CEST}. {-796870800 3600 0 CET}. {-779940000 7200 1 CEST}. {-765421200 3600 0 CET}. {-748490400 7200 1 CEST}. {-733971600
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8425
              Entropy (8bit):3.728789296531475
              Encrypted:false
              SSDEEP:96:wqZKgpNc6sln3mcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZY:wChslJRNH4Mn82rlo6XIZ9ALeBO
              MD5:5F73FCB70E5B27E540C1A5133F3B791C
              SHA1:406A2FB6439A3532150D69E711F253665F000B3C
              SHA-256:5E3BB07FD3592163A756596A25060683CDA7930C7F4411A406B3E1506F9B901C
              SHA-512:5263ABBE91D95BDD359B666BCDDAA6B4C8B810E986B9A94A80AF2B28E48C9C949EC5D5F21158AD306F7AF5BB6A47408C9AA5C5BB6D0053A9B9DA89E76E126FB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Malta) {. {-9223372036854775808 3484 0 LMT}. {-2403478684 3600 0 CET}. {-1690765200 7200 1 CEST}. {-1680487200 3600 0 CET}. {-1664758800 7200 1 CEST}. {-1648951200 3600 0 CET}. {-1635123600 7200 1 CEST}. {-1616896800 3600 0 CET}. {-1604278800 7200 1 CEST}. {-1585533600 3600 0 CET}. {-1571014800 7200 1 CEST}. {-1555293600 3600 0 CET}. {-932432400 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812588400 7200 1 CEST}. {-798073200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766717200 3600 0 CET}. {-750898800 7200 1 CEST}. {-733359600 3600 0 CET}. {-719456400 7200 1 CEST}. {-701917200 3600 0 CET}. {-689209200 7200 1 CEST}. {-670460400 3600 0 CET}. {-114051600 7200 1 CEST}. {-103168800 3600 0 CET}. {-81997200 7200 1 CEST}. {-71715600 3600 0 CET}. {-50547600 7200 1 CEST}. {-40266000 3600 0 CET}
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.913470013356756
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV1AYKjGyVAIgoq2AYKjvCW6yQausWILMFJ8QarAYKa:SlSWB9IZaM3ymrAdjGyVAIgorAdjoyGK
              MD5:CFB0DE2E11B8AF400537BD0EF493C004
              SHA1:32E8FCB8571575E9DFE09A966F88C7D3EBCD183E
              SHA-256:5F82A28F1FEE42693FD8F3795F8E0D7E8C15BADF1FD9EE4D45794C4C0F36108C
              SHA-512:9E36B2EACA06F84D56D9A9A0A83C7C106D26A6A55CBAA696729F105600F5A0105F193899D5996C416EFAABC4649E91BA0ED90D38E8DF7B305C6D951A31C80718
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Helsinki)]} {. LoadTimeZoneFile Europe/Helsinki.}.set TZData(:Europe/Mariehamn) $TZData(:Europe/Helsinki).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2102
              Entropy (8bit):3.8519171770148932
              Encrypted:false
              SSDEEP:48:K6ccjMsJ2JoJrZXnDqVV0Qv3LEevBFoBGrjI9q1F008bBJdO:PRjMAyurZX6V/DYtXE
              MD5:E5ECB372FF8F5ED274597551ED2C35F0
              SHA1:6792E2676C59F43B9F260AF2F33E4C2484E71D64
              SHA-256:78A57D601978869FCAA2737BEC4FDAB72025BC5FDDF7188CCC89034FA767DA6C
              SHA-512:261FFB4C7974C5F1C0AECA49D9B26F3BC2998C63CEF9CB168B1060E9EC12F7057DB5376128AFD8A31AF2CC9EF79577E96CD9863AA46AC330A5F057F72E43B7B9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Minsk) {. {-9223372036854775808 6616 0 LMT}. {-2840147416 6600 0 MMT}. {-1441158600 7200 0 EET}. {-1247536800 10800 0 MSK}. {-899780400 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-804646800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {670374000 7200 0 EEMMTT}. {670377600 10800 1 EEST}. {686102400 7200 0 EET}. {7018272
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8871
              Entropy (8bit):3.7700564621466666
              Encrypted:false
              SSDEEP:96:2LCV8tXttpD72RXbvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHT/:eAYt+STRNH4Mn82rlo6XIZ9ALeBO
              MD5:B2BA91B2CDD19E255B68EA35E033C061
              SHA1:246E377E815FFC11BBAF898E952194FBEDAE9AA2
              SHA-256:768E3D45DB560777C8E13ED9237956CFE8630D840683FAD065A2F6948FD797BE
              SHA-512:607383524C478F1CB442679F6DE0964F8916EE1A8B0EF6806BDF7652E4520B0E842A611B432FB190C30C391180EA1867268BBBF6067310F70D5E72CB3E4D789F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Monaco) {. {-9223372036854775808 1772 0 LMT}. {-2486680172 561 0 PMT}. {-1855958961 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1470618000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1253494800 3600 1 WEST}. {-1238374800 0 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2347
              Entropy (8bit):3.859849674605335
              Encrypted:false
              SSDEEP:24:cYedmnClAHEFFkebUe9OtUe9h7+UeGH3UeRUeIuUeKqCbUeaJJUevTkUetUeibEV:kmnAA4F7wxJ2JoJrprXn1CL9yLI0vjls
              MD5:AB2CB4A38196852883272148B4A14085
              SHA1:ED22233A615B775DB528053807858A0B69E9D4FB
              SHA-256:D9814005CB99F2275A4356A8B226E16C7C823ADC940F3A7BBB909D4C01BF44E3
              SHA-512:F2179FC1C15954FD7F7B824C5310183C96EDC630880E1C8C85DF4423ECC5994B8A9CA826745CC8BCA77945A36BCADAA87620C31FFBD40071438695A610EBF045
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Moscow) {. {-9223372036854775808 9017 0 LMT}. {-2840149817 9017 0 MMT}. {-1688265017 9079 0 MMT}. {-1656819079 12679 1 MST}. {-1641353479 9079 0 MMT}. {-1627965079 16279 1 MDST}. {-1618716679 12679 1 MST}. {-1596429079 16279 1 MDST}. {-1593820800 14400 0 MSD}. {-1589860800 10800 0 MSK}. {-1542427200 14400 1 MSD}. {-1539493200 18000 1 +05}. {-1525323600 14400 1 MSD}. {-1491188400 7200 0 EET}. {-1247536800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.73570159193188
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85GKLWVAIgNwMGKLG6yQatHefeWFKYGKL1:SlSWB9IZaM3yZdLWVAIgGMdL9y3HefeW
              MD5:47C275C076A278CA8E1FF24E9E46CC22
              SHA1:55992974C353552467C2B57E3955E4DD86BBFAD2
              SHA-256:34B61E78EF15EA98C056C1AC8C6F1FA0AE87BD6BC85C58BE8DA44D017B2CA387
              SHA-512:1F74FC0B452C0BE35360D1C9EC8347063E8480CA37BE893FD4FF7FC2279B7D0C0909A26763C7755DFB19BE9736340D3FB00D39E9F6BF23C1D2F0015372139847
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Nicosia)]} {. LoadTimeZoneFile Asia/Nicosia.}.set TZData(:Europe/Nicosia) $TZData(:Asia/Nicosia).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7651
              Entropy (8bit):3.7309855254369766
              Encrypted:false
              SSDEEP:96:aG6sT+cQJWxdocRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQt:abcQJWxd/RNH4Mn82rlo6XIZ9ALeBO
              MD5:2A3F771DD9EAE2E9C1D8394C12C0ED71
              SHA1:541DCF144EFFE2DFF27B81A50D245C7385CC0871
              SHA-256:8DDFB0296622E0BFDBEF4D0C2B4EA2522DE26A16D05340DFECA320C0E7B2B1F7
              SHA-512:E1526BD21E379F8B2285481E3E12C1CF775AE43E205D3E7E4A1906B87821D5E15B101B24463A055B6013879CD2777112C7F27B5C5220F280E3C48240367AA663
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Oslo) {. {-9223372036854775808 2580 0 LMT}. {-2366757780 3600 0 CET}. {-1691884800 7200 1 CEST}. {-1680573600 3600 0 CET}. {-927511200 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 0 CEST}. {-765327600 3600 0 CET}. {-340844400 7200 1 CEST}. {-324514800 3600 0 CET}. {-308790000 7200 1 CEST}. {-293065200 3600 0 CET}. {-277340400 7200 1 CEST}. {-261615600 3600 0 CET}. {-245890800 7200 1 CEST}. {-230166000 3600 0 CET}. {-214441200 7200 1 CEST}. {-198716400 3600 0 CET}. {-182991600 7200 1 CEST}. {-166662000 3600 0 CET}. {-147913200 7200 1 CEST}. {-135212400 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {40185
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8838
              Entropy (8bit):3.7637328221887567
              Encrypted:false
              SSDEEP:96:1XV8tXttpD724lvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIu:1FYtPSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:153CA0EF3813D91C5E23B34ADFE7A318
              SHA1:F7F18CB34424A9B62172F00374853F1D4A89BEE4
              SHA-256:092BF010A1CF3819B102C2A70340F4D67C87BE2E6A8154716241012B5DFABD88
              SHA-512:E2D418D43D9DFD169238DDB0E790714D3B88D16398FA041A9646CB35F24EF79EE48DA4B6201E6A598E89D4C651F8A2FB9FB874B2010A51B3CD35A86767BAF4D2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Paris) {. {-9223372036854775808 561 0 LMT}. {-2486678901 561 0 PMT}. {-1855958901 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1470618000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1253494800 3600 1 WEST}. {-1238374800 0 0 W
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.86256001696314
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQazKIGl1/yQahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vq7
              MD5:4F430ECF91032E40457F2D2734887860
              SHA1:D1C099523C34ED0BD48C24A511377B232548591D
              SHA-256:F5AB2E253CA0AB7A9C905B720B19F713469877DE1874D5AF81A8F3E74BA17FC8
              SHA-512:2E6E73076A18F1C6C8E89949899F81F232AE66FEB8FFA2A5CE5447FFF581A0D5E0E88DABEAA3C858CC5544C2AE9C6717E590E846CBFD58CEF3B7558F677334FB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Podgorica) $TZData(:Europe/Belgrade).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7763
              Entropy (8bit):3.7367850410615597
              Encrypted:false
              SSDEEP:96:3Nt6F3oxSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUE:3/xSTRNH4Mn82rlo6XIZ9ALeBO
              MD5:D04290286789AB05490A7DE8569D80AB
              SHA1:B65938E29CBFB65D253E041EE1CD92FE75C3C663
              SHA-256:60494447C38C67E8173D4A9CDBA8D16AF90545FA83F3558DB8C9B7D0D052DD45
              SHA-512:B0897CD4785D737B7C5E5CE717B55AEE8689F83105DDB8A0DA2B4977961124AFA5AF573D57AA4467E5DB68FC5F927D7B58AEE7280238392C5666CC090476EC91
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Prague) {. {-9223372036854775808 3464 0 LMT}. {-3786829064 3464 0 PMT}. {-2469401864 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-777862800 7200 0 CEST}. {-765327600 3600 0 CET}. {-746578800 7200 1 CEST}. {-733359600 3600 0 CET}. {-728517600 0 1 GMT}. {-721260000 0 0 CET}. {-716425200 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654217200 7200 1 CEST}. {-639010800 3600 0 CET}. {283993200 3600 0 CET}. {291776400 7200 1 CEST}. {307501200 3600 0 CET}. {323830800 7200 1 CEST}. {338
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7400
              Entropy (8bit):3.686652767751974
              Encrypted:false
              SSDEEP:96:A46YyurGXl6V/jfaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:AnGG160h2kNU4tB715pyzHy1gA
              MD5:5F71EBD41FC26CA6FAA0A26CE83FA618
              SHA1:0FC66EEB374A2930A7F6E2BB5B7D6C4FD00A258C
              SHA-256:6F63E58F355EF6C4CF8F954E01544B0E152605A72B400C731E3100B422A567D0
              SHA-512:20B730949A4967C49D259D4D00D8020579580F7FAA0278FBCEBDF8A8173BBF63846DDBF26FFFBBADB0FAF3FD0EB427DBB8CF18A4A80F7B023D2027CC952A773F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Riga) {. {-9223372036854775808 5794 0 LMT}. {-2840146594 5794 0 RMT}. {-1632008194 9394 1 LST}. {-1618702594 5794 0 RMT}. {-1601681794 9394 1 LST}. {-1597275394 5794 0 RMT}. {-1377308194 7200 0 EET}. {-928029600 10800 0 MSK}. {-899521200 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-795834000 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 10800 1 EEST}. {622598
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8511
              Entropy (8bit):3.729257183076779
              Encrypted:false
              SSDEEP:96:YnZKupNc6XTWycRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQt:YVhiRNH4Mn82rlo6XIZ9ALeBO
              MD5:3E209874EA8830B8436F897B0B7682B1
              SHA1:FC9AB2212C10C25850ACE69DC3BE125FD0912092
              SHA-256:626E7F8389382108E323B8447416BAC420A29442D852817024A39A97D556F365
              SHA-512:24C1A7890E076C4D58426D62726BC21FA6F70F16B5E9797405B7404AACB1CB2FC283483018418EF0CEE43720838864E01427C60269D98866A48F35CAF0483EFA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Rome) {. {-9223372036854775808 2996 0 LMT}. {-3259097396 2996 0 RMT}. {-2403565200 3600 0 CET}. {-1690765200 7200 1 CEST}. {-1680487200 3600 0 CET}. {-1664758800 7200 1 CEST}. {-1648951200 3600 0 CET}. {-1635123600 7200 1 CEST}. {-1616896800 3600 0 CET}. {-1604278800 7200 1 CEST}. {-1585533600 3600 0 CET}. {-1571014800 7200 1 CEST}. {-1555293600 3600 0 CET}. {-932432400 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-830307600 7200 0 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-807152400 7200 0 CEST}. {-798073200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766717200 3600 0 CET}. {-750898800 7200 1 CEST}. {-733359600 3600 0 CET}. {-719456400 7200 1 CEST}. {-701917200 3600 0 CET}. {-689209200 7200 1 CEST}. {-670460400 3600 0 CET}. {-114051600 7200 1 CEST}. {-103168800 3600 0 CET}. {-81997200 7200 1 C
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2045
              Entropy (8bit):3.5710319343050183
              Encrypted:false
              SSDEEP:24:cBesqgOjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUHiWnb:rdDTZVemFLN7NBx3BngyxJvqJ2FJ/jz
              MD5:30271DF851CE290256FA0BE793F3A918
              SHA1:307BF37BD5110537B023A648AAC41F86E3D34ACB
              SHA-256:11400A62327FB9DEFB2D16EBD8E759F94C37EF4F12C49AC97DA2E5031FFA0079
              SHA-512:3E86BDF258BA23AFF9E1BDCDFE7853D5413A589160F67AF7424CE014B7A77A948B8BF973EB02A0FFFE47D5D0EA4464D851DF294C04AF685C0AF7A0EB08DD9067
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Samara) {. {-9223372036854775808 12020 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +04}. {-1102305600 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 7200 0 +03}. {670377600 10800 1 +03}. {686102400 10800 0 +03}. {687916800 14400 0 +04}. {701820000 18000 1 +05}. {717544800 14400 0 +04}. {733269600 18000 1 +05}. {748994400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.908962717024613
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVvjFwFVAIgoqsuCHRLyQawELDX7x/yQax9:SlSWB9IZaM3ymx5wFVAIgoxuCxLyt/yR
              MD5:C50388AD7194924572FA470761DD09C7
              SHA1:EF0A2223B06BE12EFE55EE72BF2C941B7BFB2FFE
              SHA-256:7F89757BAE3C7AE59200DCEEEE5C38A7F74EBAA4AA949F54AFD5E9BB64B13123
              SHA-512:0CE5FF2F839CD64A2C9A5AE6BBE122C91342AE44BDECDB9A3BA9F08578BC0B474BC0AF0E773868B273423289254909A38902B225A0092D048AC44BCF883AB4B0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Rome)]} {. LoadTimeZoneFile Europe/Rome.}.set TZData(:Europe/San_Marino) $TZData(:Europe/Rome).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.890934294125181
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQawEX3GEaQahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqa
              MD5:5C12CEEDB17515260E2E143FB8F867F5
              SHA1:51B9CDF922BFBA52BF2618B63435EC510DEAE423
              SHA-256:7C45DFD5F016982F01589FD2D1BAF97898D5716951A4E08C3540A76E8D56CEB1
              SHA-512:7A6B7FDFD6E5CFEB2D1AC136922304B0A65362E19307E0F1E20DBF48BED95A262FAC9CBCDB015C3C744D57118A85BD47A57636A05144430BF6707404F8E53E8C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Sarajevo) $TZData(:Europe/Belgrade).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1990
              Entropy (8bit):3.5705804674707893
              Encrypted:false
              SSDEEP:24:cWe35gjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkwLUk+EUhtCUH9mUBU9R:qWDTZVemFLN70333+ix6b0JiGk
              MD5:EEA55E1788265CCC7B3BDB775AF3DD38
              SHA1:E327A5965114AB8BF6E479989E43786F0B74CFB1
              SHA-256:0031D4DEC64866DEB1B5E566BB957F2C0E46E5751B31DF9C8A3DA1912AEC4CB2
              SHA-512:21EF7D364814259F23319D4BC0E4F7F0653D35C1DD03D22ACD8E9A540EE8A9E651BEE22501E4150F6C74901AC2ED750CE08AAE0551DF5A44AB11FD4A3DB49D59
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Saratov) {. {-9223372036854775808 11058 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 10800 0 +04}. {575420400 14400 1 +04}. {591145200 10800 0 +03}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {796172400
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2307
              Entropy (8bit):3.8673720237532523
              Encrypted:false
              SSDEEP:48:wMxjIJJ2JoJrsyCmh7VloiIa0QM0ScfSblniT+CC:jjInyur/hUaKln
              MD5:F745F2F2FDEA14C70EA27BA35D4E3051
              SHA1:C4F01A629E6BAFB31F722FA65DC92B36D4E61E43
              SHA-256:EAE97716107B2BF4A14A08DD6197E0542B6EE27C3E12C726FC5BAEF16A144165
              SHA-512:0E32BE79C2576943D3CB684C2E25EE3970BE7F490FF8FD41BD897249EA560F280933B26B3FBB841C67915A3427CB009A1BFC3DACD70C4F77E33664104E32033E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Simferopol) {. {-9223372036854775808 8184 0 LMT}. {-2840148984 8160 0 SMT}. {-1441160160 7200 0 EET}. {-1247536800 10800 0 MSK}. {-888894000 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-811645200 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {646786800 7200 0 EET}. {694216800 7200 0 EET}. {701820000 10800 1 EEST}. {71754
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.906520812033373
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQawOgpr8QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vq3
              MD5:BB062D4D5D6EA9BA172AC0555227A09C
              SHA1:75CCA7F75CEB77BE5AFB02943917DB048051F396
              SHA-256:51820E2C5938CEF89A6ED2114020BD32226EF92102645526352E1CB7995B7D0A
              SHA-512:8C6AD79DD225C566D2D93606575A1BF8DECF091EDFEED1F10CB41C5464A6A9F1C15BEB4957D76BD1E03F5AE430319480A3FDACEF3116EA2AF0464427468BC855
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Skopje) $TZData(:Europe/Belgrade).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7396
              Entropy (8bit):3.6373782291014924
              Encrypted:false
              SSDEEP:96:8lAV/6vcBrYixX21/BVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykePG:8lAV/SEm1/mh2kNU4tB715pyzHy1gA
              MD5:8B538BB68A7FF0EB541EB2716264BAD9
              SHA1:49899F763786D4E7324CC5BAAECFEA87D5C4F6C7
              SHA-256:9D60EF4DBA6D3802CDD25DC87E00413EC7F37777868C832A9E4963E8BCDB103C
              SHA-512:AD8D75EE4A484050BB108577AE16E609358A9E4F31EA1649169B4A26C8348A502B4135FE3A282A2454799250C6EDF9E70B236BCF23E1F6540E123E39E81BBE41
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Sofia) {. {-9223372036854775808 5596 0 LMT}. {-2840146396 7016 0 IMT}. {-2369527016 7200 0 EET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-781048800 7200 0 EET}. {291762000 10800 0 EEST}. {307576800 7200 0 EET}. {323816400 10800 1 EEST}. {339026400 7200 0 EET}. {355266000 10800 1 EEST}. {370393200 7200 0 EET}. {386715600 10800 1 EEST}. {401846400 7200 0 EET}. {417571200 10800 1 EEST}. {433296000 7200 0 EET}. {449020800 10800 1 EEST}. {465350400 7200 0 EET}. {481075200 10800 1 EEST}. {496800000 7200 0 EET}. {512524800 10800 1 EEST}. {528249600 7200 0 EET}. {543974400 10800 1 EEST}. {559699200 7200 0 EET}. {575424000 10800 1 EEST}. {591148800 7200 0 EET}. {606873600 10800 1 EEST}. {622598400 7200 0 EET}. {638323200 10
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7058
              Entropy (8bit):3.730067397634837
              Encrypted:false
              SSDEEP:96:K39ucRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:K3HRNH4Mn82rlo6XIZ9ALeBO
              MD5:7F6C45358FC5E91125ACBDD46BBD93FE
              SHA1:C07A80D3C136679751D64866B725CC390D73B750
              SHA-256:119E9F7B1284462EB8E920E7216D1C219B09A73B323796BBF843346ECD71309A
              SHA-512:585AE0B1DE1F5D31E45972169C831D837C19D05E21F65FAD3CB84BEF8270C31BF2F635FB803CB70C569FAC2C8AA6ABDE057943F4B51BF1D73B72695FE95ECFD2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Stockholm) {. {-9223372036854775808 4332 0 LMT}. {-2871681132 3614 0 SET}. {-2208992414 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680483600 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7295
              Entropy (8bit):3.6772204206246193
              Encrypted:false
              SSDEEP:96:dcqDyurGXl6V/DraKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:e7GG16gh2kNU4tB715pyzHy1gA
              MD5:981078CAEAA994DD0C088B8C4255018A
              SHA1:5B5E542491FCCC80B04F6F3CA3BA76FEE35BC207
              SHA-256:716CFFE58847E0084C904A01EF4230F63275660691A4BA54D0B80654E215CC8F
              SHA-512:3010639D28C7363D0B787F84EF57EE30F457BD8A6A64AEDED1E813EB1AF0A8D85DA0A788C810509F932867F7361B338753CC9B79ACA95D2D32A77F7A8AA8BC9F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Tallinn) {. {-9223372036854775808 5940 0 LMT}. {-2840146740 5940 0 TMT}. {-1638322740 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1593824400 5940 0 TMT}. {-1535938740 7200 0 EET}. {-927943200 10800 0 MSK}. {-892954800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-797648400 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 10800 1 EEST}. {622598400 7200 0 EET}. {638
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7412
              Entropy (8bit):3.7216700074911437
              Encrypted:false
              SSDEEP:96:6t1WXXRM8DAdRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:6GXh9AdRNH4Mn82rlo6XIZ9ALeBO
              MD5:872AB00046280F53657A47D41FBA5EFE
              SHA1:311BF2342808BD9DC8AB2C2856A1F91F50CFB740
              SHA-256:D02C2CD894AE4D3C2619A4249088A566B02517FA3BF65DEFAF4280C407E5B5B3
              SHA-512:2FF901990FA8D6713D875F90FE611E54B35A2216C380E88D408C4FB5BD06916EE804DC6331C117C3AC643731BEADB5BDEDEA0F963B89FAEDB07CA3FFD0B3A535
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Tirane) {. {-9223372036854775808 4760 0 LMT}. {-1767230360 3600 0 CET}. {-932346000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-843519600 3600 0 CET}. {136854000 7200 1 CEST}. {149896800 3600 0 CET}. {168130800 7200 1 CEST}. {181432800 3600 0 CET}. {199839600 7200 1 CEST}. {213141600 3600 0 CET}. {231894000 7200 1 CEST}. {244591200 3600 0 CET}. {263257200 7200 1 CEST}. {276040800 3600 0 CET}. {294706800 7200 1 CEST}. {307490400 3600 0 CET}. {326156400 7200 1 CEST}. {339458400 3600 0 CET}. {357087600 7200 1 CEST}. {370389600 3600 0 CET}. {389142000 7200 1 CEST}. {402444000 3600 0 CET}. {419468400 7200 1 CEST}. {433807200 3600 0 CET}. {449622000 7200 1 CEST}. {457480800 7200 0 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.85845283098493
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV+NM/LpVAIgoq9NM/eO6yQa3MPgJM1p8QagNM/cn:SlSWB9IZaM3ymI6NVAIgoI6eFytM4M8g
              MD5:743453106E8CD7AE48A2F575255AF700
              SHA1:7CD6F6DCA61792B4B2CBF6645967B9349ECEACBE
              SHA-256:C28078D4B42223871B7E1EB42EEB4E70EA0FED638288E9FDA5BB5F954D403AFB
              SHA-512:458072C7660BEAFEB9AE5A2D3AEA6DA582574D80193C89F08A57B17033126E28A175F5B6E2990034660CAE3BC1E837F8312BC4AA365F426BD54588D0C5A12EB8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Chisinau)]} {. LoadTimeZoneFile Europe/Chisinau.}.set TZData(:Europe/Tiraspol) $TZData(:Europe/Chisinau).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2046
              Entropy (8bit):3.588329521363201
              Encrypted:false
              SSDEEP:24:cUeRgjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUHiWn0it:EWDTZVemFLN7NBx3Bnu3+ix6b0JiGef
              MD5:E4394950F7838CD984172D68DA413486
              SHA1:75F84A4C887463DE3F82C7F0339DD7D71871AA65
              SHA-256:CB780BBC06F9268CE126461AF9B6539FF16964767A8763479099982214280896
              SHA-512:7D0E3904300FDD3C4814E15A3C042F3E641BF56AF6867DA7580D1DAD8E07F5B4F0C0717A34E8336C0908D760EDCD48605C7B6BA06A5165BD2BD3AF0B68399C59
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Ulyanovsk) {. {-9223372036854775808 11616 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 7200 0 +03}. {670377600 10800 1 +03}. {686102400 7200 0 +02}. {695779200 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7287
              Entropy (8bit):3.681086026612126
              Encrypted:false
              SSDEEP:96:DptgbYyurZiVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:Dp4GZNh2kNU4tB715pyzHy1gA
              MD5:E1088083B0D5570AF8FBE54A4C553AFB
              SHA1:A6EC8636A0092737829B873C4879E9D4C1B0A288
              SHA-256:19D87DB3DAB942037935FEC0A9A5E5FE24AFEB1E5F0F1922AF2AF2C2E186621D
              SHA-512:C58AA37111AE29F85C9C3F1E52DB3C9B2E2DCEFBBB9ACA4C61AD9B00AA7F3A436E754D2285774E882614B16D5DB497ED370A06EE1AFC513579E1E5F1475CA160
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Uzhgorod) {. {-9223372036854775808 5352 0 LMT}. {-2500939752 3600 0 CET}. {-946774800 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796870800 7200 1 CEST}. {-794714400 3600 0 CET}. {-773456400 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {646786800 3600 0 CET}. {670384800 7200 0 EET}. {694216800
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.906311228352029
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVnCMPwVAIgoqkCMJW6yQa1NEHp8Qa5CMP:SlSWB9IZaM3ym5XwVAIgo5PyvNEJ8jH
              MD5:C1817BA53C7CD6BF007A7D1E17FBDFF1
              SHA1:C72DCD724E24BBE7C22F9279B05EE03924603348
              SHA-256:E000C8E2A27AE8494DC462D486DC28DAFA502F644FC1540B7B6050EABE4712DC
              SHA-512:E48C1E1E60233CEC648004B6441F4A49D18D07904F88670A6F9A3DACC3006F7D7CE4A9ACB6C9B6DB8F45CB324EA1BCF6CC3DA8C1FFB40A948BB2231AC4B57EEB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Zurich)]} {. LoadTimeZoneFile Europe/Zurich.}.set TZData(:Europe/Vaduz) $TZData(:Europe/Zurich).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):171
              Entropy (8bit):4.8663121336740405
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVvjFwFVAIgoqsuCHRLyQa1xLM1p8Qax9:SlSWB9IZaM3ymx5wFVAIgoxuCxLyvN+a
              MD5:0652C9CF19CCF5C8210330B22F200D47
              SHA1:052121E14825CDF98422CAA2CDD20184F184A446
              SHA-256:3BC0656B5B52E3C3C6B7BC5A53F9228AAFA3EB867982CFD9332B7988687D310B
              SHA-512:1880524DCA926F4BFD1972E53D5FE616DE18E4A29E9796ABEAEE4D7CD10C6FE79C0D731B305BD4DAA6FC3917B286543D622F2291B76DABA231B9B22A784C7475
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Rome)]} {. LoadTimeZoneFile Europe/Rome.}.set TZData(:Europe/Vatican) $TZData(:Europe/Rome).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7659
              Entropy (8bit):3.7322931990772257
              Encrypted:false
              SSDEEP:96:2ntWj6DmcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:2tWURNH4Mn82rlo6XIZ9ALeBO
              MD5:E8D0D78179D1E9D738CEEC1D0D4943E5
              SHA1:E0469B86F545FFFA81CE9694C96FE30F33F745DD
              SHA-256:44FF42A100EA0EB448C3C00C375F1A53614B0B5D468ADF46F2E5EAFF44F7A64C
              SHA-512:FACA076F44A64211400910E4A7CAD475DD24745ECCE2FE608DD47B0D5BB9221FF15B9D58A767A90FF8D25E0545C3E50B3E464FF80B1D23E934489420640F5C8A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Vienna) {. {-9223372036854775808 3921 0 LMT}. {-2422055121 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1577926800 3600 0 CET}. {-1569711600 7200 1 CEST}. {-1555801200 3600 0 CET}. {-938905200 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-780188400 3600 0 CET}. {-757386000 3600 0 CET}. {-748479600 7200 1 CEST}. {-733359600 3600 0 CET}. {-717634800 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {323823600 7200 1 CEST}. {338940000 3600 0 CET}. {347151600 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7233
              Entropy (8bit):3.682695131194103
              Encrypted:false
              SSDEEP:96:/FsyurvxXl6V/DAOLl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:/fGJ16Oh2kNU4tB715pyzHy1gA
              MD5:CF7967CD882413C1423CCD5A1EDC8B2E
              SHA1:72F5F5D280530A67591FC0F88BF272E2975E173C
              SHA-256:1E13055C7BF8D7469AFC28B0ED91171D203B382B62F78D140C1CB12CF968637C
              SHA-512:777B7418FFB8DFE4E6A2B1057BB3CFF2358269044F0E5887260663790D0344BDFD8BF5C220987E30B2D8D391BB96C17C8C5EE86DA83EC4874F7EC3172477DFB6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Vilnius) {. {-9223372036854775808 6076 0 LMT}. {-2840146876 5040 0 WMT}. {-1672536240 5736 0 KMT}. {-1585100136 3600 0 CET}. {-1561251600 7200 0 EET}. {-1553565600 3600 0 CET}. {-928198800 10800 0 MSK}. {-900126000 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-802141200 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 7200 0 EEMMTT}. {606873600 10800 1 EEST}. {622598400 7200 0 EET}. {638
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2021
              Entropy (8bit):3.5806689351967527
              Encrypted:false
              SSDEEP:24:cRecrebjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkwLUk+EUhtCUH9mUBUv:YenDTZVemFLN70333+ix6b0JiGE
              MD5:DFC3D37284F1DCFE802539DB1E684399
              SHA1:67778FFE4326B1391C3CFE991B3C84C1E9ACA2D2
              SHA-256:AAFA26F7ED5733A2E45E77D67D7E4E521918CBDC19DAB5BA7774C60B9FDC203F
              SHA-512:B5A63E363CF9814C6E530840D9BB5A78C36493BAD54060781BACDF10DFA8C95988081DE3364E56D3FDFDBB5A6489E549D8CB1C0B5D1C57F53A1B1915B291A0D9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Volgograd) {. {-9223372036854775808 10660 0 LMT}. {-1577761060 10800 0 +03}. {-1247540400 14400 0 +04}. {-256881600 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 10800 0 +04}. {575420400 14400 1 +04}. {591145200 10800 0 +03}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8366
              Entropy (8bit):3.731361496484662
              Encrypted:false
              SSDEEP:96:uOZMLerhW4v4Qzh3VEbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0c:uArhW4v4yENH4Mn82rlo6XIZ9ALeBO
              MD5:5F72F26A78BECD6702560DE8C7CCB850
              SHA1:A14E10DCC128B88B3E9C5D2A86DAC7D254CEB123
              SHA-256:054C1CDABAD91C624A4007D7594C30BE96906D5F29B54C292E0B721F8CB03830
              SHA-512:564A575EA2FBDB1D262CF55D55BEFC0BF6EF2081D88DE25712B742F5800D2FBE155EDEF0303F62D497BA0E849174F235D8599E09E1C997789E24FE5583F4B0FC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Warsaw) {. {-9223372036854775808 5040 0 LMT}. {-2840145840 5040 0 WMT}. {-1717032240 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618696800 7200 0 EET}. {-1600473600 10800 1 EEST}. {-1587168000 7200 0 EET}. {-931734000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796870800 7200 0 CEST}. {-796608000 3600 0 CET}. {-778726800 7200 1 CEST}. {-762660000 3600 0 CET}. {-748486800 7200 1 CEST}. {-733273200 3600 0 CET}. {-715215600 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {-397094400 7200 1 CEST}. {-386812800 3600 0 CET}. {-371088000 7200 1 CEST}. {-355363200 3600 0
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.851218990240677
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQa5rXv1/h8QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqK
              MD5:445F589A26E47F9D7BDF1A403A96108E
              SHA1:B119D93796DA7C793F9ED8C5BB8BB65C8DDBFC81
              SHA-256:6E3ED84BC34D90950D267230661C2EC3C32BA190BD57DDC255F4BE901678B208
              SHA-512:F45AF9AC0AF800FDCC74DBED1BDFA106A6A58A15308B5B62B4CB6B091FCFD321F156618BE2C157A1A6CAFAAAC399E4C6B590AF7CE7176F757403B55F09842FD2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Zagreb) $TZData(:Europe/Belgrade).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7238
              Entropy (8bit):3.6787190163584103
              Encrypted:false
              SSDEEP:96:Tnh2yurpr2nVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:T1Gt2ch2kNU4tB715pyzHy1gA
              MD5:4AC1F6AB26F3869C757247346BCB72B5
              SHA1:CB0880906DC630F3C2B934998853CD05AAA1FE39
              SHA-256:3E9F843F5C6DDBE8E6431BE28ACB95507DDDCA6C521E2FD3355A103BF38F3CB7
              SHA-512:C4A3AB7B5BA3BC371285654159CB1767ECD52DEDAA61BF69586F6ED61F9F1E877796C28438FF582962C12780484214B5EA670654C87240E01EDD2A4B271EDEEF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Zaporozhye) {. {-9223372036854775808 8440 0 LMT}. {-2840149240 8400 0 +0220}. {-1441160400 7200 0 EET}. {-1247536800 10800 0 MSK}. {-894769200 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-826419600 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {638319600 14400 1 MSD}. {654649200 10800 0 MSK}. {670374000 10800 0 EEST}. {686091600 7200 0 EET}. {701820000 10800 1 EEST}. {71
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7055
              Entropy (8bit):3.732572949993817
              Encrypted:false
              SSDEEP:96:k7tmcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:kbRNH4Mn82rlo6XIZ9ALeBO
              MD5:D9A3FAE7D9B5C9681D7A98BFACB6F57A
              SHA1:11268DFEE6D2472B3D8615ED6D70B361521854A2
              SHA-256:C920B4B7C160D8CEB8A08E33E5727B14ECD347509CABB1D6CDC344843ACF009A
              SHA-512:7709778B82155FBF35151F9D436F3174C057EBF7927C48F841B1D8AF008EEA9BC181D862A57C436EC69A528FB8B9854D9E974FC9EEC4FFDFE983299102BCDFB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Zurich) {. {-9223372036854775808 2048 0 LMT}. {-3675198848 1786 0 BMT}. {-2385246586 3600 0 CET}. {-904435200 7200 1 CEST}. {-891129600 3600 0 CET}. {-872985600 7200 1 CEST}. {-859680000 3600 0 CET}. {347151600 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):165
              Entropy (8bit):4.848987525932415
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6wox6QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUwR1O
              MD5:2639233BCD0119FD601F55F2B6279443
              SHA1:AADF9931DF78F5BC16ED4638947E77AE52E80CA1
              SHA-256:846E203E4B40EA7DC1CB8633BF950A8173D7AA8073C186588CC086BC7C4A2BEE
              SHA-512:8F571F2BBE4C60E240C4EBBB81D410786D1CB8AD0761A99ABB61DDB0811ACC92DCC2F765A7962B5C560B86732286356357D3F408CAC32AC1B2C1F8EAD4AEAEA6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:GB) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):170
              Entropy (8bit):4.860435123210029
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6w4b/h8QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUw4bx
              MD5:51335479044A047F5597F0F06975B839
              SHA1:234CD9635E61E7D429C70E886FF9C9F707FEAF1F
              SHA-256:FAC3B11B1F4DA9D68CCC193526C4E369E3FAA74F95C8BEE8BB9FAE014ACD5900
              SHA-512:4E37EFDFBAFA5C517BE86195373D083FF4370C5031B35A735E3225E7B17A75899FAFFBDF0C8BCFCBC5DC2D037EE9465AD3ED7C0FA55992027DFD69618DC9918F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:GB-Eire) $TZData(:Europe/London).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.817383285510599
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwZ8RDMvn:SlSWB9IZaM3yF4FVAIgJtwZ8RQvn
              MD5:D19DC8277A68AA289A361D28A619E0B0
              SHA1:27F5F30CC2603E1BCB6270AF84E9512DADEEB055
              SHA-256:5B90891127A65F7F3C94B44AA0204BD3F488F21326E098B197FB357C51845B66
              SHA-512:B5DD9C2D55BDB5909A29FD386CF107B83F56CD9B9F979A5D3854B4112B7F8950F4E91FB86AF6556DCF583EE469470810F3F8FB6CCF04FDBD6625A4346D3CD728
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):150
              Entropy (8bit):4.868642878112439
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwe7/8RDMvn:SlSWB9IZaM3yF4FVAIgJtwI8RQvn
              MD5:B5065CD8B1CB665DACDB501797AF5104
              SHA1:0DB4E9AC6E38632302D9689A0A39632C2592F5C7
              SHA-256:6FC1D3C727CD9386A11CAF4983A2FC06A22812FDC7752FBFA7A5252F92BB0E70
              SHA-512:BBA1793CA3BBC768EC441210748098140AE820910036352F5784DD8B2DABA8303BA2E266CB923B500E8F90494D426E8BF115ACD0C000CD0C65896CE7A6AD9D66
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT+0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):150
              Entropy (8bit):4.8553095447791055
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtw4Hp8RDMvn:SlSWB9IZaM3yF4FVAIgJtw4J8RQvn
              MD5:E71CDE5E33573E78E01F4B7AB19F5728
              SHA1:C296752C449ED90AE20F5AEC3DC1D8F329C2274F
              SHA-256:78C5044C723D21375A1154AE301F29D13698C82B3702042C8B8D1EFF20954078
              SHA-512:6EBB39EF85DA70833F8B6CCD269346DC015743BC049F6F1B385625C5498F4E953A0CEDE76C60314EE671FE0F6EEB56392D62E0128F5B04BC68681F71718FE2BB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT-0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):149
              Entropy (8bit):4.843152601955343
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwPHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtwvp8RQvn
              MD5:FE666CDF1E9AA110A7A0AE699A708927
              SHA1:0E7FCDA9B47BC1D5F4E0DFAD8A9E7B73D71DC9E3
              SHA-256:0A883AFE54FAE0ED7D6535BDAB8A767488A491E6F6D3B7813CF76BB32FED4382
              SHA-512:763591A47057D67E47906AD22270D589100A7380B6F9EAA9AFD9D6D1EE254BCB1471FEC43531C4196765B15F2E27AF9AAB5A688D1C88B45FE7EEA67B6371466E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT0) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):154
              Entropy (8bit):4.869510201987464
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwE+FB5yRDMvn:SlSWB9IZaM3yF4FVAIgJtwE6BURQvn
              MD5:F989F3DB0290B2126DA85D78B74E2061
              SHA1:43A0A1737E1E3EF0501BB65C1E96CE4D0B5635FC
              SHA-256:41A45FCB805DB6054CD1A4C7A5CFBF82668B3B1D0E44A6F54DFB819E4C71F68A
              SHA-512:3EDB8D901E04798B566E6D7D72841C842803AE761BEF3DEF37B8CA481E79915A803F61360FA2F317D7BDCD913AF8F5BB14F404E80CFA4A34E4310055C1DF39F2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Greenwich) $TZData(:Etc/GMT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):106
              Entropy (8bit):4.860812879108152
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5/Lm/kXGm2OH1V9i:SlSWB9X5jmTm2OH1V8
              MD5:3D99F2C6DADF5EEEA4965A04EB17B1BB
              SHA1:8DF607A911ADF6A9DD67D786FC9198262F580312
              SHA-256:2C83D64139BFB1115DA3F891C26DD53B86436771A30FB4DD7C8164B1C0D5BCDE
              SHA-512:EDA863F3A85268BA7A8606E3DCB4D7C88B0681AD8C4CFA1249A22B184F83BFDE9855DD4E5CFC3A4692220E5BEFBF99ED10E13BD98DBCA37D6F29A10AB660EBE2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:HST) {. {-9223372036854775808 -36000 0 HST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.865313867650324
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8LizFVAIgN2qPJL/XF1p4WFKQ1n:SlSWB9IZaM3yWzFVAIgAML//p4wKi
              MD5:D828C0668A439FEB9779589A646793F8
              SHA1:1509415B72E2155725FB09615B3E0276F3A46E87
              SHA-256:CF8BFEC73D36026955FA6F020F42B6360A64ED870A88C575A5AA0CD9756EF51B
              SHA-512:0F864B284E48B993DD13296AF05AEB14EBE26AF32832058C1FC32FCCE78E85925A25D980052834035D37935FAAF1CB0A9579AECBE6ADCDB2791A134D88204EBF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Hong_Kong)]} {. LoadTimeZoneFile Asia/Hong_Kong.}.set TZData(:Hongkong) $TZData(:Asia/Hong_Kong).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.840758003302018
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqLGsA/8rtdVAIgvMGsA/8rN6+GAKyx/2RQqGsA/8ru:SlSWB9IZaM3yj6dVAIgv1b+XZx+RQj7
              MD5:18DEAAAC045B4F103F2D795E0BA77B00
              SHA1:F3B3FE5029355173CD5BA626E075BA73F3AC1DC6
              SHA-256:9BB28A38329767A22CD073DF34E46D0AA202172A4116FBF008DDF802E60B743B
              SHA-512:18140274318E913F0650D21107B74C07779B832C9906F1A2E98433B96AAEADF70D07044EB420A2132A6833EF7C3887B8927CFD40D272A13E69C74A63904F43C9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Atlantic/Reykjavik)]} {. LoadTimeZoneFile Atlantic/Reykjavik.}.set TZData(:Iceland) $TZData(:Atlantic/Reykjavik).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.75703014401897
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6EL/liEi2eDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+LzM2eDkr
              MD5:1E84F531F7992BFBD53B87831FE349E9
              SHA1:E46777885945B7C151C6D46C8F7292FC332A5576
              SHA-256:F4BDCAE4336D22F7844BBCA933795063FA1BCA9EB228C7A4D8222BB07A706427
              SHA-512:545D6DEB94B7A13D69F387FE758C9FC474DC02703F2D485FD42539D3CE03975CDEEFB985E4AA7742957952AF9E9F1E2DB84389277C3864C32C31D890BD399FB9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Antananarivo) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.802684724729281
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9WJxwFFkXGm2OHi/FvvUcfJ7XH0VQGFr6VVFSTL:SlSWB9X5+LxWJxwFJm2OHqFvd+VQSr6e
              MD5:4618C8D4F26C02A3A303DD1FB5DCFE46
              SHA1:857D376F5AFE75784E7F578C83E111B2EE18F74E
              SHA-256:94262B5A1E3423CD26BFFB3E36F63C1A6880304D00EE5B05985072D82032C765
              SHA-512:3F5CDDE3D2D5C8BC3DD6423888D7DB6A8EA3D4881ABE9E3857B9D0DDF756D0ECD9CAB7EF66343B0636D32E5CCF0ECEC1F56B9F4BC521CD24B3DB1D935F994AF0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Chagos) {. {-9223372036854775808 17380 0 LMT}. {-1988167780 18000 0 +05}. {820436400 21600 0 +06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.911693487750565
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9FBIEW3v/kXGm2OHAWMx5vXTLyvMVSYvC:SlSWB9X5+LxpW3vTm2OHAnx5PTIMVSYK
              MD5:5026A59BD9CCD6ABA665B4895EDB0171
              SHA1:8361778F615EFDDAA660E49545249005B6FC66C3
              SHA-256:37E1DAD2B019CCD6F8927602B079AD6DB7D71F55CBDA165B0A3EEF580B86DACF
              SHA-512:E081BDE3FC0D07E75C83C308A662C3A1837A387137BFA8D8E4A59797159F465654BAFFCE6B1458602255BD784CEE0BF70F542C3E893BC87A566630D54084CDCC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Christmas) {. {-9223372036854775808 25372 0 LMT}. {-2364102172 25200 0 +07}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):146
              Entropy (8bit):4.811431467315532
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9d/FkXGm2OHGXTvxoevXmVUXxXW5d6TW8C:SlSWB9X5+LxpJm2OHGXCeP3BG5Uq
              MD5:4C9502EC642E813E7B699281DD9809DF
              SHA1:98804A95F13CF4EED983AC019CD1A9EFC01AF719
              SHA-256:E8C591860DD42374C64E30850A3626017989CF16DDB85FDCC111AD92BD311425
              SHA-512:8BD7718055789FA7CFB2D50270C563E4D69E16283745701B07073A1CDA271F95B1884F297C2F22CB36EC9983BC759F03B05B39DFD0604CD3278DBCBFB6E12CA6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Cocos) {. {-9223372036854775808 23260 0 LMT}. {-2209012060 23400 0 +0630}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.775639640601132
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6EL9TKlBx+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+LxGV+Dkr
              MD5:DAD21C1CD103E6FF24ECB26ECC6CC783
              SHA1:FBCCCF55EDFC882B6CB003E66B0B7E52A3E0EFDE
              SHA-256:DA2F64ADC2674BE934C13992652F285927D8A44504327950678AD3B3EC285DCE
              SHA-512:EA3B155D39D34AFB789F486FAA5F2B327ADB62E43FE5757D353810F9287D9E706773A034D3B2E5F050CCC2A24B31F28A8C44109CCCF43509F2B8547D107FD4A4
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Comoro) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):143
              Entropy (8bit):4.822244827214297
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6EL12hJFkXGm2OHvdFFr9vM0VQL:SlSWB9X5+L5Mm2OHlFFr1nVQL
              MD5:5223EC10BCFBC18A9FA392340530E164
              SHA1:A59B4F19A3F052B2A3EB57E0D2652E81FB665B50
              SHA-256:17750D6A9B8ED41809D8DC976777A5252CCB70F39C3BF396B55557A8E504CB09
              SHA-512:2B2EFC470FE4461F82B1F1909C2A953934938D5DC8B54B2DA3A48678CF23ECD7874187E0FA4F6241FC02AEE0AF29B861C3FEEC15BB90E5C7D3A609DBB50EDC2C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Kerguelen) {. {-9223372036854775808 0 0 -00}. {-631152000 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):143
              Entropy (8bit):4.873998321422911
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6ELzJMyFkXGm2OHuVdF+YvXTW1U9VsRYvC:SlSWB9X5+L/TJm2OHWgYPhSQC
              MD5:F8D00BD4AD23557FB4FC8EB095842C26
              SHA1:AD4AE41D0AD49E80FCF8CADE6889459EA30B57F7
              SHA-256:997C33DBCEA54DE671A4C4E0E6F931623BF4F39A821F9F15075B9ECCCCA3F1B8
              SHA-512:F67D348ECCCA244681EE7B70F7815593CFB2D7D4502832B2EB653EBF01AC66ACED29F7EA2E223D295C4D4F64287D372070EF863CCB201ACD8DF470330812013D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Mahe) {. {-9223372036854775808 13308 0 LMT}. {-2006653308 14400 0 +04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.833774224054436
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6ELzEyFkXGm2OHnz8evXZT5lxGYUQwGN0VQL:SlSWB9X5+L/EyJm2OHnz8ePZT5rG5QwI
              MD5:EC0C456538BE81FA83AF440948EED55E
              SHA1:11D7BA32A38547AF88F4182B6C1C3373AD89D75C
              SHA-256:18A4B14CD05E4B25431BAF7BFCF2049491BF4E36BB31846D7F18F186C9ECD019
              SHA-512:FF57F9EDFAD16E32B6A0BA656C5949A0A664D22001D5149BF036C322AEC1682E8B523C8E64E5A49B7EFA535A13459234C16237C09FC5B40F08AC22D56681C4BE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Maldives) {. {-9223372036854775808 17640 0 LMT}. {-2840158440 17640 0 MMT}. {-315636840 18000 0 +05}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):262
              Entropy (8bit):4.450791926516311
              Encrypted:false
              SSDEEP:6:SlSWB9X5+L/Hm2OHlNndSvulvSQFFYc0FZFeVhvSQFFbBjvVFZFbGlvSQC:MBp5+L/HmdHlNnS6jz0F7KZjbBjVF7bd
              MD5:040680E086764FC47EEBE039358E223C
              SHA1:4D10E6F69835533748DD5FD2E7409F9732221210
              SHA-256:C4054D56570F9362AB8FF7E4DBA7F8032720289AE01C03A861CCD8DEC9D2ABB2
              SHA-512:FC00B4AD7328EBC3025A482B3D6A0B176F3430BD3D06B918974EAC5BD30AD8551E0C6BE1DC03BE18A9BC6DD0919ED2A3717E20749ABECBFBD202764047D0D292
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Mauritius) {. {-9223372036854775808 13800 0 LMT}. {-1988164200 14400 0 +04}. {403041600 18000 1 +04}. {417034800 14400 0 +04}. {1224972000 18000 1 +04}. {1238274000 14400 0 +04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.778847657463255
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6ELzO1h4DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+L/O1h4De
              MD5:D89C649468B3C22CF5FA659AE590DE53
              SHA1:83DF2C14F1E51F5B89DCF6B833E421389F9F23DC
              SHA-256:071D17F347B4EB9791F4929803167497822E899761654053BD774C5A899B4B9C
              SHA-512:68334E11AAB0F8DCEEB787429832A60F4F0169B6112B7F74048EACFDE78F9C4D100E1E2682D188C3965E41A83477D3AECC80B73A2A8A1A80A952E59B431576A8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Mayotte) $TZData(:Africa/Nairobi).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):146
              Entropy (8bit):4.933616581218054
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5+L6ELsActFkXGm2OHuU7oevUdvcUeNVsRYvC:SlSWB9X5+Lam2OHb7oezfNSQC
              MD5:C50A592BB886F2FA48657900AE10789F
              SHA1:16D73BFFDAD18E751968E100BB391AABB29169E1
              SHA-256:3775EA8EBF5CBBD240E363FB62AEF8D2865A9D9969E40A15731DCC0AC03107EB
              SHA-512:F875F287E6C3A7B7325DB038CF419AA34FD0072FD3FCD138102008959F397026B647D8D339CB01362330905382FE7DCF5F8EC98C9B8C4FFF59A6FF4E78678BB7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Reunion) {. {-9223372036854775808 13312 0 LMT}. {-1848886912 14400 0 +04}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):161
              Entropy (8bit):4.757854680369306
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8g5YFevFVAIgNqjNAt+XiMr4WFKBun:SlSWB9IZaM3yA5owFVAIgcjSt+Xvr4wh
              MD5:848663FD5F685FE1E14C655A0ABA7D6A
              SHA1:59A1BEE5B3BE01FB9D2C73777B7B4F1615DCE034
              SHA-256:DB6D0019D3B0132EF8B8693B1AB2B325D77DE3DD371B1AFDAE4904BE610BA2A6
              SHA-512:B1F8C08AF68C919DB332E6063647AF15CB9FED4046C16BEF9A58203044E36A0D1E69BD1B8703B15003B929409A8D83238B5AA67B910B920F0674C8A0EB5CF125
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Tehran)]} {. LoadTimeZoneFile Asia/Tehran.}.set TZData(:Iran) $TZData(:Asia/Tehran).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):172
              Entropy (8bit):4.778464205793726
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85zFFwVAIgN0AzFzt+WXnMr4WFKYzFp:SlSWB9IZaM3yZbwVAIgCAb+zr4wKY7
              MD5:B9D1F6BD0B0416791036C0E3402C8438
              SHA1:E1A7471062C181B359C06804420091966B809957
              SHA-256:E6EC28F69447C3D3DB2CB68A51EDCEF0F77FF4B563F7B65C9C71FF82771AA3E1
              SHA-512:A5981FD91F6A9A84F44A6C9A3CF247F9BE3AB52CE5FE8EE1A7BE19DD63D0B22818BC15287FE73A5EEC8BCE6022B9EAF54A10AA719ADF31114E188F31EA273E92
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Jerusalem)]} {. LoadTimeZoneFile Asia/Jerusalem.}.set TZData(:Israel) $TZData(:Asia/Jerusalem).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.668645988954937
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx00EIECpVAIg200EIEvvt9S//2IAcGE0EIEVn:SlSWB9IZaM3y7952VAIgp95vF029095V
              MD5:EA38E93941E21CB08AA49A023DCC06FB
              SHA1:1AD77CAC25DC6D1D04320FF2621DD8E7D227ECBF
              SHA-256:21908F008F08C55FB48F1C3D1A1B2016BDB10ED375060329451DE4E487CF0E5F
              SHA-512:D6F0684A757AD42B8010B80B4BE6542ADE96D140EC486B4B768E167502C776B8D289622FBC48BD19EB3D0B3BC4156715D5CCFC7952A479A990B07935B15D26DC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Jamaica)]} {. LoadTimeZoneFile America/Jamaica.}.set TZData(:Jamaica) $TZData(:America/Jamaica).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):159
              Entropy (8bit):4.791469556628492
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8aowVAIgNqaF9hM7/4WFK6n:SlSWB9IZaM3ypwVAIgcaF4r4wK6n
              MD5:338A18DEDF5A813466644B2AAE1A7CF5
              SHA1:BB76CE671853780F4971D2E173AE71E82EA24690
              SHA-256:535AF1A79CD01735C5D6FC6DB08C5B0EAFB8CF0BC89F7E943CF419CFA745CA26
              SHA-512:4D44CC28D2D0634200FEA0537EBC5DD50E639365B89413C6BF911DC2B95B78E27F1B92733FB859C794A8C027EA89E45E8C2D6E1504FF315AF68DB02526226AD2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Tokyo)]} {. LoadTimeZoneFile Asia/Tokyo.}.set TZData(:Japan) $TZData(:Asia/Tokyo).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.759848173726549
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG1/EOM2wFVAIgObT1/EOM8O68/FMKpUDH1/EOMi:SlSWB9IZaM3yc1EiwFVAIgOb1E48xME+
              MD5:A9C8CA410CA3BD4345BF6EAB53FAB97A
              SHA1:57AE7E6D3ED855B1FBF6ABF2C9846DFA9B3FFF47
              SHA-256:A63A99F0E92F474C4AA99293C4F4182336520597A86FCDD91DAE8B25AFC30B98
              SHA-512:C97CF1301DCEEE4DE26BCEEB60545BB70C083CD2D13ED89F868C7856B3532473421599ED9E7B166EA53A9CF44A03245192223D47BC1104CEBD1BF0AC6BF10898
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Kwajalein)]} {. LoadTimeZoneFile Pacific/Kwajalein.}.set TZData(:Kwajalein) $TZData(:Pacific/Kwajalein).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):171
              Entropy (8bit):4.779409803819657
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsbKJqYkdVAIgNGEnKJuYvW67beDcbKJ9n:SlSWB9IZaM3y7JdVAIgNTnYvW6PeD9n
              MD5:C4739F7B58073CC7C72EF2D261C05C5E
              SHA1:12FE559CA2FEA3F8A6610B1D4F43E299C9FB7BA5
              SHA-256:28A94D9F1A60980F8026409A65F381EDB7E5926A79D07562D28199B6B63AF9B4
              SHA-512:B2DC5CB1AD7B6941F498FF3D5BD6538CAF0ED19A2908DE645190A5C5F40AF5B34752AE8A83E6C50D370EA619BA969C9AB7F797F171192200CDA1657FFFB7F05A
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Tripoli)]} {. LoadTimeZoneFile Africa/Tripoli.}.set TZData(:Libya) $TZData(:Africa/Tripoli).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7471
              Entropy (8bit):3.7115445412724797
              Encrypted:false
              SSDEEP:96:TJOwNDgaXSgm7VTslzZBYxWq9beN6db6yq3BgLjx1uuE0KRPGdNjClOQuonZ2ltb:bSV7xxWq9aYdbsC/eLdGLg9a
              MD5:2F62D867C8605730BC8E43D300040D54
              SHA1:06AD982DF03C7309AF01477749BAB9F7ED8935A7
              SHA-256:D6C70E46A68B82FFC7A4D96FDA925B0FAAF973CB5D3404A55DFF2464C3009173
              SHA-512:0D26D622511635337E5C03D82435A9B4A9BCA9530F940A70A24AE67EA4794429A5D68B59197B978818BEF0799C3D5FA792F5720965291661ED067570BC56226B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MET) {. {-9223372036854775808 3600 0 MET}. {-1693706400 7200 1 MEST}. {-1680483600 3600 0 MET}. {-1663455600 7200 1 MEST}. {-1650150000 3600 0 MET}. {-1632006000 7200 1 MEST}. {-1618700400 3600 0 MET}. {-938905200 7200 1 MEST}. {-857257200 3600 0 MET}. {-844556400 7200 1 MEST}. {-828226800 3600 0 MET}. {-812502000 7200 1 MEST}. {-796777200 3600 0 MET}. {-781052400 7200 1 MEST}. {-766623600 3600 0 MET}. {228877200 7200 1 MEST}. {243997200 3600 0 MET}. {260326800 7200 1 MEST}. {276051600 3600 0 MET}. {291776400 7200 1 MEST}. {307501200 3600 0 MET}. {323830800 7200 1 MEST}. {338950800 3600 0 MET}. {354675600 7200 1 MEST}. {370400400 3600 0 MET}. {386125200 7200 1 MEST}. {401850000 3600 0 MET}. {417574800 7200 1 MEST}. {433299600 3600 0 MET}. {449024400 7200 1 MEST}. {465354000 3600 0 MET}. {481078800 7200 1 MEST}. {496803600 3600 0 MET
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):106
              Entropy (8bit):4.856431808856169
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx56xwkXGm2OHrXV4fvYv:SlSWB9X562m2OHrCi
              MD5:FF6BDAC2C77D8287B46E966480BFEACC
              SHA1:4C90F910C74E5262A27CC65C3433D34B5D885243
              SHA-256:FB6D9702FC9FB82779B4DA97592546043C2B7D068F187D0F79E23CB5FE76B5C2
              SHA-512:CA197B25B36DD47D86618A4D39BFFB91FEF939BC02EEB96679D7EA88E5D38737D3FE6BD4FD9D16C31CA5CF77D17DC31E5333F4E28AB777A165050EA5A4D106BA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MST) {. {-9223372036854775808 -25200 0 MST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8227
              Entropy (8bit):3.755606924782105
              Encrypted:false
              SSDEEP:96:xG5c2sGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:12dVUC2mWBNwWTxyWR
              MD5:2AB5643D8EF9FD9687A5C67AEB04AF98
              SHA1:2E8F1DE5C8113C530E5E6C10064DEA4AE949AAE6
              SHA-256:97028B43406B08939408CB1DD0A0C63C76C9A352AEA5F400CE6D4B8D3C68F500
              SHA-512:72A8863192E14A4BD2E05C508F8B376DD75BB4A3625058A97BBB33F7200B2012D92D445982679E0B7D11C978B80F7128B3A79B77938CEF6315AA6C4B1E0AC09C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MST7MDT) {. {-9223372036854775808 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MST}. {262774800 -21600 1 MDT}. {278496000 -252
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):185
              Entropy (8bit):4.836487818373659
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo6AdMSKBbh4IAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo68K5h490eu
              MD5:C3AEEA7B991B609A1CB253FDD5057D11
              SHA1:0212056C2A20DD899FA4A26B10C261AB19D20AA4
              SHA-256:599F79242382ED466925F61DD6CE59192628C7EAA0C5406D3AA98EC8A5162824
              SHA-512:38094FD29B1C31FC9D894B8F38909DD9ED3A76B2A27F6BC250ACD7C1EFF4529CD0B29B66CA7CCBEB0146DFF3FF0AC4AEEEC422F7A93422EF70BF723D12440A93
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:Mexico/BajaNorte) $TZData(:America/Tijuana).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):186
              Entropy (8bit):4.841665860441288
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0zjRJ+vFVAIg20zjRJZvt6AdMPCoQIAcGEzjRJ3:SlSWB9IZaM3y7zjRJQFVAIgpzjRJ1t6n
              MD5:89A5ED35215BA46C76BF2BD5ED620031
              SHA1:26F134644023A2D0DA4C8997C54E36C053AA1060
              SHA-256:D624945E20F30CCB0DB2162AD3129301E5281B8868FBC05ACA3AA8B6FA05A9DF
              SHA-512:C2563867E830F7F882E393080CE16A62A0CDC5841724E0D507CBA362DB8363BB75034986107C2428243680FE930BAC226E11FE6BA99C31E0C1A35D6DD1C14676
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Mazatlan)]} {. LoadTimeZoneFile America/Mazatlan.}.set TZData(:Mexico/BajaSur) $TZData(:America/Mazatlan).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):195
              Entropy (8bit):4.8300311016675606
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7zBDdVAIgpzBy6BXl490zBw:MBaIMYzipzU6Bi90zi
              MD5:E771850BA5A1C218EB1B31FDC564DF02
              SHA1:3675838740B837A96FF32694D1FA56DE01DE064F
              SHA-256:06A45F534B35538F32A77703C6523CE947D662D136C5EC105BD6616922AEEB44
              SHA-512:BD7AF307AD61C310EDAF01E618BE9C1C79239E0C8CDEC85792624A7CCE1B6251B0ADE066B8610AFDB0179F3EF474503890642284800B81E599CB830EC6C7C9AA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Mexico_City)]} {. LoadTimeZoneFile America/Mexico_City.}.set TZData(:Mexico/General) $TZData(:America/Mexico_City).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.8398862338201765
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG/u4pVAIgObT/NCxL5E1nUDH/uvn:SlSWB9IZaM3ycqIVAIgOboLivn
              MD5:7B274C782E9FE032AC4B3E137BF147BB
              SHA1:8469D17EC75D0580667171EFC9DE3FDF2C1E0968
              SHA-256:2228231C1BEF0173A639FBC4403B6E5BF835BF5918CC8C16757D915A392DBF75
              SHA-512:AE72C1F244D9457C70A120FD00F2C0FC2BDC467DBD5C203373291E00427499040E489F2B1358757EA281BA8143E28FB54D03EDE67970F74DACFCB308AC7F74CE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:NZ) $TZData(:Pacific/Auckland).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):176
              Entropy (8bit):4.832832776993659
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9WQ+DdVAIgObT9WQrF5AmtBFB/pUDH9WQpn:SlSWB9IZaM3ycwQ+DdVAIgObwQ5zzJjA
              MD5:C8D83C210169F458683BB35940E11DF6
              SHA1:278546F4E33AD5D0033AF6768EFAB0DE247DA74F
              SHA-256:CECF81746557F6F957FEF12DBD202151F614451F52D7F6A35C72B830075C478D
              SHA-512:4539AE6F7AF7579C3AA5AE4DEB97BD14ED83569702D3C4C3945DB06A2D8FFF260DA1DB21FF21B0BED91EE9C993833D471789B3A99C9A2986B7AC8ABFBBE5A8B7
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chatham)]} {. LoadTimeZoneFile Pacific/Chatham.}.set TZData(:NZ-CHAT) $TZData(:Pacific/Chatham).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):172
              Entropy (8bit):4.80475858956378
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0L5vf1+IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iLpd+90+u
              MD5:38C56298E75306F39D278F60B50711A6
              SHA1:8FD9CEAD17CCD7D981CEF4E782C3916BFEF2D11F
              SHA-256:E10B8574DD83C93D3C49E9E2226148CBA84538802316846E74DA6004F1D1534D
              SHA-512:F6AA67D78A167E553B97F092CC3791B591F800A6D286BE37C06F7ECABDFBCF43A397AEDC6E3EB9EB6A1CB95E8883D4D4F97890CA1877930AFCD5643B0C8548E9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:Navajo) $TZData(:America/Denver).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):166
              Entropy (8bit):4.854287452296565
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtAnL75h4WFKdv:SlSWB9IZaM3yMwVAIgEH5h4wKt
              MD5:AF9DD8961DB652EE1E0495182D99820D
              SHA1:979602E3C59719A67DE3C05633242C12E0693C43
              SHA-256:9A6109D98B35518921E4923B50053E7DE9B007372C5E4FFF75654395D6B56A82
              SHA-512:F022C3EFABFC3B3D3152C345ACD28387FFEA4B61709CBD42B2F3684D33BED469C4C25F2328E5E7D9D74D968E25A0419E7BCFF0EB55650922906B9D3FF57B06C8
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:PRC) $TZData(:Asia/Shanghai).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8227
              Entropy (8bit):3.751820462019181
              Encrypted:false
              SSDEEP:96:9d89jJC2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:49jgNf+aNwj/lpmlOxnKcndIG
              MD5:DB5250A28A3853951AF00231677AACAC
              SHA1:1FC1DA1121B9F5557D246396917205B97F6BC295
              SHA-256:4DFC264F4564957F333C0208DA52DF03301D2FD07943F53D8B51ECCDD1CB8153
              SHA-512:72594A17B1E29895A6B4FC636AAE1AB28523C9C8D50118FA5A7FDFD3944AD3B742B17B260A69B44756F4BA1671268DD3E8223EF314FF7850AFB81202BA2BBF44
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:PST8PDT) {. {-9223372036854775808 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-84376800 -25200 1 PDT}. {-68655600 -28800 0 PST}. {-52927200 -25200 1 PDT}. {-37206000 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -288
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5431
              Entropy (8bit):3.5627170055641306
              Encrypted:false
              SSDEEP:96:2DBgcGFG9qbhX7zHJ4uoyM/15WNQ+NyVy:2DBgcGFGkXxaD/CR
              MD5:6718CD07DCEBD2CA85FC1764BE45E46C
              SHA1:0BCD2E4267F2BDB499EA613C17B9C38CCFC2177A
              SHA-256:5D3D1B4180482099119383DC160520DCDA5D4E3EEC87F22EA20B7D4B599F5249
              SHA-512:95C16BC92B9B3C80F9FA10F5B49DAEB472D45C2489A455A31177A8679E21EF668F85450E1770CFB77CA43477B68EF11B3A4090C11CE6F7FA518040EA7B502855
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Apia) {. {-9223372036854775808 45184 0 LMT}. {-2445424384 -41216 0 LMT}. {-1861878784 -41400 0 -1130}. {-631110600 -39600 0 -11}. {1285498800 -36000 1 -11}. {1301752800 -39600 0 -11}. {1316872800 -36000 1 -11}. {1325239200 50400 0 +13}. {1333202400 46800 0 +13}. {1348927200 50400 1 +13}. {1365256800 46800 0 +13}. {1380376800 50400 1 +13}. {1396706400 46800 0 +13}. {1411826400 50400 1 +13}. {1428156000 46800 0 +13}. {1443276000 50400 1 +13}. {1459605600 46800 0 +13}. {1474725600 50400 1 +13}. {1491055200 46800 0 +13}. {1506175200 50400 1 +13}. {1522504800 46800 0 +13}. {1538229600 50400 1 +13}. {1554559200 46800 0 +13}. {1569679200 50400 1 +13}. {1586008800 46800 0 +13}. {1601128800 50400 1 +13}. {1617458400 46800 0 +13}. {1632578400 50400 1 +13}. {1648908000 46800 0 +13}. {1664028000 50400 1 +13}. {1680357600 46800 0 +13}. {169
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8487
              Entropy (8bit):3.8173754903771018
              Encrypted:false
              SSDEEP:96:WNj7nBIc0fw4eJ7a1N1oKe13aNiWbF8sYBpYhuVn:Cmc3J7a1N18QOs8
              MD5:6C008D6437C7490EE498605B5B096FDB
              SHA1:D7F6E7B3920C54EFE02A44883DBCD0A75C7FC46A
              SHA-256:B5BD438B748BA911E0E1201A83B623BE3F8130951C1377D278A7E7BC9CB7F672
              SHA-512:DA6992D257B1BA6124E39F90DDEE17DC3E2F3B38C3A68B77A93065E3E5873D28B8AE5D21CEC223BAADFBDD1B3A735BF1CEC1BDEB0C4BEAB72AAA23433A707207
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Auckland) {. {-9223372036854775808 41944 0 LMT}. {-3192435544 41400 0 NZMT}. {-1330335000 45000 1 NZST}. {-1320057000 41400 0 NZMT}. {-1300699800 43200 1 NZST}. {-1287396000 41400 0 NZMT}. {-1269250200 43200 1 NZST}. {-1255946400 41400 0 NZMT}. {-1237800600 43200 1 NZST}. {-1224496800 41400 0 NZMT}. {-1206351000 43200 1 NZST}. {-1192442400 41400 0 NZMT}. {-1174901400 43200 1 NZST}. {-1160992800 41400 0 NZMT}. {-1143451800 43200 1 NZST}. {-1125914400 41400 0 NZMT}. {-1112607000 43200 1 NZST}. {-1094464800 41400 0 NZMT}. {-1081157400 43200 1 NZST}. {-1063015200 41400 0 NZMT}. {-1049707800 43200 1 NZST}. {-1031565600 41400 0 NZMT}. {-1018258200 43200 1 NZST}. {-1000116000 41400 0 NZMT}. {-986808600 43200 1 NZST}. {-968061600 41400 0 NZMT}. {-955359000 43200 1 NZST}. {-936612000 41400 0 NZMT}. {-923304600 43200 1 NZST}. {-757425600 43200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):270
              Entropy (8bit):4.659789664861683
              Encrypted:false
              SSDEEP:6:SlSWB9X5Ftgm2OHHhp5PZiuoDZDVeXU8vScCv/yZEiIv:MBp5FtgmdHf5PZiDZJek8HCvK6iIv
              MD5:A85F8A9502E818ADE7759166B9C7A9AD
              SHA1:5E706E5491AFE1A8399D7815158924381A1F6D27
              SHA-256:C910696B4CC7CA3E713EE08A024D26C1E4E4003058DECD5B54B92A0B2F8A17E0
              SHA-512:682BDC7DA0C9BFFD98992973295E180FB3FAACEA514760211B5291AEE26CABF200B68CA0EA80D9083C52F32C2EE3D0A5E84141363D1784C2A6A9FD24C2CF38E9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Bougainville) {. {-9223372036854775808 37336 0 LMT}. {-2840178136 35312 0 PMMT}. {-2366790512 36000 0 +10}. {-868010400 32400 0 +09}. {-768906000 36000 0 +10}. {1419696000 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7907
              Entropy (8bit):3.5670394561999235
              Encrypted:false
              SSDEEP:96:1zwIBIWUkebw49ikidrGlb0D6DALquK8KfStVt:1jIbw49ikiAcWuB
              MD5:5DF25A6A6E7322528FE41B6FD5FE5119
              SHA1:E84915BA27443F01243050D648DF6388A1E8EDBA
              SHA-256:B6727010950418F6FC142658C74EE1D717E7FD2B46267FC215E53CA3D55E894E
              SHA-512:842ABE39AB26713D523A36895D7435DC2058846431CB2A0B7B47E204F8C315ADB855F95EC2852D57B73ECA0576CB1A49BB104C0D7BB9DE2E96143DA9C77F9A58
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Chatham) {. {-9223372036854775808 44028 0 LMT}. {-3192437628 44100 0 +1215}. {-757426500 45900 0 +1245}. {152632800 49500 1 +1245}. {162309600 45900 0 +1245}. {183477600 49500 1 +1245}. {194968800 45900 0 +1245}. {215532000 49500 1 +1245}. {226418400 45900 0 +1245}. {246981600 49500 1 +1245}. {257868000 45900 0 +1245}. {278431200 49500 1 +1245}. {289317600 45900 0 +1245}. {309880800 49500 1 +1245}. {320767200 45900 0 +1245}. {341330400 49500 1 +1245}. {352216800 45900 0 +1245}. {372780000 49500 1 +1245}. {384271200 45900 0 +1245}. {404834400 49500 1 +1245}. {415720800 45900 0 +1245}. {436284000 49500 1 +1245}. {447170400 45900 0 +1245}. {467733600 49500 1 +1245}. {478620000 45900 0 +1245}. {499183200 49500 1 +1245}. {510069600 45900 0 +1245}. {530632800 49500 1 +1245}. {541519200 45900 0 +1245}. {562082400 49500 1 +1245}. {5735736
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):145
              Entropy (8bit):4.989695428683993
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH9CoFeEXGm2OHIOYvXmdcnWZUUJv:SlSWB9X5ZzLm2OHNYPmdcXQ
              MD5:61C075090B025E69800B23E0AD60459F
              SHA1:F847CA6D35BD4AF2C70B318D4EE4A2FB5C77D449
              SHA-256:3237743592D8719D0397FA278BB501E6F403985B643D1DE7E2DA91DD11BE215B
              SHA-512:5D07FB2FEAA9110D62CFD95BC729AA57F2A176C977D2E2C00374AF36EE84C4FB9416ECBEF179298928AAE9634B69C5FE889C5C9D2DFF290CAC0F6E53EDEC1A48
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Chuuk) {. {-9223372036854775808 36428 0 LMT}. {-2177489228 36000 0 +10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7935
              Entropy (8bit):3.4518545894421475
              Encrypted:false
              SSDEEP:96:OX45AGaHe2Y9btlqStWdmPndSy//TQMpeQkZyYbK6HdtLQOXJ/+:OX45AGdT9ZtWdmPnZ/TQfbbKsXJ2
              MD5:9B0B358E33E33FEFE38BEF73232919F3
              SHA1:7164F24730A37875128BE3F2FB4E9BC076AB9F39
              SHA-256:E02B71C59DF59109D12EBE60ED153922F1DFF3F5C4AD207E267AB025792C51F4
              SHA-512:A0C4A98B0B40FDE690A8EEE7A2C2F16C3E70C6F406FF0699B98CB837C72C6A1259395167795F2CFBBD2943E602AC0483C62B9D6209B8258018F7D78E103BBB15
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Easter) {. {-9223372036854775808 -26248 0 LMT}. {-2524495352 -26248 0 EMT}. {-1178124152 -25200 0 -07}. {-36619200 -21600 1 -07}. {-23922000 -25200 0 -07}. {-3355200 -21600 1 -07}. {7527600 -25200 0 -07}. {24465600 -21600 1 -07}. {37767600 -25200 0 -07}. {55915200 -21600 1 -07}. {69217200 -25200 0 -07}. {87969600 -21600 1 -07}. {100666800 -25200 0 -07}. {118209600 -21600 1 -07}. {132116400 -25200 0 -07}. {150868800 -21600 1 -07}. {163566000 -25200 0 -07}. {182318400 -21600 1 -07}. {195620400 -25200 0 -07}. {213768000 -21600 1 -07}. {227070000 -25200 0 -07}. {245217600 -21600 1 -07}. {258519600 -25200 0 -07}. {277272000 -21600 1 -07}. {289969200 -25200 0 -07}. {308721600 -21600 1 -07}. {321418800 -25200 0 -07}. {340171200 -21600 1 -07}. {353473200 -25200 0 -07}. {371620800 -21600 1 -07}. {384922800 -21600 0 -06}. {403070400 -180
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):705
              Entropy (8bit):4.002147979275868
              Encrypted:false
              SSDEEP:12:MBp5cJmdH6mv6kJ2RX/x6DydjX2tHcsXFX2hE5zuGqptxv:cuesUMkGdXWF3A
              MD5:48DEC5B1A9AADA4F09D03FEB037A2FE8
              SHA1:6D25E80F0570236565F098DD0A637F546957F117
              SHA-256:4F9AC8B0FE89990E8CF841EED9C05D92D53568DE772247F70A70DC11CBD78532
              SHA-512:0FA4693F3FDAB12DB04B6D50E0782A352CF95A7C2765CF1906BAA35355755E324E1B17005DF3748DBE42743FE824AE983316958B2EC0A9B0B7D136BEC06AB983
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Efate) {. {-9223372036854775808 40396 0 LMT}. {-1829387596 39600 0 +11}. {433256400 43200 1 +11}. {448977600 39600 0 +11}. {467298000 43200 1 +11}. {480427200 39600 0 +11}. {496760400 43200 1 +11}. {511876800 39600 0 +11}. {528210000 43200 1 +11}. {543931200 39600 0 +11}. {559659600 43200 1 +11}. {575380800 39600 0 +11}. {591109200 43200 1 +11}. {606830400 39600 0 +11}. {622558800 43200 1 +11}. {638280000 39600 0 +11}. {654008400 43200 1 +11}. {669729600 39600 0 +11}. {686062800 43200 1 +11}. {696340800 39600 0 +11}. {719931600 43200 1 +11}. {727790400 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):208
              Entropy (8bit):4.767926806075848
              Encrypted:false
              SSDEEP:6:SlSWB9X5Vm2OH1oePmWXytFBVyv7fPfTVVFmv:MBp5VmdH15PZsBVyDXfZvY
              MD5:D7EE7623A410715B1F34DC06F5400996
              SHA1:1ADD299AB66A0BCC32D92EAFBC2CA3B277E1FA3D
              SHA-256:8CAF3AE352EC168BC0C948E788BB3CBFE3991F36A678A24B47711543D450AED8
              SHA-512:356C3ECC40211B36FA1ECF8601AA8FAAE8080606F55AA4E706D239B8EE35ADE3987708716376D73053DB7A59B9A9B7A267EEDA6ED2A80A558FABA48E851C0EB1
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Enderbury) {. {-9223372036854775808 -41060 0 LMT}. {-2177411740 -43200 0 -12}. {307627200 -39600 0 -11}. {788871600 46800 0 +13}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):178
              Entropy (8bit):4.865240332098143
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH4ErKYvcXGm2OH18VkevXmUENBBdNiCPFVFv74v:SlSWB9X5BE3Lm2OH1VePmH7fP+v
              MD5:6CC11F5FAA361F69262AB8E7F4DB4F90
              SHA1:EA7ED940C0A3B5941972439DE1D735B4DC4AE0AA
              SHA-256:21C4C35919A24CD9C80BE1BD51C6714AA7EBF447396B3A2E63D330D905FA9945
              SHA-512:152709462F29EE14A727BE625E7ABD59625B6C4D4B36A2CE76B68D96CD176EDECA91DF26DAC553346ED360F2CA0F6C62981F50B088AE7BE1B998B425D91EF3B5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Fakaofo) {. {-9223372036854775808 -41096 0 LMT}. {-2177411704 -39600 0 -11}. {1325242800 46800 0 +13}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5505
              Entropy (8bit):3.545141446818078
              Encrypted:false
              SSDEEP:96:9ebtKf1V/ncXDwwn+q5Y6h+ueDJyqm5DHzv:EbIf1V/nGD5n+q5YPO
              MD5:67BE85DD77F7B520FD5705A4412157E3
              SHA1:04FA33692B8DBB8DDF89EF790646A0535943953D
              SHA-256:2FE87FF4AEBB58506B4E2552D3CB66AAC1D038D8C62F8C70B0EAF1CC508EC9FA
              SHA-512:35D4C46D187912D2B39C07A50DB0C56427ACF3755AD4B563B734BE26CA9C441AA0C2836266C803919786BF6DA9118A880CCF221FE9F9A9E30D610BE8E4913A9F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Fiji) {. {-9223372036854775808 42944 0 LMT}. {-1709985344 43200 0 +12}. {909842400 46800 1 +12}. {920124000 43200 0 +12}. {941896800 46800 1 +12}. {951573600 43200 0 +12}. {1259416800 46800 1 +12}. {1269698400 43200 0 +12}. {1287842400 46800 1 +12}. {1299333600 43200 0 +12}. {1319292000 46800 1 +12}. {1327154400 43200 0 +12}. {1350741600 46800 1 +12}. {1358604000 43200 0 +12}. {1382796000 46800 1 +12}. {1390050000 43200 0 +12}. {1414850400 46800 1 +12}. {1421503200 43200 0 +12}. {1446300000 46800 1 +12}. {1452952800 43200 0 +12}. {1478354400 46800 1 +12}. {1484402400 43200 0 +12}. {1509804000 46800 1 +12}. {1515852000 43200 0 +12}. {1541253600 46800 1 +12}. {1547301600 43200 0 +12}. {1572703200 46800 1 +12}. {1579356000 43200 0 +12}. {1604152800 46800 1 +12}. {1610805600 43200 0 +12}. {1636207200 46800 1 +12}. {1642255200 43200
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.974991227981989
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH4QwyFtXGm2OHwodGevXmcpXrWXVN0UIvYv:SlSWB9X5BCEm2OHwxePmgSX0a
              MD5:23994D1C137B8BC2BA6E97739B38E7BD
              SHA1:36772677B3C869C49A829AF08486923321ADD50A
              SHA-256:F274C6CD08E5AA46FDEA219095DA8EA60DA0E95E5FD1CBCB9E6611DE47980F9E
              SHA-512:CB2DB35960D11322AD288912C5D82C8C579791E40E510A90D34AAB20136B17AA019EFD55D1C4A2D9E88F7AF79F15779AF7EC6856F3085161AC84C93872C61176
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Funafuti) {. {-9223372036854775808 43012 0 LMT}. {-2177495812 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):238
              Entropy (8bit):4.63034174284777
              Encrypted:false
              SSDEEP:6:SlSWB9X5fEjFJm2OHvQYezie7KV9dRncRviWFrN5/uFfXFfrin:MBp5fSFJmdH0zV7O9DdWFN5/uFfXdGn
              MD5:307B016C9E6A915B1760D9A6AD8E63C1
              SHA1:26B797811821C09CF6BAB76E05FF612359DF7318
              SHA-256:F1CB2B1EBD4911857F5F183E446A22E731BD57925AD07B15CA78A7BDDFED611F
              SHA-512:F7AAAEE32CAC84F7D54C29E07CB8952D61585B85CB4FFFB93DD824A71403FDF356EC0761E5EEE19D9F8139F11A9CAB0A7DAEADBD13B6DD4C0CDF9FB573794542
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Galapagos) {. {-9223372036854775808 -21504 0 LMT}. {-1230746496 -18000 0 -05}. {504939600 -21600 0 -06}. {722930400 -18000 1 -06}. {728888400 -21600 0 -06}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):149
              Entropy (8bit):4.931482658662627
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH5hBfcXGm2OHKToxYvUdNfiuvn:SlSWB9X5kTm2OHPxYYquv
              MD5:98754C9D99442282F5C911725764C5D1
              SHA1:7E679DC38A7C7873695E10814B04E3919D1BFB41
              SHA-256:7D09014BE33CB2B50554B6937B3E870156FDCB5C36E9F8E8925711E79C12FC74
              SHA-512:2044AEEDFEF948E502667D1C60E22814202E4BA657DE89A962B6E9E160A93B3B77BF0AC4F5159FC45D43B2038E624D90A4589FB87F3449CA10D350EF60373D17
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Gambier) {. {-9223372036854775808 -32388 0 LMT}. {-1806678012 -32400 0 -09}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):151
              Entropy (8bit):4.934129846149006
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH5RyJTLJyFkXGm2OHddHvpoxYvUdMWdHPVmv:SlSWB9X5LJHgm2OHdFGxYAHPAv
              MD5:193872CE34E69F8B499203BC70C2639B
              SHA1:7A2B8E346E3BF3BE48AAA330C3EEE47332E994AB
              SHA-256:F1D21C339E8155711AA7EF9F4059A738A8A4CE7A6B78FFDD8DCC4AC0DB5A0010
              SHA-512:D2114AD27922799B8C38B0486D1FAE838EC94A461388960A6F2D19F7763E09FF75A9C4619C52BE2626E8EA2275794B694C1A76E2711D10B77CE6E34259DBF2BE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Guadalcanal) {. {-9223372036854775808 38388 0 LMT}. {-1806748788 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):204
              Entropy (8bit):4.833752908914461
              Encrypted:false
              SSDEEP:6:SlSWB9X5bm2OHauezyRtAePmdSUUyWGHZFUeMn:MBp5bmdHanzCtBP1yWleMn
              MD5:AD14439D9E27F2D3545E17082150DC75
              SHA1:43DE1D4A90ABE54320583FAB46E6F9B428C0B577
              SHA-256:CE4D3D493E625DA15A8B4CD3008D9CBDF20C73101C82F4D675F5B773F4A5CF70
              SHA-512:77800323ED5AF49DA5E6314E94938BEAAEDD69BB61E338FAF024C3A22747310307A13C6CBBAFE5A48164855B238C2CAD354426F0EE7201B4FB5C129D68CB0E3B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Guam) {. {-9223372036854775808 -51660 0 LMT}. {-3944626740 34740 0 LMT}. {-2177487540 36000 0 GST}. {977493600 36000 0 ChST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):332
              Entropy (8bit):4.582125163058844
              Encrypted:false
              SSDEEP:6:SlSWB9X5PeQm2OHsVVPBraX3UNFvDrUXaWFvjHovLnvRY7p0:MBp5WQmdH0VPBa0VOT12G7O
              MD5:17ACB888B597247CB0CA3CA191E51640
              SHA1:9C2668BF0288D277ED2FE5DBCD5C34F5931004A6
              SHA-256:719EA0BC1762078A405936791C65E4255B4250FB2B305342FE768A21D6AF34BE
              SHA-512:9D02F784F0CD2195AEDEAA59E3ECD64B27928D48DCBC3EA2651B36B3BE7F8C6D9CBB66ACDC76DC02D94DF19C0A29306DD8C2A15AD89C24188FC3E4BCFBE6D456
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Honolulu) {. {-9223372036854775808 -37886 0 LMT}. {-2334101314 -37800 0 HST}. {-1157283000 -34200 1 HDT}. {-1155436200 -34200 0 HST}. {-880201800 -34200 1 HWT}. {-769395600 -34200 1 HPT}. {-765376200 -37800 0 HST}. {-712150200 -36000 0 HST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):188
              Entropy (8bit):4.795254976384326
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNnUDH0KNyFx/hpUDH2fe:SlSWB9IZaM3yc6e8dVAIgOb6ezvNNWya
              MD5:FA20CE420C5370C228EB169BBC083EFB
              SHA1:5B4C221AC97292D5002F6ABEB6BC66D7B8E2F01B
              SHA-256:83A14BF52D181B3229603393EA90B9535A2FF05E3538B8C9AD19F483E6447C09
              SHA-512:7E385FEBD148368F192FC6B1D5E4B8DD31F58EC4329BF9820D554E97402D0A582AB2EBCF46A5151D0167333349A83476BEB11C49BC0EBAADE5A297C42879E0C3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:Pacific/Johnston) $TZData(:Pacific/Honolulu).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):211
              Entropy (8bit):4.684652862044272
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH1meEXGm2OHjToevXmUBepRGFz4vQU8F/5f5vARVvVtQCn:SlSWB9X5iLm2OHjkePmLSz4YjRfSzvJn
              MD5:E22A2C0F847601F128986A48A4B72F90
              SHA1:4E1D047DC64AA57C311A22FB1DA8497CD7022192
              SHA-256:88260F34784960C229B2B282F8004FD1AF4BE1BC2883AAEE7D041A622933C3FE
              SHA-512:A80DAC1A2A3376A47E2A542DE92CCC733E440AF2F05A70823DA52A2490FC9D1762F35CE256E6D1F7CCD435EEFBD6B0FBC533459CD3AD79ACD52C7CA78C29317C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kiritimati) {. {-9223372036854775808 -37760 0 LMT}. {-2177415040 -38400 0 -1040}. {307622400 -36000 0 -10}. {788868000 50400 0 +14}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):201
              Entropy (8bit):4.763096849699127
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDH1+AtFkXGm2OHHvvXmc03VLpCcfzvwX0UIv4Q9Hmv:SlSWB9X598Jm2OHHvPmb9fLYX01Yv
              MD5:96235B4DD81BA681216B74046A5A8780
              SHA1:24D682CE5D7C4A3DF8C860CB80ED262085CB965C
              SHA-256:BE400ED502FA7EC34B8DE44B2A3D0AF3033292EF08FD1F5F276147E15460CFF6
              SHA-512:4B30A0A1806D5D96FE5F9B1208490E23EABB498B634C98D89553059E68292AAAB6B182FE367E2923DBE0BC03D023D9EFC0EC25F5DD19AB8AE878B32478FF4B55
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kosrae) {. {-9223372036854775808 39116 0 LMT}. {-2177491916 39600 0 +11}. {-7988400 43200 0 +12}. {915105600 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):205
              Entropy (8bit):4.788662012960935
              Encrypted:false
              SSDEEP:6:SlSWB9X5yErm2OH4T2ePmvfL/XytdrH0a:MBp5XrmdHWPoL8rUa
              MD5:885C86BCE6B3D83D9CD715D75170AA81
              SHA1:9607AC6B1756FEBF2BEC2A78138AF12C11FD46F6
              SHA-256:2E636A3576119F2976D2029E75F26A060A5C0800BF7B719F1CB4562D896A6432
              SHA-512:410D32CBAB0C1B9D948C2C1416B6D158650600748F1C96D16121DB5F0A9D8384A14067E8603576ED1101BD62F6529C6E7A129428B77CBA1D185214D051F2C6B2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kwajalein) {. {-9223372036854775808 40160 0 LMT}. {-2177492960 39600 0 +11}. {-7988400 -43200 0 -12}. {745848000 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):173
              Entropy (8bit):4.868505550342842
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHznHLXGm2OHy3HuxYvXmcQ/VpCcfzvwX0UIvYv:SlSWB9X5Qim2OHyexYPmf/ffLYX0a
              MD5:5664FAB6368844F8139F48C32A1486B9
              SHA1:55826443FB44D44B5331082568E2C46257A0F726
              SHA-256:CBBB814CE6E9F2FA1C8F485BBDB0B759FDA8C859BC989EC28D4756CC10B21A82
              SHA-512:1BD1D6C2224E0DCC7A1887ECEB38C64E8DEABF44BE52FE29C5A302BAD95C0EB9DBD20E5738F3916B8902FA084606E07BE3723C1BE62416EB1E6DC4AD215A56F0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Majuro) {. {-9223372036854775808 41088 0 LMT}. {-2177493888 39600 0 +11}. {-7988400 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):153
              Entropy (8bit):4.930595315407702
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHzrHeHkXGm2OHOx5vUdNpNFvvIVVCC:SlSWB9X5cHeLm2OHOnY/FvQVVL
              MD5:B41251BE6A78B9BA4F7859D344517738
              SHA1:8C0DFDD40B8AE1DFA6C3C1BDD44E8452F5EE49E1
              SHA-256:FC06B45FB8C5ED081BAFA999301354722AEF17DB2A9C58C6CDF81C758E63D899
              SHA-512:96D302EAA274BEE26325B8334DA8C3782B8DC0E279DDF464D281AF2B0CEE19E9254837A4B1D08F9B777BE892F639D205F6AB85C37C8F8B58A4867EA082FF054B
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Marquesas) {. {-9223372036854775808 -33480 0 LMT}. {-1806676920 -34200 0 -0930}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):189
              Entropy (8bit):4.763101291800624
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAtnUDHz0HvUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiZeg
              MD5:A5A67AC85621952E16528DD73C94346E
              SHA1:FB3D1AD833CD77B8FE68AC37FAA39FF4A9A69815
              SHA-256:B4C19E4D05CCBC73ABE5389EBCFCC5586036C1D2275434003949E1CF634B9C26
              SHA-512:5BB96561582BA3E9F2973322BCF76BD3F9023EC965A0CB504DFE13C127CA2ED562D040EC033DDB946FBB17E9FDD2EAB7532F88B2B0F1182CE880E41C920CFD36
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:Pacific/Midway) $TZData(:Pacific/Pago_Pago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):235
              Entropy (8bit):4.6089214752758965
              Encrypted:false
              SSDEEP:6:SlSWB9X5Jem2OHceR6sCHST0ikvScCdpShcX0a:MBp5JemdH9sxZHCDEta
              MD5:CBC3FE6B512B0A3E96B7F47E4CD830EB
              SHA1:A1962DF38BED723F8F747B8931B57FAAC2E8291C
              SHA-256:8118062E25736A4672B11D6A603B5A8FE2ED1A82E1814261DF087EA3071A7DD7
              SHA-512:18E0975189794068033AD000D6A3DA8859EDAAE9D546969AB683399031888307D3F52909DCFEB637CF719782D4F5E87D49A73D6D4B53DEF6FD98041B7A046686
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Nauru) {. {-9223372036854775808 40060 0 LMT}. {-1545131260 41400 0 +1130}. {-877347000 32400 0 +09}. {-800960400 41400 0 +1130}. {294323400 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):209
              Entropy (8bit):4.680590339435768
              Encrypted:false
              SSDEEP:6:SlSWB9X5Jm3Lm2OHJPm60jdFBJNsYv8FyGv7Kn:MBp5JmbmdHJPB0mYRGDKn
              MD5:54FD41634DDEAA58F9F9770DC82B3E5F
              SHA1:E5296ACE7239C4CD7E13D391676F910376556ACC
              SHA-256:9D4E202A1ED8609194A97ED0F58B3C36DF83F46AE92EAF09F8337317DCACA75F
              SHA-512:9A2192C1232368FA5D382062A2C48869155B727C970F5D5BCD5FE424FC9D15417394E637D77FCA793B633517A1BFED8D93E74F239A3BC1A6716615B6D877ADC6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Niue) {. {-9223372036854775808 -40780 0 LMT}. {-2177412020 -40800 0 -1120}. {-599575200 -41400 0 -1130}. {276089400 -39600 0 -11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):269
              Entropy (8bit):4.580350938236725
              Encrypted:false
              SSDEEP:6:SlSWB9X5JJpkLm2OH6uToePmUOvJiQHSJE8Gy+xS7zzv:MBp5JJAmdH6SPIvVH787+xkv
              MD5:147E5FF4670F8551895B7B0EC1A66D46
              SHA1:83F0D4DC817ED61E7985CC7AB3268B3EBAD657A3
              SHA-256:A56472811F35D70F95E74A7366297BFAAFBC034CD10E9C0F3C59EFFA21A74223
              SHA-512:FE183CA00E7D2B79F8E81E1FAF5E8CE103E430B7159C14CA915FD2BFE6D4381BF42EDB217E9D99C13D728CD09BB0E67562E84D957E9606F6B6C1AB08657DDBF9
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Norfolk) {. {-9223372036854775808 40312 0 LMT}. {-2177493112 40320 0 +1112}. {-599656320 41400 0 +1130}. {152029800 45000 1 +1230}. {162912600 41400 0 +1130}. {1443882600 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):314
              Entropy (8bit):4.468119357525684
              Encrypted:false
              SSDEEP:6:SlSWB9X5JcdJm2OHTYAfIX2pVzOa9FxpZPS62pm+v:MBp5JcLmdHTYJX2fzFjb123v
              MD5:A966877A1BEBFE5125460233A5C26728
              SHA1:721103E2BFC0991CE80708D77C3FBEDCC2B3C9D3
              SHA-256:8C282AC6DA722858D8B1755C710BE3EC4BD8EFEF4832A415E772EED287899315
              SHA-512:51B5BD7834D4B3BAEEF3E1A2E6F469F6FFC354407182CA87AF67C4F4F26D4CB116A60BBB08BC178950CA3CFF978E2809EFC73002A4F8883B454024A2FFCBD732
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Noumea) {. {-9223372036854775808 39948 0 LMT}. {-1829387148 39600 0 +11}. {250002000 43200 1 +11}. {257342400 39600 0 +11}. {281451600 43200 1 +11}. {288878400 39600 0 +11}. {849366000 43200 1 +11}. {857228400 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.94008377236012
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHurKeTFwSXGm2OH2ivkevXUPi1TsYvUdfWTVvvL:SlSWB9X5XevJm2OH23ePWieYCWZvvL
              MD5:7ABD13E51C01A85468F6511B6710E4B5
              SHA1:9DC80A7BFD7028DB672A20EF32C31B11F083BA99
              SHA-256:AEE9D8FBCB7413536DA1CBDC4F28B7863B3DDD5E6A5AB2A90CE32038AC0EA2B8
              SHA-512:6F6BBEBB10FD6B3987D3076D93DC06F5F765FAC22A90C4184AAF33C1FFD4CBD98464C8A0B4C0C38808AA6D08F91F5060BCEC83E278B8BEF21124C7FE427A09AF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pago_Pago) {. {-9223372036854775808 45432 0 LMT}. {-2445424632 -40968 0 LMT}. {-1861879032 -39600 0 SST}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):145
              Entropy (8bit):4.920441332270432
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHugEZFwcXGm2OHCAnvXmdQ4+vScCC:SlSWB9X5Xg2wTm2OHPnPmdQRvScCC
              MD5:4070C7A615EF7977537641B01FA46AD6
              SHA1:E80FF2BBD448B2399DBE56D279858D7D06EBA691
              SHA-256:F12CB444E9BA91385BED20E60E7DF1A0DB0CE76C6FC7ACA59EEF029BC56D5EA3
              SHA-512:5DD3FD1D0AA4D6DA3F274BEEC283A72B4532804AA9901AB4B1616D36C13CB8F5CC51DB8A6B89C019FAD875ABB567EFC8BD894AADC1E63E94A8CAC79F3E82CB6C
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Palau) {. {-9223372036854775808 32276 0 LMT}. {-2177485076 32400 0 +09}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.757588870650609
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHuQTWLMWkXGm2OHUVFvvXmXUlgloRNycyf/vGRvn:SlSWB9X5XQyLMCm2OHUVVPmXUKmOhf/+
              MD5:AB8D0D9514FA6C5E995AE76D2DAEA6D4
              SHA1:3775349B3BE806AA005174D91597D6F2C54E8EC5
              SHA-256:3BB856B2C966211D7689CD303DFDDACB3C323F3C2DA0FF47148A8C5B7BC0E1C4
              SHA-512:AB5D2E00C820D36A2A8B198AAC9350BEFA235EA848A11B16B042EE8124975DCAFC737D30D7C1A01D874B0937E469C2364441FCA686B5EB66A48251F587F55DC5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pitcairn) {. {-9223372036854775808 -31220 0 LMT}. {-2177421580 -30600 0 -0830}. {893665800 -28800 0 -08}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):147
              Entropy (8bit):4.9618148014469705
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHuy3EXGm2OH1/VvXmcrLmv:SlSWB9X5Xybm2OH1NPmSqv
              MD5:0D8489972CBD248971C83DA074C79030
              SHA1:3E390EDC1A2F678918220026F03E914BB6E8ED4B
              SHA-256:A85364C6E79EA16FD0C86A5CF74CCB84843009A6738AAED3B13A709F1BDF0DF7
              SHA-512:A43E459BAB47F133E27A67CFA448E94FBE796DDC23A2D6C3400437D3BC8F31AC2EF3541C4588CF494E1BBD55856C5FA8553A6CD92534E2243EFA31BE2BF5A4CC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pohnpei) {. {-9223372036854775808 37972 0 LMT}. {-2177490772 39600 0 +11}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.735143778298082
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGuySedVAIgObTuyvQnUDHu3HppUDHuyu:SlSWB9IZaM3yciySedVAIgObiyvQX3HP
              MD5:C963ECC06914E8E42F0B96504C1F041C
              SHA1:82D256793B22E9C07362708EE262A6B46AC13ACD
              SHA-256:86593D3A9DC648370A658D82DA7C410E26D818DB2749B79F57A802F8CED76BD3
              SHA-512:0F3691977F992A3FF281AD1577BA0BD4AAF7DB3F167E1A1FF139374C14B14F1A456BE7E7D362D698A8294A6AB906E69AC56E1EE0DAF77C13050553299FB6DAF5
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pohnpei)]} {. LoadTimeZoneFile Pacific/Pohnpei.}.set TZData(:Pacific/Ponape) $TZData(:Pacific/Pohnpei).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.8981931494123065
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHuwKXI3EXGm2OHwdvvXZUeQTnoowFZnqMVVMUJv:SlSWB9X5X/43Lm2OHwdvPZZQTnoDZDVN
              MD5:AF14EE836FE5D358C83568C5ACFA88C0
              SHA1:22026C7FE440E466193E6B6935C2047BD321F76B
              SHA-256:33E0A5DD919E02B7311A35E24DB37F86A20A394A195FE01F5A3BE7336F276665
              SHA-512:BEF151E1198D57328BA0FC01BB6F00AD51ADEEE99A97C30E0D08FFB3CFCB9E99B34DBAD03FCB3B19F17D60590FA0E6C5F2978954A3585CDFD31E32C93B05154D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Port_Moresby) {. {-9223372036854775808 35320 0 LMT}. {-2840176120 35312 0 PMMT}. {-2366790512 36000 0 +10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):907
              Entropy (8bit):3.848488423299009
              Encrypted:false
              SSDEEP:24:ccekzUF0tMUObNFnNUYWJYu+nkonSAOaJT/rbkoa5SBnLn:1zUuMUOnNUVJYxkonSAOaJTjbkoasRLn
              MD5:19F22E22F7B136EFCB45E83BC765E871
              SHA1:500CC7EA47902856727C2B6D23BF4DAFF6817EB4
              SHA-256:B1235ED60A50282E14F4B2B477F9936D15CAF91495CBB81971A2C9580209C420
              SHA-512:2FD667F105E57A62821B2BB301A1A31BB56FA6670AADC94F41337445335262FE40DA5DAE7113328E54379E45246B5419B94F8C8AFB73B1F2405E7F08F5D6FBCC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Rarotonga) {. {-9223372036854775808 -38344 0 LMT}. {-2177414456 -37800 0 -1030}. {279714600 -34200 0 -10}. {289387800 -36000 0 -10}. {309952800 -34200 1 -10}. {320837400 -36000 0 -10}. {341402400 -34200 1 -10}. {352287000 -36000 0 -10}. {372852000 -34200 1 -10}. {384341400 -36000 0 -10}. {404906400 -34200 1 -10}. {415791000 -36000 0 -10}. {436356000 -34200 1 -10}. {447240600 -36000 0 -10}. {467805600 -34200 1 -10}. {478690200 -36000 0 -10}. {499255200 -34200 1 -10}. {510139800 -36000 0 -10}. {530704800 -34200 1 -10}. {541589400 -36000 0 -10}. {562154400 -34200 1 -10}. {573643800 -36000 0 -10}. {594208800 -34200 1 -10}. {605093400 -36000 0 -10}. {625658400 -34200 1 -10}. {636543000 -36000 0 -10}. {657108000 -34200 1 -10}. {667992600 -36000 0 -10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.8048918219164065
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG5RFedVAIgObT5RSQnUDHtluKpUDH5Rp:SlSWB9IZaM3ycdedVAIgObaQvKM
              MD5:BE50B3EE2BD083842CFFB7698DD04CDE
              SHA1:0B8C8AFC5F94E33226F148202EFFBD0787D61FA2
              SHA-256:74DD6FE03E3061CE301FF3E8E309CF1B10FC0216EEC52839D48B210BCBD8CF63
              SHA-512:136BCF692251B67CD3E6922AD0A200F0807018DC191CAE853F2192FD385F8150D5CCF36DF641ED9C09701E4DBBB105BF97C7540D7FA9D9FFC440682B770DF5BA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Guam)]} {. LoadTimeZoneFile Pacific/Guam.}.set TZData(:Pacific/Saipan) $TZData(:Pacific/Guam).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):188
              Entropy (8bit):4.729839728044672
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAtnUDHthA5nUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiNXeg
              MD5:843BBE96C9590D69B09FD885B68DE65A
              SHA1:25BF176717A4578447E1D77F9BF0140AFF18625A
              SHA-256:4F031CB2C27A3E311CA4450C20FB5CF4211A168C39591AB02EEEC80A5A8BFB93
              SHA-512:B50301CFC8E5CF8C257728999B0D91C06E2F7C040D30F71B90BBC612959B519E8D27EE2DA9B8B9002483D3F4F173BB341A07898B4E4C98A146B3D988CA3BD5B2
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:Pacific/Samoa) $TZData(:Pacific/Pago_Pago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.900317309402027
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHqhFtXGm2OHl/oevUdNqRU8Cn:SlSWB9X5TTEm2OHloeYqRQn
              MD5:DDF599B7659B88603DF80E390471CB10
              SHA1:80FF5E0E99483CB8952EC137A261D034B6759D07
              SHA-256:B8282EC1E5BFA5E116C7DC5DC974B0605C85D423519F124754126E8F8FE439EC
              SHA-512:28F15CB6310190066936B7B21024205EC87A54D081415B1E46E72982814E1E2A41A2CE8B808D02E705100CE5ACBB1E69F1859E40A04F629B7004FBD89DD37899
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tahiti) {. {-9223372036854775808 -35896 0 LMT}. {-1806674504 -36000 0 -10}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):146
              Entropy (8bit):4.924466748251822
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHqQwcXGm2OHyyFpoevXmciRrWFN0UIvYv:SlSWB9X5TbTm2OHyyFGePmbu0a
              MD5:AE5E0FFFEEFD0A8E77233CB0E59DE352
              SHA1:7B7CC1095FB919946F3315C4A28994AEB1ECD51A
              SHA-256:1FCC6C0CC48538EDB5B8290465156B2D919DFA487C740EB85A1DF472C460B0E6
              SHA-512:1693FA5DE78FDCF79993CB137EE0568A4B8245D0177DF845356B3C2418641C8AA23CAA7069707C0E180FF9F5345D380A3575EEFFE0C8BC08E18E40ED0E1F6FA3
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tarawa) {. {-9223372036854775808 41524 0 LMT}. {-2177494324 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):436
              Entropy (8bit):4.271209640478309
              Encrypted:false
              SSDEEP:12:MBp5kJmdHmLP72Dcw8UtnKbUtrtAUt54bUtjg:cOem77il2eQ
              MD5:C32CDBF9C696134870351ABB80920E08
              SHA1:43918B7BF46EF2B574D684D36901592E43A45A8A
              SHA-256:8FE5EF266C660C4A25827BE9C2C4081A206D946DD46EBC1095F8D18F41536399
              SHA-512:1E10C548659A9CE0A9F0C7E6FD86EAD8627C07A8C9842933E7C6CD28EACDE3735DBFDCF7DD1DE5DDE7F2F102F7D584B3C44B1350AFDF7E1621FE9F565CD32362
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tongatapu) {. {-9223372036854775808 44360 0 LMT}. {-2177497160 44400 0 +1220}. {-915193200 46800 0 +13}. {915102000 46800 0 +13}. {939214800 50400 1 +13}. {953384400 46800 0 +13}. {973342800 50400 1 +13}. {980596800 46800 0 +13}. {1004792400 50400 1 +13}. {1012046400 46800 0 +13}. {1478350800 50400 1 +13}. {1484398800 46800 0 +13}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.865414495402954
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9CovedVAIgObT9CknUDHqAOsvUDH9Cov:SlSWB9IZaM3yckGedVAIgObkkTAOmy
              MD5:3282C08FE7BC3A5F4585E97906904AE1
              SHA1:09497114D1EC149FB5CF167CBB4BE2B5E7FFA982
              SHA-256:DC6263DCC96F0EB1B6709693B9455CB229C8601A9A0B96A4594A03AF42515633
              SHA-512:077924E93AC9F610CD9FE158655B631186198BD96995428EB9EE2082449BD36CBF6C214D86E51A6D9A83329FCD5E931C343AA14DBB286C53071D46692B81BC0D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chuuk)]} {. LoadTimeZoneFile Pacific/Chuuk.}.set TZData(:Pacific/Truk) $TZData(:Pacific/Chuuk).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):144
              Entropy (8bit):4.9366125478034935
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHp8FkXGm2OH4VkxYvXmcDVv0UIvYv:SlSWB9X5PJm2OHYkxYPmyv0a
              MD5:AD4044C0F87566AA5265DA84CD3DABBA
              SHA1:15ED1B5960B3E70B23C430B0281B108506BBE76C
              SHA-256:2C273BA8F8324E1B414B40DC356C78E0FD3C02D5E8158EA5753CA51E1185FC11
              SHA-512:AD4758B01038BCAA519776226B43D90CED89292BA47988F639D45FD5B5436ED4E3B16C27F9145EC973DCC242FF6ADC514D7CDD6660E7CE8DD8E92A96CDACD947
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Wake) {. {-9223372036854775808 39988 0 LMT}. {-2177492788 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):146
              Entropy (8bit):4.932023172694197
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFx5nUDHpEf/kXGm2OH3UPvXmcCRQH0UIvYv:SlSWB9X5tfTm2OHkPPmiH0a
              MD5:9FBFA7A7556A081F2352250B44EB0CB6
              SHA1:CB16A38A9E51FEFC803C4E119395B9BCDBA1CF95
              SHA-256:29ABBA5D792FB1D754347DED8E17423D12E07231015D5A65A5873BFC0CE474C7
              SHA-512:CD0FA19597D7188F1D05E8FE9DD9B650DDD30CBBEF3F16646715D5DEF5A261C1E92ADE781DEA609B163808D7A59A0F7AF168332D0134D87DADE42447ABE7E431
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Wallis) {. {-9223372036854775808 44120 0 LMT}. {-2177496920 43200 0 +12}.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):174
              Entropy (8bit):4.887747451136248
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9CovedVAIgObT9CknUDHnHPUDH9Cov:SlSWB9IZaM3yckGedVAIgObkkeBy
              MD5:63594F45385660A04D21C11B5F203FF4
              SHA1:CEEC55B952B8EBA952E0965D92220C8EF001E59E
              SHA-256:4418559478B5881DFAF3FE3246A4BFE2E62C46C1D3D452EE4CF5D9651C4F92B5
              SHA-512:B9B55B027EFB7E87D44E89191C03A8409A16FA19A52032E29210161AE8FED528A6504B7B487181847125AF2C7C129A0687323CDDC6D5454199229897F97F0AB0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chuuk)]} {. LoadTimeZoneFile Pacific/Chuuk.}.set TZData(:Pacific/Yap) $TZData(:Pacific/Chuuk).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):169
              Entropy (8bit):4.89278153269951
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVqEGIVyVAIgoqpEGuHtnSi67x/yQa0EGIv:SlSWB9IZaM3ymczVAIgocuN27x6qS
              MD5:975F22C426CE931547D50A239259609A
              SHA1:77D68DF6203E3A2C1A2ADD6B6F8E573EF849AE2E
              SHA-256:309DE0FBCCDAE21114322BD4BE5A8D1375CD95F5FC5A998B3F743E904DC1A131
              SHA-512:ABDF01FCD0D34B5A8E97C604F3976E199773886E87A13B3CDD2319A92BD34D76533D4BA41978F8AAA134D200B6E87F26CB8C223C2760A4D7A78CD7D889DB79BE
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Warsaw)]} {. LoadTimeZoneFile Europe/Warsaw.}.set TZData(:Poland) $TZData(:Europe/Warsaw).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):171
              Entropy (8bit):4.887895128079745
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxMvLSwFVAIgoqyMvLN6nM24h8QavMvLu:SlSWB9IZaM3ymvMv2wFVAIgovMvUe81B
              MD5:31202B87B7352110A03D740D66DCD967
              SHA1:439A3700721D4304FA81282E70F6305BB3706C8D
              SHA-256:8288E9E5FC25549D6240021BFB569ED8EB07FF8610AAA2D39CD45A025EBD2853
              SHA-512:AB95D3990DC99F6A06BF3384D98D42481E198B2C4D1B2C85E869A2F95B651DDF64406AB15C485698E24F26D1A081E22371CE74809915A7CCA02F2946FB8607BF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Lisbon)]} {. LoadTimeZoneFile Europe/Lisbon.}.set TZData(:Portugal) $TZData(:Europe/Lisbon).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):160
              Entropy (8bit):4.743612967973961
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qMvedVAIgNqBolOr4WFKfMv:SlSWB9IZaM3yKMvedVAIgcBoS4wKfMv
              MD5:A0C5022166493D766E827B88F806CA32
              SHA1:2A679A391C810122DDD6A7EF722C35328FC09D9C
              SHA-256:537EA39AFBA7CFC059DE58D484EF450BEE73C7903D36F09A16CA983CB5B8F686
              SHA-512:85FEF0A89087D2196EC817A6444F9D94A8D315A64EAE9615C615DBB79B30320CED0D49A1A6C2CD566C722971FA8908A675B1C8F7E64D6875505C60400219F938
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Taipei)]} {. LoadTimeZoneFile Asia/Taipei.}.set TZData(:ROC) $TZData(:Asia/Taipei).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):157
              Entropy (8bit):4.851755466867201
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8ZQckvFVAIgNtvQstlmFeWFKKQs:SlSWB9IZaM3yJmFVAIgztpwKg
              MD5:48E7BE02E802A47C0D2F87E633010F38
              SHA1:A547853A7ED03CE9C07FC3BAA0F57F5ABB4B636B
              SHA-256:2F362169FD628D6E0CB32507F69AD64177BC812E7E961E5A738F4F492B105128
              SHA-512:BCBE9BC1C08CFF97B09F8D566EC3B42B9CE8442FA4BECE37A18446CBBF0ECEDA66BA18ABFA5E52E7677B18FB5DABF00DF9E28DE17B094A690B097AFC7130EA89
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Seoul)]} {. LoadTimeZoneFile Asia/Seoul.}.set TZData(:ROK) $TZData(:Asia/Seoul).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.80663340464643
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq801cwFVAIgNtK1ERLkZ8O5h4WFKf1E:SlSWB9IZaM3yUpFVAIgWWLkth4wKfK
              MD5:9E2902F20F33CA25B142B6AA51D4D54F
              SHA1:C1933081F30ABB7780646576D7D0F54DC6F1BC51
              SHA-256:FCF394D598EC397E1FFEED5282874408D75A9C3FFB260C55EF00F30A80935CA4
              SHA-512:D56AF44C4E4D5D3E6FC31D56B9BA36BD8499683D1A3C9BC48EEE392C4AC5ACAA10E3E82282F5BDA9586AF26F4B6C0C5649C454399144F040CC94EA35BBB53B48
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Singapore)]} {. LoadTimeZoneFile Asia/Singapore.}.set TZData(:Singapore) $TZData(:Asia/Singapore).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):196
              Entropy (8bit):4.951561086936219
              Encrypted:false
              SSDEEP:6:SlSNJB9IZaM3y7p5oedVAIgppKNkjx+90pu:JBaIMYYpgN8+90M
              MD5:A1D42EC950DE9178058EAA95CCFBAA09
              SHA1:55BE1FAF85F0D5D5604685F9AC19286142FC7133
              SHA-256:888A93210241F6639FB9A1DB0519407047CB7F5955F0D5382F2A85C0C473D9A5
              SHA-512:3C6033D1C84B75871B8E37E71BFEE26549900C555D03F8EC20A31076319E2FEBB0240EC075C2CAFC948D629A32023281166A7C69AFEA3586DEE7A2F585CB5E82
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Puerto_Rico)]} {. LoadTimeZoneFile America/Puerto_Rico.}.set TZData(:SystemV/AST4) $TZData(:America/Puerto_Rico).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.900537547414888
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx02NEO4FVAIg202NEtYFkRDwh4IAcGE2NEOv:SlSNJB9IZaM3y7UEO4FVAIgpUEqFk+4b
              MD5:CFDB782F87A616B89203623B9D6E3DBF
              SHA1:1BB9F75215A172B25D3AE27AAAD6F1D74F837FE6
              SHA-256:62C72CF0A80A5821663EC5923B3F17C12CE5D6BE1E449874744463BF64BCC3D7
              SHA-512:085E5B6E81E65BC781B5BC635C6FA1E7BF5DC69295CF739C739F6361BF9EB67F36F7124A2D3E5ADA5F854149C84B9C8A7FB22E5C6E8FF57576EBDEA0E4D6560B
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Halifax)]} {. LoadTimeZoneFile America/Halifax.}.set TZData(:SystemV/AST4ADT) $TZData(:America/Halifax).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.911352504536709
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW6kR/eIAcGEsAzEun:SlSNJB9IZaM3y7hzipVAIgphzGCW6kcQ
              MD5:01215B5D234C433552A3BF0A440B38F6
              SHA1:B3A469977D38E1156B81A93D90E638693CFDBEEF
              SHA-256:2199E7DD20502C4AF25D57A58B11B16BA3173DB47EFA7AD2B33FDB72793C4DDB
              SHA-512:35D3BDE235FF40C563C7CEDD8A2CCBB4BAC2E2AA24A8E072EA0572BB231295D705EA9F84EEAA9FD2C735B1203332D8D97C3592A2B702BCFE9C81828D4F635205
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:SystemV/CST6) $TZData(:America/Regina).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.929669998131187
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx096dVAIg2096zAtkRwx/h4IAcGE96s:SlSNJB9IZaM3y796dVAIgp96Wkyxp49c
              MD5:CDE40B5897D89E19A3F2241912B96826
              SHA1:00DE53DC7AA97F26B1A8BF83315635FBF634ABB3
              SHA-256:3C83D3DB23862D9CA221109975B414555809C27D45D1ED8B9456919F8BA3BF25
              SHA-512:69DFC06ACF544B7F95DEF2928C1DFE4D95FAD48EE753AD994921E1967F27A3AF891A9F31DDEA547E1BED81C5D2ECF5FC93E75019F2327DE1E73A009422BE52EC
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Chicago)]} {. LoadTimeZoneFile America/Chicago.}.set TZData(:SystemV/CST6CDT) $TZData(:America/Chicago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):199
              Entropy (8bit):4.881715127736134
              Encrypted:false
              SSDEEP:6:SlSNJB9IZaM3y73G7mFVAIgp3GBLkkp4903G1:JBaIMY3G7Hp3GBLVp4903G1
              MD5:87FEA19F6D7D08F44F93870F7CBBD456
              SHA1:EB768ECB0B1B119560D2ACBB10017A8B3DC77FDD
              SHA-256:2B5887460D6FB393DED5273D1AA87A6A9E1F9E7196A8FA11B4DEB31FAD8922C8
              SHA-512:00DA47594E80D2DB6F2BE6E482A1140780B71F8BBE966987821249984627C5D8C31AA1F2F6251B4D5084C33C66C007A47AFF4F379FA5DA4A112BA028B982A85A
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indianapolis)]} {. LoadTimeZoneFile America/Indianapolis.}.set TZData(:SystemV/EST5) $TZData(:America/Indianapolis).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):190
              Entropy (8bit):5.071686349792137
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0wAy0vwVAIg20wAyatkR5ghxEH/h4IAcGEwAy0v:SlSNJB9IZaM3y71KVAIgp1Bkrp4901h
              MD5:5C43C828D9460B9DF370F0D155B03A5C
              SHA1:92F92CD64937703D4829C42FE5656C7CCBA22F4E
              SHA-256:3F833E2C2E03EF1C3CC9E37B92DBFBA429E73449E288BEBE19302E23EB07C78B
              SHA-512:A88EAA9DAAD9AC622B75BC6C89EB44A2E4855261A2F7077D8D4018F00FC82E5E1EA364E3D1C08754701A545F5EC74752B9F3657BF589CF76E5A3931F81E99BBF
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/New_York)]} {. LoadTimeZoneFile America/New_York.}.set TZData(:SystemV/EST5EDT) $TZData(:America/New_York).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):188
              Entropy (8bit):4.927529755640769
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNkRSm1hpUDH2fWRn:SlSNJB9IZaM3yc6e8dVAIgOb6ezvNkQN
              MD5:1A50997B6F22E36D2E1849D1D95D0882
              SHA1:F4AC3ABBEA4A67013F4DC52A04616152C4C639A9
              SHA-256:C94C64BF06FDE0A88F24C435A52BDDE0C5C70F383CD09C62D7E42EAB2C54DD2C
              SHA-512:CCBD66449983844B3DB440442892004D070E5F0DFF454B25C681E13EB2F25F6359D0221CE5FF7800AC794A32D4474FE1126EA2465DB83707FF7496A1B39E6E1A
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:SystemV/HST10) $TZData(:Pacific/Honolulu).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.953801751537501
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0utLaDvFVAIg20utLPtkRgFfh4IAcGEutLNn:SlSNJB9IZaM3y7O+FVAIgpObtkch490u
              MD5:2B415F2251BE08F1035962CE2A04149F
              SHA1:EFF5CE7CD0A0CBCF366AC531D168CCB2B7C46734
              SHA-256:569819420F44D127693C6E536CAC77410D751A331268D0C059A1898C0E219CF4
              SHA-512:971F1763558D8AC17753C01B7BB64E947C448AA29951064ED7C5997D4B4A652C7F5D7C2CB4F8040F73AD83D7E49B491B93047A06D8C699F33B08F4A064BE0DCC
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Phoenix)]} {. LoadTimeZoneFile America/Phoenix.}.set TZData(:SystemV/MST7) $TZData(:America/Phoenix).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.909831110037175
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx06RGFwVAIg206RAO0LkRMMFfh4IAcGE6Ru:SlSNJB9IZaM3y7+SwVAIgp+iLkD490+u
              MD5:895E9BAF5EDF0928D4962C3E6650D843
              SHA1:52513BFA267CA2E84FDDF3C252A4E8FD059F2847
              SHA-256:465A4DE93F2B103981A54827CDEBB10350A385515BB8648D493FD376AABD40AF
              SHA-512:CAF19320F0F507160E024C37E26987A99F2276622F2A6D8D1B7E3068E5459960840F4202FF8A98738B9BCA0F42451304FC136CBD36BBFE39F616622217AD89A3
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:SystemV/MST7MDT) $TZData(:America/Denver).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):187
              Entropy (8bit):4.782387645904801
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQGuQTWLM4YkvFVAIgObTuQTWLvqtkRQB5nUDHuQTWi:SlSNJB9IZaM3yciQyLM4YmFVAIgObiQq
              MD5:67AE3FD76B2202F3B1CF0BBC664DE8D0
              SHA1:4603DE0753B684A8D7ACB78A6164D5686542EE8E
              SHA-256:30B3FC95A7CB0A6AC586BADF47E9EFA4498995C58B80A03DA2F1F3E8A2F3553B
              SHA-512:BF45D0CA674DD631D3E8442DFB333812B5B31DE61576B8BE33B94E0433936BC1CD568D9FC522C84551E770660BE2A98F45FE3DB4B6577968DF57071795B53AD9
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pitcairn)]} {. LoadTimeZoneFile Pacific/Pitcairn.}.set TZData(:SystemV/PST8) $TZData(:Pacific/Pitcairn).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):199
              Entropy (8bit):4.959254419324467
              Encrypted:false
              SSDEEP:6:SlSNJB9IZaM3y7DvwFVAIgpdJLkQ1p490Dvn:JBaIMYFpdJLh090z
              MD5:DFB48E0E2CE5D55DC60B3E95B7D12813
              SHA1:535E0BF050E41DCFCE08686AFDFAFF9AAFEF220C
              SHA-256:74096A41C38F6E0641934C84563277EBA33C5159C7C564C7FF316D050083DD6D
              SHA-512:3ECDF3950ED3FB3123D6C1389A2A877842B90F677873A0C106C4CA6B180EEC38A26C74E21E8A3036DA8980FF7CA9E1578B0E1D1A3EA364A4175772F468747425
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:SystemV/PST8PDT) $TZData(:America/Los_Angeles).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.905971098884841
              Encrypted:false
              SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQG5hB5pVAIgObT5hBiLkRKlUDH5hBun:SlSNJB9IZaM3ycTpVAIgOb4LkK
              MD5:CED0A343EF3A316902A10467B2F66B9B
              SHA1:5884E6BA28FD71A944CA2ED9CB118B9E108EF7CB
              SHA-256:1BB5A98B80989539135EAB3885BBA20B1E113C19CB664FB2DA6B150DD1F44F68
              SHA-512:903D1DC6D1E192D4A98B84247037AE171804D250BB5CB84D2C5E145A0BDC50FCD543B70BAFF8440AFF59DA14084C8CEEFB2F912A02B36B7571B0EEEC154983B3
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Gambier)]} {. LoadTimeZoneFile Pacific/Gambier.}.set TZData(:SystemV/YST9) $TZData(:Pacific/Gambier).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):193
              Entropy (8bit):4.949109665596263
              Encrypted:false
              SSDEEP:6:SlSNJB9IZaM3y7/9EtDvFVAIgp/9EmLkB490/9E6:JBaIMY/944p/9xLN90/9F
              MD5:D588930E34CF0A03EFEE7BFBC5022BC3
              SHA1:0714C6ECAAF7B4D23272443E5E401CE141735E78
              SHA-256:4D1CAE3C453090667549AB83A8DE6F9B654AAC5F540192886E5756A01D21A253
              SHA-512:ABE69BEF808D7B0BEF9F49804D4A753E033D7C99A7EA57745FE4C3CBE2C26114A8845A219ED6DEAB8FA009FDB86E384687068C1BCF8B704CCF24DA7029455802
              Malicious:false
              Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Anchorage)]} {. LoadTimeZoneFile America/Anchorage.}.set TZData(:SystemV/YST9YDT) $TZData(:America/Anchorage).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):175
              Entropy (8bit):4.882090609090058
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV0XaDvFVAIgoq3XPHtjCl1yQaqXNn:SlSWB9IZaM3ymQazFVAIgoQPHtSymN
              MD5:41703ED241199F0588E1FC6FF0F33E90
              SHA1:08B4785E21E21DFE333766A7198C325CD062347B
              SHA-256:4B8A8CE69EE94D7E1D49A2E00E2944675B66BD16302FE90E9020845767B0509B
              SHA-512:F90F6B0002274AF57B2749262E1530E21906162E4D1F3BE89639B5449269F3026A7F710C24765E913BC23DEC5A6BF97FC0DD465972892D851B6EAEEF025846CA
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Istanbul)]} {. LoadTimeZoneFile Europe/Istanbul.}.set TZData(:Turkey) $TZData(:Europe/Istanbul).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.792993822845485
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAmMwFVAIghO6iGMFfh8RS:SlSWB9IZaM3y1wFVAIghFiP8RS
              MD5:1921CC58408AD2D7ED3B5308C71B1A28
              SHA1:12F832D7B3682DC28A49481B8FBA8C55DCDC60D0
              SHA-256:92FC6E3AA418F94C486CE5BF6861FAA4E85047189E98B90DA78D814810E88CE7
              SHA-512:EB134E2E7F7A811BFA8223EB4E98A94905EA24891FD95AB29B52DE2F683C97E086AA2F7B2EA93FBA2451AAEDD22F01219D700812DABC7D6670028ACF9AAB8367
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UCT)]} {. LoadTimeZoneFile Etc/UCT.}.set TZData(:UCT) $TZData(:Etc/UCT).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):184
              Entropy (8bit):4.864166947846424
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/VXEtDvFVAIg20/VXE0JLiOGl0IAcGE/VXE6n:SlSWB9IZaM3y7/9EtDvFVAIgp/9EmLiB
              MD5:0763082FF8721616592350D8372D59FF
              SHA1:CEBB03EB7F44530CF52DCA7D55DC912015604D94
              SHA-256:94FDFE2901596FC5DCE74A5560431F3E777AE1EBEEE59712393AE2323F17ADFA
              SHA-512:DFE8AAA009C28C209A925BBE5509589C0087F6CC78F94763BFA9F1F311427E3FF2E377EB340590383D790D3578C1BB37D41525408D027763EA96ECB3A3AAD65D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Anchorage)]} {. LoadTimeZoneFile America/Anchorage.}.set TZData(:US/Alaska) $TZData(:America/Anchorage).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):171
              Entropy (8bit):4.839824852896375
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/yO5pVAIg20/yOvYvtiObMEIB/4IAcGE/yOun:SlSWB9IZaM3y7/ykVAIgp/y9FitE8/47
              MD5:01142938A2E5F30FADE20294C829C116
              SHA1:8F9317E0D3836AF916ED5530176C2BF7A929C3C7
              SHA-256:1DD79263FB253217C36A9E7DDCB2B3F35F208E2CE812DCDE5FD924593472E4FE
              SHA-512:2C47FE8E8ED0833F4724EF353A9A6DFCE3B6614DA744E64364E9AB423EC92565FEF1E8940CB12A0BCCFE0BD6B44583AF230A4ABCC0BAE3D9DC43FBB2C7941CFF
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Adak)]} {. LoadTimeZoneFile America/Adak.}.set TZData(:US/Aleutian) $TZData(:America/Adak).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.886225611026426
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0utLaDvFVAIg20utLPtiQMfQfBx+IAcGEutLNn:SlSWB9IZaM3y7O+FVAIgpObtiZfQfH+v
              MD5:090DC30F7914D5A5B0033586F3158384
              SHA1:2F526A63A1C47F88E320BE1C12CA8887DA2DC989
              SHA-256:47D25266ABBD752D61903C903ED3E9CB485A7C01BD2AA354C5B50DEBC253E01A
              SHA-512:5FE75328595B5DECDAC8D318BEE89EAD744A881898A4B45DD2ABB5344B13D8AFB180E4A8F8D098A9589488D9379B0153CBC5CF638AF7011DE89C57B554F42757
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Phoenix)]} {. LoadTimeZoneFile America/Phoenix.}.set TZData(:US/Arizona) $TZData(:America/Phoenix).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):179
              Entropy (8bit):4.854450230853601
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx096dVAIg2096zAtibXgox/h4IAcGE96s:SlSWB9IZaM3y796dVAIgp96WiB49096s
              MD5:E0801B5A57F40D42E8AF6D48C2A41467
              SHA1:A49456A1BF1B73C6B284E0764AEAFD1464E70DDC
              SHA-256:16C7FFCE60495E5B0CB65D6D5A0C3C5AA9E62BD6BC067ABD3CD0F691DA41C952
              SHA-512:3DE6A41B88D6485FD1DED2DB9AB9DAD87B9F9F95AA929D38BF6498FC0FD76A1048CE1B68F24CD22C487073F59BD955AFCB9B7BF3B20090F81FA250A5E7674A53
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Chicago)]} {. LoadTimeZoneFile America/Chicago.}.set TZData(:US/Central) $TZData(:America/Chicago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):223
              Entropy (8bit):4.715837665658945
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBLi3E0903GK1:MBaIMY3GK7Hp3GKBLi3t903GK1
              MD5:1A27644D1BF2299B7CDDED7F405D6570
              SHA1:BD03290A6E7A967152E2E4F95A82E01E7C35F63C
              SHA-256:1C46FAEDFACEB862B2E4D5BD6AC63E5182E1E2CFD2E1CDFA2661D698CC8B0072
              SHA-512:9D6F3E945656DD97A7E956886C1123B298A87704D4F5671E4D1E94531C01F8BE377D83239D8BE78E2B3E1C0C20E5779BA3978F817A6982FE607A18A7FDCF57FB
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:US/East-Indiana) $TZData(:America/Indiana/Indianapolis).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):182
              Entropy (8bit):4.990255962392122
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0wAy0vwVAIg20wAyati37oxp4IAcGEwAy0v:SlSWB9IZaM3y71KVAIgp1Bi37oxp490n
              MD5:3FE03D768F8E535506D92A6BC3C03FD2
              SHA1:F82BF149CE203B5A4A1E106A495D3409AF7A07AC
              SHA-256:9F46C0E46F6FE26719E2CF1FA05C7646530B65FB17D4101258D357568C489D77
              SHA-512:ADFDBB270113A192B2378CC347DD8A57FDBDC776B06F9E16033EE8D5EAB49E16234CA2523580EEBB4DCDD27F33222EDD5514F0D7D85723597F059C5D6131E1B0
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/New_York)]} {. LoadTimeZoneFile America/New_York.}.set TZData(:US/Eastern) $TZData(:America/New_York).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):181
              Entropy (8bit):4.832149382727646
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNioMN75nUDH2fWRn:SlSWB9IZaM3yc6e8dVAIgOb6ezvNioEe
              MD5:347E51049A05224D18F264D08F360CBB
              SHA1:A801725A9B01B5E08C63BD2568C8F5D084F0EB02
              SHA-256:EA5D18E4A7505406D6027AD34395297BCF5E3290283C7CC28B4A34DB8AFBDD97
              SHA-512:C9B96C005D90DD8F317A697F59393D20663DE74D6E4D0B45BCE109B31A328D7AA62C51FAA8D00C728C0342940EF3B0F0921814B31BD7FE128A6E95F92CF50E06
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:US/Hawaii) $TZData(:Pacific/Honolulu).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):201
              Entropy (8bit):4.825742972037525
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y73GKXFVAIgp3GK4NiGIfh4903GKk:MBaIMY3GKXQp3GKeiBfh4903GKk
              MD5:E111813F4C9B888427B8363949C87C72
              SHA1:96B6692DCD932DCC856804BE0C2145538C4B2B33
              SHA-256:4E896634F3A400786BBD996D1FE0D5C9A346E337027B240F1671A7E4B38C8F69
              SHA-512:97726D7EDB7D7A1F6E815A0B875CAF9E2D2D27F50ECC866FBC6CB1B88836E8C2D64A9C108CD917C9D641B30822397664A2AC8010EADF0FF2A6C205AE4D5E7A2F
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Knox)]} {. LoadTimeZoneFile America/Indiana/Knox.}.set TZData(:US/Indiana-Starke) $TZData(:America/Indiana/Knox).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):180
              Entropy (8bit):4.7846496799669405
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06FQGFwVAIg206FQN6iHaMCELMr4IAcGE6FQu:SlSWB9IZaM3y74PFwVAIgp4xiHaMHL+U
              MD5:80A9A00EC1C5904A67DC3E8B2FDC3150
              SHA1:8E79FBEB49D9620E793E4976D0B9085E32C57E83
              SHA-256:8DB76FC871DD334DA87297660B145F8692AD053B352A19C2EFCD74AF923D762D
              SHA-512:0A5662E33C60030265ECAD1FF683B18F6B99543CA5FE22F88BCE597702FBEA20358BCB9A568D7F8B32158D9E6A3D294081D183644AD49C22AC3512F97BE480D4
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Detroit)]} {. LoadTimeZoneFile America/Detroit.}.set TZData(:US/Michigan) $TZData(:America/Detroit).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):177
              Entropy (8bit):4.84430947557215
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0LiBOlLo/4IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iLiBY8/49G
              MD5:13D6C7CF459995691E37741ACAF0A18D
              SHA1:A0626763930C282DF21ED3AA8F1B35033BA2F9DC
              SHA-256:223B5C8E34F459D7B221B83C45DBB2827ABE376653BAA1BC56D09D50DF136B08
              SHA-512:9076DFECC5D02DB38ECE3D2512D52566675D98A857711676E891D8741EA588153954357FE19F4C69305FF05D0F99286F1D496DF0C7FDBC8D59803D1B1CFA5F07
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:US/Mountain) $TZData(:America/Denver).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):191
              Entropy (8bit):4.885594237758327
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0ydJg4owFVAIg20ydJEvRLiP+e2IAcGEydJgvn:SlSWB9IZaM3y7DvwFVAIgpdJLip290Dv
              MD5:EBF51CD015BD387FA2BB30DE8806BDDA
              SHA1:63C2E2F4CD8BC719A06D59EF4CE4C31F17F53EA0
              SHA-256:B7AD78FB955E267C0D75B5F7279071EE17B6DD2842DAD61ADA0165129ADE6A86
              SHA-512:22BECE2AEAD66D921F38B04FDC5A41F2627FCC532A171EA1C9C9457C22CD79EFD1EC3C7CC62BC016751208AD1D064B0F03C2185F096982F73740D8426495F5ED
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:US/Pacific) $TZData(:America/Los_Angeles).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):195
              Entropy (8bit):4.931883193402467
              Encrypted:false
              SSDEEP:6:SlSWB9IZaM3y7DvwFVAIgpdJLi0Q90Dvn:MBaIMYFpdJLix90z
              MD5:01CD3EBFDB7715805572CDA3F81AC78A
              SHA1:C013C38D2FB9E649EE43FED6910382150C2B3DF5
              SHA-256:DEFE67C520303EF85B381EBEAED4511C0ACF8C49922519023C525E6A1B09B9DD
              SHA-512:266F35C34001CD4FF00F51F5CDF05E1F4D0B037F276EFD2D124C8AE3391D00128416D16D886B3ECDF9E9EFC81C66B2FD4ED55F154437ED5AA32876B855289190
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:US/Pacific-New) $TZData(:America/Los_Angeles).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):183
              Entropy (8bit):4.789322986138067
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAti6A5nUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiidXeg
              MD5:E883D478518F6DAF8173361A8D308D34
              SHA1:ABD97858655B0069BFD5E11DD95BF6D7C2109AEA
              SHA-256:DD4B1812A309F90ABBD001C3C73CC2AF1D4116128787DE961453CCBE53EC9B6A
              SHA-512:DA1FE6D92424404111CBB18CA39C8E29FA1F9D2FD262D46231FB7A1A78D79D00F92F5D1DEBB9B92565D1E3BA03EF20D2A44B76BA0FC8B257A601EED5976386CC
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:US/Samoa) $TZData(:Pacific/Pago_Pago).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):148
              Entropy (8bit):4.792993822845485
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLiLB5h8RFu:SlSWB9IZaM3yzUFVAIgBLiLfh8RI
              MD5:530F5381F9CD8542ED5690E47FC83358
              SHA1:29A065F004F23A5E3606C2DB50DC0AB28CAFC785
              SHA-256:AC0FF734DA267E5F20AB573DBD8C0BD7613B84D86FDA3C0809832F848E142BC8
              SHA-512:4328BDFD6AA935FD539EE2D4A3EBA8DD2A1BD9F44BA0CF30AA0C4EA57B0A58E3CDFAA312366A0F93766AE445E6E210EE57CD5ED60F74173EDF67C1C5CB987C68
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:UTC) $TZData(:Etc/UTC).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):154
              Entropy (8bit):4.829496870339919
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLiL7DJMFfh8RFu:SlSWB9IZaM3yzUFVAIgBLiL7VMr8RI
              MD5:60878BB8E8BE290911CAB2A16AAFAEF7
              SHA1:15C01523EDA134D3E38ECC0A5909A4579BD2A00D
              SHA-256:9324B6C871AC55771C44B82BF4A92AE0BE3B2CC64EBA9FE878571225FD38F818
              SHA-512:C697401F1C979F5A4D33E1026DCE5C77603E56A48405511A09D8CE178F1BF47D60F217E7897061F71CFEA63CC041E64340EF6BAEE0EB037AFD34C71BF0591E3E
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Universal) $TZData(:Etc/UTC).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):167
              Entropy (8bit):4.9534620854837295
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVwTwpVAIgoqzTcYFgIuyQauTnn:SlSWB9IZaM3ymdVAIgohYFgXymn
              MD5:58FBF79D86DBCFF53F74BF7FE5C12DD6
              SHA1:EA8B3317B012A661B3BA4A1FAE0DC5DEDC03BC26
              SHA-256:0DECFEACCE2E2D88C29CB696E7974F89A687084B3DB9564CDED6FC97BCD74E1F
              SHA-512:083B449DE987A634F7199666F9C685EADD643C2C2DD9C8F6C188388266729CE0179F9DC0CD432D713E5FB1649D0AA1A066FE616FC43DA65C4CD787D8E0DE00A6
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Moscow)]} {. LoadTimeZoneFile Europe/Moscow.}.set TZData(:W-SU) $TZData(:Europe/Moscow).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6694
              Entropy (8bit):3.6896780927557495
              Encrypted:false
              SSDEEP:96:D6U5vo30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:5PIMj544IrvfMsbxZTH7qwQ
              MD5:CD86A6ED164FEB33535D74DF52DC49A5
              SHA1:89843BF23AB113847DCC576990A4FF2CABCA03FE
              SHA-256:AF28754C77BA41712E9C49EF3C9E08F7D43812E3317AD4E2192E971AD2C9B02D
              SHA-512:80C0A7C3BDD458CA4C1505B2144A3AD969F7B2F2732CCBE4E773FBB6ED446C2961E0B5AFFBC124D43CE9AB530C42C8AEC7100E7817566629CE9D01AC057E3549
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:WET) {. {-9223372036854775808 0 0 WET}. {228877200 3600 1 WEST}. {243997200 0 0 WET}. {260326800 3600 1 WEST}. {276051600 0 0 WET}. {291776400 3600 1 WEST}. {307501200 0 0 WET}. {323830800 3600 1 WEST}. {338950800 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 36
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):149
              Entropy (8bit):4.830292555237936
              Encrypted:false
              SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLtaFBURFu:SlSWB9IZaM3yzUFVAIgBLYFaRI
              MD5:6C7C2CE174DB462A3E66D9A8B67A28EB
              SHA1:73B74BEBCDAEBDA4F46748BCA149BC4C7FE82722
              SHA-256:4472453E5346AAA1E1D4E22B87FDC5F3170AA013F894546087D0DC96D4B6EC43
              SHA-512:07209059E5E5EB5EE12821C1AC46922DA2715EB7D7196A478F0FA6866594D3C69F4C50006B0EE517CBF6DB07164915F976398EBBD88717A070D750D5D106BA5D
              Malicious:false
              Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Zulu) $TZData(:Etc/UTC).
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4860
              Entropy (8bit):4.7851008522116585
              Encrypted:false
              SSDEEP:96:Le+U54W37GWdh85qWdhAjgr9a+1FeS9D/CkXg6gvF9D/CYjX16AyyrGuA11/JRJZ:q+W/7GW85qW9a+P39DCd6gt9DC+6AjGN
              MD5:C5DA264DC0CE5669F81702170B2CDC59
              SHA1:FED571B893EE2DC93DAF8907195503885FFACBB6
              SHA-256:A5311E3640E42F7EFF5CC1A0D8AD6956F738F093B037155674D46B634542FE5F
              SHA-512:1F1993F1F19455F87EC9952BF7CEA00A5082BD2F2E1A417FBC4F239835F3CED6C8D5E09CDA6D1A4CD9F8A24AF174F9AB1DC7BD5E94C7A6DEE2DD9F8FE7F690FF
              Malicious:false
              Preview:# word.tcl --.#.# This file defines various procedures for computing word boundaries in.# strings. This file is primarily needed so Tk text and entry widgets behave.# properly for different platforms..#.# Copyright (c) 1996 by Sun Microsystems, Inc..# Copyright (c) 1998 by Scritpics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# The following variables are used to determine which characters are.# interpreted as white space...if {$::tcl_platform(platform) eq "windows"} {. # Windows style - any but a unicode space char. if {![info exists ::tcl_wordchars]} {..set ::tcl_wordchars {\S}. }. if {![info exists ::tcl_nonwordchars]} {..set ::tcl_nonwordchars {\s}. }.} else {. # Motif style - any unicode word char (number, letter, or underscore). if {![info exists ::tcl_wordchars]} {..set ::tcl_wordchars {\w}. }. if {![info exists ::tcl_nonwordchars]} {..set ::tcl_nonwo
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1468064
              Entropy (8bit):6.165850680457804
              Encrypted:false
              SSDEEP:24576:J7+Vm6O8hbcrckTNrkhaJVQhWnmb7u/DSe9qT03ZjLmFMoERDY5TUT/tXzddGyIK:JCQ69cYY9JVQWx/DSe9qTqJLUMPsJUT/
              MD5:FDC8A5D96F9576BD70AA1CADC2F21748
              SHA1:BAE145525A18CE7E5BC69C5F43C6044DE7B6E004
              SHA-256:1A6D0871BE2FA7153DE22BE008A20A5257B721657E6D4B24DA8B1F940345D0D5
              SHA-512:816ADA61C1FD941D10E6BB4350BAA77F520E2476058249B269802BE826BAB294A9C18EDC5D590F5ED6F8DAFED502AB7FFB29DB2F44292CB5BEDF2F5FA609F49C
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................B................R..................Rich..................PE..d......\.........." .........J......@........................................p.......f....`.............................................@@..P>..|........{......,....L.......0...?..`................................................ ..P............................text...c........................... ..`.rdata...?... ...@..................@..@.data........`.......N..............@....pdata..,...........................@..@.rsrc....{.......|..................@..@.reloc...?...0...@..................@..B........................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8246
              Entropy (8bit):4.8180558683809425
              Encrypted:false
              SSDEEP:192:tKrjbDL5//nNFn0rBnDQQ2d4YGpFAImoYyMxZ34wNsf9GnEF5SpcJV+H//iNx:tIjL5//zC/8HLx4XKKv
              MD5:11D758CEF126C5C2EDFC911237DF80F2
              SHA1:7911EAA0A8B6630D016D15730310935909632389
              SHA-256:DA84D32D1B447F7FFE7BBCAC0F7586B0B6DD204717C7AE1F182C6A91510EC77B
              SHA-512:9E2A767FBC62622C34F468958C861EE3AFE2A63005BAD80F1637045D045E1A82FB1D2698D948D375222EBD0B92514ACE99C12DF6D9CACF75ACD03EC8057494A7
              Malicious:false
              Preview:# bgerror.tcl --.#.#.Implementation of the bgerror procedure. It posts a dialog box with.#.the error message and gives the user a chance to see a more detailed.#.stack trace, and possible do something more interesting with that.#.trace (like save it to a log). This is adapted from work done by.#.Donal K. Fellows..#.# Copyright (c) 1998-2000 by Ajuba Solutions..# Copyright (c) 2007 by ActiveState Software Inc..# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>.# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>..namespace eval ::tk::dialog::error {. namespace import -force ::tk::msgcat::*. namespace export bgerror. option add *ErrorDialog.function.text [mc "Save To Log"] \..widgetDefault. option add *ErrorDialog.function.command [namespace code SaveToLog]. option add *ErrorDialog*Label.font TkCaptionFont widgetDefault. if {[tk windowingsystem] eq "aqua"} {..option add *ErrorDialog*background systemAlertBackgroundActive \...widgetDefault.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):20642
              Entropy (8bit):4.903366631227966
              Encrypted:false
              SSDEEP:384:8zVtoY3wFnq+j4SpEdPmVmZ6/IVKuzmSaox2ESo+VtocUP5wFnq+j4SpEdPmV8ZQ:coahPSFMmfoz4oFXhPovzmToQBy0zm2m
              MD5:309AB5B70F664648774453BCCBE5D3CE
              SHA1:51BF685DEDD21DE3786FE97BC674AB85F34BD061
              SHA-256:0D95949CFACF0DF135A851F7330ACC9480B965DAC7361151AC67A6C667C6276D
              SHA-512:D5139752BD7175747A5C912761916EFB63B3C193DD133AD25D020A28883A1DEA6B04310B751F5FCBE579F392A8F5F18AE556116283B3E137B4EA11A2C536EC6B
              Malicious:false
              Preview:# button.tcl --.#.# This file defines the default bindings for Tk label, button,.# checkbutton, and radiobutton widgets and provides procedures.# that help in implementing those bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 2002 ActiveState Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for buttons..#-------------------------------------------------------------------------..if {[tk windowingsystem] eq "aqua"} {.. bind Radiobutton <Enter> {..tk::ButtonEnter %W. }. bind Radiobutton <1> {..tk::ButtonDown %W. }. bind Radiobutton <ButtonRelease-1> {..tk::ButtonUp %W. }. bind Checkbutton <Enter> {..tk::ButtonEnter %W. }. bind Checkbutton <1
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9652
              Entropy (8bit):4.750454352074374
              Encrypted:false
              SSDEEP:192:MvjK3vpIKU7JBhpZofNAieYemp8U3wNV97oZQWpopePXUsyWjocIegf6tq9jJKT4:M4viKeBQ+3M3wNwvwsFyoIegf6wO70fN
              MD5:E703C16058E7F783E9BB4357F81B564D
              SHA1:1EDA07870078FC4C3690B54BB5330A722C75AA05
              SHA-256:30CE631CB1CCCD20570018162C6FFEF31BAD378EF5B2DE2D982C96E65EB62EF6
              SHA-512:28617F8553766CA7A66F438624AFA5FD7780F93DC9EBDF9BEE865B5649228AA56A69189218FC436CEDF2E5FE3162AD88839CBF49C9CC051238A7559B5C3BA726
              Malicious:false
              Preview:# choosedir.tcl --.#.#.Choose directory dialog implementation for Unix/Mac..#.# Copyright (c) 1998-2000 by Scriptics Corporation..# All rights reserved...# Make sure the tk::dialog namespace, in which all dialogs should live, exists.namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {}..# Make the chooseDir namespace inside the dialog namespace.namespace eval ::tk::dialog::file::chooseDir {. namespace import -force ::tk::msgcat::*.}..# ::tk::dialog::file::chooseDir:: --.#.#.Implements the TK directory selection dialog..#.# Arguments:.#.args..Options parsed by the procedure..#.proc ::tk::dialog::file::chooseDir:: {args} {. variable ::tk::Priv. set dataName __tk_choosedir. upvar ::tk::dialog::file::$dataName data. Config $dataName $args.. if {$data(-parent) eq "."} {. set w .$dataName. } else {. set w $data(-parent).$dataName. }.. # (re)create the dialog box if necessary. #. if {![winfo exists $w]} {..::tk::dialog::file::Create
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):21432
              Entropy (8bit):4.987740767386718
              Encrypted:false
              SSDEEP:384:HDJsgeqJelEu6i1T26UYdTVDyPHxQlufbSIjVjrdOqAQBxhKN2zD5Ed9bmqU/FC6:jagJJnBfxQef9
              MD5:E5E462E0EE0C57B31DAEECB07D038488
              SHA1:E67B3410A7BCECE8B5159AB5327910038096A67B
              SHA-256:823F6E4BAF5D10185D990B3FBCB8BFB4D5F4B6ED62203EE229922B6B32FE39D4
              SHA-512:F8442F21E389FF9A3FC5BECCE8811F8554DEF94FBB8F184026396A87AEA37E8108A3E1B3C76FEA2CFBE4E81B2C5FC2BB8A60BE2B9831CC96CB25DAB177616238
              Malicious:false
              Preview:# clrpick.tcl --.#.#.Color selection dialog for platforms that do not support a.#.standard color selection dialog..#.# Copyright (c) 1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#.# ToDo:.#.#.(1): Find out how many free colors are left in the colormap and.#. don't allocate too many colors..#.(2): Implement HSV color selection..#..# Make sure namespaces exist.namespace eval ::tk {}.namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::color {. namespace import ::tk::msgcat::*.}..# ::tk::dialog::color:: --.#.#.Create a color dialog and let the user choose a color. This function.#.should not be called directly. It is called by the tk_chooseColor.#.function when a native color selector widget does not exist.#.proc ::tk::dialog::color:: {args} {. variable ::tk::Priv. set dataName __tk__color. upvar ::tk::dialog::color::$dataName data. set w .$dataName.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8229
              Entropy (8bit):5.0540566175865
              Encrypted:false
              SSDEEP:192:Aq7cPy5HEOjKU8QHyWpSWNRYs50asAZ5QWlO+W0WvHv/3WvWHwV7vWKpTTk:Aq7c6HJjKCyWpZNRYEVVET1rvveuHSOT
              MD5:427CCBD25BB1559B9B21A80131658140
              SHA1:B675C0C1B02A527B13AA5DE2AE5A1AA754E9815D
              SHA-256:586CB7A3C32566EFEB46036A19D07E91194CE8EDAF0D47F3C93BCC974E6EE3E1
              SHA-512:FEA82D6D7DBAF52EE1883241170BA95396EC282CDD4F682077A238B4FD9A47C4CE6F84B1B4829A86580A4AB794820E6CD4C1E98CFB7BDCE23E09B54566BD6443
              Malicious:false
              Preview:# comdlg.tcl --.#.#.Some functions needed for the common dialog boxes. Probably need to go.#.in a different file..#.# Copyright (c) 1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# tclParseConfigSpec --.#.#.Parses a list of "-option value" pairs. If all options and.#.values are legal, the values are stored in.#.$data($option). Otherwise an error message is returned. When.#.an error happens, the data() array may have been partially.#.modified, but all the modified members of the data(0 array are.#.guaranteed to have valid values. This is different than.#.Tk_ConfigureWidget() which does not modify the value of a.#.widget record if any error occurs..#.# Arguments:.#.# w = widget record to modify. Must be the pathname of a widget..#.# specs = {.# {-commandlineswitch resourceName ResourceClass defaultValue verifier}.# {....}.# }.#.# flags = currently unused..#.# argList
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):32784
              Entropy (8bit):4.906598115585926
              Encrypted:false
              SSDEEP:384:GkptctbjWz4xjtyU/W1ZQWSLEwYGl7nZH5J+ry3+uQlLW44qvRHRJStCO2FfB25b:GkpeZWz4miZeG7J+rMYXaGGWFOYoV
              MD5:8B5B8B6D49F4CA36B8662923DCF9A46C
              SHA1:BCD6CA7451BDFB22311D9D54FBABB116D4A7A687
              SHA-256:7E1EAA998B1D661E9B4B72A4598A534B8311AB75D444525DD613EC73F8126750
              SHA-512:D7E20377E2FBD147A68E4B647D4F09A1894A203F2FA5435B09AD2B6998FFC2F70222BD2808B6A1D1B6A96271F04E7C7A4E6AB0EAE4C97C7C728A6645C499391F
              Malicious:false
              Preview:# console.tcl --.#.# This code constructs the console window for an application. It.# can be used by non-unix systems that do not have built-in support.# for shells..#.# Copyright (c) 1995-1997 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Ajuba Solutions..# Copyright (c) 2007-2008 Daniel A. Steffen <das@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# TODO: history - remember partially written command..namespace eval ::tk::console {. variable blinkTime 500 ; # msecs to blink braced range for. variable blinkRange 1 ; # enable blinking of the entire braced range. variable magicKeys 1 ; # enable brace matching and proc/var recognition. variable maxLines 600 ; # maximum # of lines buffered in console. variable showMatches 1 ; # show multiple expand matches. variable useFontchooser [llength [info command ::tk::fontchooser]]. variable inPlugi
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):6025
              Entropy (8bit):4.79563398407639
              Encrypted:false
              SSDEEP:96:WfPQCAV8OgciKHKKcmQH+DmlYm4Kapo9mBc//IWxIb:WfPQCAVviKHKK4H+DmT4Kapo4cnDOb
              MD5:EAC165BD7EA915B44FAEC016250E0B06
              SHA1:7D205F2720E00FBDA5C0AA908CAC3F66BBC84E56
              SHA-256:6D7BD4A280272E7A2748555CFFFF4FCA7CC57CE611AEB2382E3C80CDD1868D22
              SHA-512:22D5794E1FF3B94365C560A310CC17B4A27BEA87DBF423DFB44273443477372013B19ED33E170EAB15A1F06BA9186BA2FC184A3751449E7EDC760D23A12B1666
              Malicious:false
              Preview:# dialog.tcl --.#.# This file defines the procedure tk_dialog, which creates a dialog.# box containing a bitmap, a message, and one or more buttons..#.# Copyright (c) 1992-1993 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#.# ::tk_dialog:.#.# This procedure displays a dialog box, waits for a button in the dialog.# to be invoked, then returns the index of the selected button. If the.# dialog somehow gets destroyed, -1 is returned..#.# Arguments:.# w -..Window to use for dialog top-level..# title -.Title to display in dialog's decorative frame..# text -.Message to display in dialog..# bitmap -.Bitmap to display in dialog (empty string means none)..# default -.Index of button that is to display the default ring.#..(-1 means none)..# args -.One or more strings to display in buttons across the.#..bottom of t
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):16950
              Entropy (8bit):4.934745561122632
              Encrypted:false
              SSDEEP:384:P/eFkH2fRdOnOeQod3tCAERebMIDlXVQgXwVviw:P2FDqUy8V
              MD5:BE28D16510EE78ECC048B2446EE9A11A
              SHA1:4829D6E8AB8A283209FB4738134B03B7BD768BAD
              SHA-256:8F57A23C5190B50FAD00BDEE9430A615EBEBFC47843E702374AE21BEB2AD8B06
              SHA-512:F56AF7020531249BC26D88B977BAFFC612B6566146730A681A798FF40BE9EBC04D7F80729BAFE0B9D4FAC5B0582B76F9530F3FE376D42A738C9BC4B3B442DF1F
              Malicious:false
              Preview:# entry.tcl --.#.# This file defines the default bindings for Tk entry widgets and provides.# procedures that help in implementing those bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for example,.#...start dragging out a selection)..# pressX -..X-coordinate at which the mouse button was pressed..# selectMode -..The style of selection currently underway:.#...char, word, or line..# x, y -..La
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4857
              Entropy (8bit):4.7675047842795895
              Encrypted:false
              SSDEEP:96:mumhRUI7F2WyHm6BUyNhEf6jUHKRUI7F2WyQe6L763AcnK0/61sk2ko5AgEplauw:ERUQFU52CNRUQFpLOQIG1sk2TCLplauw
              MD5:7EA007F00BF194722FF144BE274C2176
              SHA1:6835A515E85A9E55D5A27073DAE1F1A5D7424513
              SHA-256:40D4E101A64B75361F763479B01207AE71535337E79CE6E162265842F6471EED
              SHA-512:E2520EB065296C431C71DBBD5503709CF61F93E74FE324F4F8F3FE13131D62435B1E124D38E2EC84939B92198A54B8A71DFC0A8D32F0DD94139C54068FBCAAF2
              Malicious:false
              Preview:# focus.tcl --.#.# This file defines several procedures for managing the input.# focus..#.# Copyright (c) 1994-1995 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_focusNext --.# This procedure returns the name of the next window after "w" in.# "focus order" (the window that should receive the focus next if.# Tab is typed in w). "Next" is defined by a pre-order search.# of a top-level and its non-top-level descendants, with the stacking.# order determining the order of siblings. The "-takefocus" options.# on windows determine whether or not they should be skipped..#.# Arguments:.# w -..Name of a window...proc ::tk_focusNext w {. set cur $w. while {1} {...# Descend to just before the first child of the current widget....set parent $cur..set children [winfo children $cur]..set i -1...# Look for the next sibling that isn't a top-level....while {1} {.. incr i..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15840
              Entropy (8bit):4.7139053935905535
              Encrypted:false
              SSDEEP:384:hrAVUJgzMAP2Xg7V5M8Zyc8Ck/YN9G4EM8CPo:hrAVUJgzMAP2Xg7V5MgycO/YpEX
              MD5:9324DBBE37502E149474E05A3448B6E3
              SHA1:5584B4EE3BF25E95EE6919437D066586060B6E36
              SHA-256:CEB558FB76A2C85924CD5F7D3A64E77582E1D461DD9A3C10FEDB4608AD440F5B
              SHA-512:C688676452F89EC432E93A64AC369CC0B82B19D8D38D2C4034888551591F59D87548FAE12A98EE7735540779566DEB400C27BEAD2C141A9F971BAF9E61C218C6
              Malicious:false
              Preview:# fontchooser.tcl -.#.#.A themeable Tk font selection dialog. See TIP #324..#.# Copyright (C) 2008 Keith Vetter.# Copyright (C) 2008 Pat Thoyts <patthoyts@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...namespace eval ::tk::fontchooser {. variable S.. set S(W) .__tk__fontchooser. set S(fonts) [lsort -dictionary [font families]]. set S(styles) [list \. [::msgcat::mc "Regular"] \. [::msgcat::mc "Italic"] \. [::msgcat::mc "Bold"] \. [::msgcat::mc "Bold Italic"] \. ].. set S(sizes) {8 9 10 11 12 14 16 18 20 22 24 26 28 36 48 72}. set S(strike) 0. set S(under) 0. set S(first) 1. set S(sampletext) [::msgcat::mc "AaBbYyZz01"]. set S(-parent) .. set S(-title) [::msgcat::mc "Font"]. set S(-command) "". set S(-font) TkDefaultFont.}..proc ::tk:
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15978
              Entropy (8bit):4.8947909611129905
              Encrypted:false
              SSDEEP:192:xj0OECzN+8JERNLKZhbgIDx3VM5BxBTSgvpn8WYYW5Xb50To3u8PYHPtJYa5PWDx:xrDJE36a7BegvV8hFI8gvXaSn9HqD/U0
              MD5:105529990CEE968AA5EE3BC827A81A0F
              SHA1:559BD1AABD1D4719EDB60448CF111F78365A57A9
              SHA-256:DE0195CCFB6482CCA390C94E91B7877F47742E7A9468CAF362B39AA36305D33C
              SHA-512:03CB42DFF7AC4F801AA7FFE8A4F07555CCE6874AA1B7F568ACF0299E4DD7F440179838485777F15183EE7C057CCB35868672B1783FBFE67B51D97DBBDAC85281
              Malicious:false
              Preview:# iconlist.tcl.#.#.Implements the icon-list megawidget used in the "Tk" standard file.#.selection dialog boxes..#.# Copyright (c) 1994-1998 Sun Microsystems, Inc..# Copyright (c) 2009 Donal K. Fellows.#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#.# API Summary:.#.tk::IconList <path> ?<option> <value>? ....#.<path> add <imageName> <itemList>.#.<path> cget <option>.#.<path> configure ?<option>? ?<value>? ....#.<path> deleteall.#.<path> destroy.#.<path> get <itemIndex>.#.<path> index <index>.#.<path> invoke.#.<path> see <index>.#.<path> selection anchor ?<int>?.#.<path> selection clear <first> ?<last>?.#.<path> selection get.#.<path> selection includes <item>.#.<path> selection set <first> ?<last>?...package require Tk 8.6..::tk::Megawidget create ::tk::IconList ::tk::FocusableWidget {. variable w canvas sbar accel accelCB fill font index \..itemList itemsPerColumn list maxIH maxIW maxTH maxTW noSc
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10883
              Entropy (8bit):6.026473720997027
              Encrypted:false
              SSDEEP:192:TJjPyYK20kt4zHIXM2MxGwwOw0ac5lCssUOixDgzAjTXBHVXPZmEhr:pO2gz6MioacR2iBgzsFHX5r
              MD5:2652AAD862E8FE06A4EEDFB521E42B75
              SHA1:ED22459AD3D192AB05A01A25AF07247B89DC6440
              SHA-256:A78388D68600331D06BB14A4289BC1A46295F48CEC31CEFF5AE783846EA4D161
              SHA-512:6ECFBB8D136444A5C0DBBCE2D8A4206F1558BDD95F111D3587B095904769AC10782A9EA125D85033AD6532EDF3190E86E255AC0C0C81DC314E02D95CCA86B596
              Malicious:false
              Preview:# icons.tcl --.#.#.A set of stock icons for use in Tk dialogs. The icons used here.#.were provided by the Tango Desktop project which provides a.#.unified set of high quality icons licensed under the.#.Creative Commons Attribution Share-Alike license.#.(http://creativecommons.org/licenses/by-sa/3.0/).#.#.See http://tango.freedesktop.org/Tango_Desktop_Project.#.# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>..namespace eval ::tk::icons {}..image create photo ::tk::icons::warning -data {. iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABHNCSVQICAgIfAhkiAAABSZJREFU. WIXll1toVEcYgL+Zc87u2Yu7MYmrWRuTJuvdiMuqiJd4yYKXgMQKVkSjFR80kFIVJfWCWlvpg4h9. 8sXGWGof8iKNICYSo6JgkCBEJRG8ImYThNrNxmaTeM7pQ5IlJkabi0/9YZhhZv7///4z/8zPgf+7. KCNRLgdlJijXwRyuDTlcxV9hbzv8nQmxMjg+XDtiOEplkG9PSfkztGmTgmFQd+FCVzwa3fYN/PHZ. AcpBaReicW5xcbb64IEQqko8Lc26d/58cxS+/BY6hmJvyEfQBoUpwWCmW1FErKaGWHU13uRk4QkE. UtxQNFR7QwIoB4eiKD9PWbVKbb10CZmaCqmpxCormRYO26QQx85B0mcD+AeK0xYvHqu1tNDx+DH6. g
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):322
              Entropy (8bit):4.341180398587801
              Encrypted:false
              SSDEEP:6:nVhmHdeA1xNZgkrIf3Ju4dFi6VbGWrWhr3W7FxmVFraGVAJFKyVQR7icrtpwB:nPqf1fZgZA4FJbB6dm7FUjAJVVMM
              MD5:FC8A86E10C264D42D28E23D9C75E7EE5
              SHA1:F1BA322448D206623F8FE734192F383D8F7FA198
              SHA-256:2695ADFF8E900C31B4D86414D22B8A49D6DD865CA3DD99678FA355CDC46093A8
              SHA-512:29C2DF0D516B5FC8E52CB61CFCD07AF9C90B40436DFE64CEFDB2813C0827CE65BA50E0828141256E2876D4DC251E934A6854A8E0B02CDAF466D0389BD778AEF0
              Malicious:false
              Preview:README - images directory..This directory includes images for the Tcl Logo and the Tcl Powered.Logo. Please feel free to use the Tcl Powered Logo on any of your.products that employ the use of Tcl or Tk. The Tcl logo may also be.used to promote Tcl in your product documentation, web site or other.places you so desire..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):32900
              Entropy (8bit):5.235207715374815
              Encrypted:false
              SSDEEP:768:gGTVOEcRWsdEmhp6k/GLrPMlK3pJr/IbYDGDMtBF2Fz6fsFA/fSvqHWukLI2d0Nr:gGTVOEcRWsdEvLrPJ5Jr/IbYDGDMtBFh
              MD5:45175418859AF67FE417BD0A053DB6E5
              SHA1:2B499B7C4EBC8554ECC07B8408632CAF407FB6D5
              SHA-256:F3E77FD94198EC4783109355536638E9162F9C579475383074D024037D1797D3
              SHA-512:114A59FD6B99FFD628BA56B8E14FB3B59A0AB6E752E18DEA038F85DBC072BF98492CE9369D180C169EDE9ED2BD521D8C0D607C5E4988F2C83302FC413C6D6A4C
              Malicious:false
              Preview:%!PS-Adobe-3.0 EPSF-3.0.%%Creator: Adobe Illustrator(TM) 5.5.%%For: (Bud Northern) (Mark Anderson Design).%%Title: (TCL/TK LOGO.ILLUS).%%CreationDate: (8/1/96) (4:58 PM).%%BoundingBox: 251 331 371 512.%%HiResBoundingBox: 251.3386 331.5616 370.5213 511.775.%%DocumentProcessColors: Cyan Magenta Yellow.%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0.%%+ procset Adobe_IllustratorA_AI5 1.0 0.%AI5_FileFormat 1.2.%AI3_ColorUsage: Color.%%DocumentCustomColors: (TCL RED).%%CMYKCustomColor: 0 0.45 1 0 (Orange).%%+ 0 0.25 1 0 (Orange Yellow).%%+ 0 0.79 0.91 0 (TCL RED).%AI3_TemplateBox: 306 396 306 396.%AI3_TileBox: 12 12 600 780.%AI3_DocumentPreview: Macintosh_ColorPic.%AI5_ArtSize: 612 792.%AI5_RulerUnits: 0.%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0.%AI5_TargetResolution: 800.%AI5_NumLayers: 1.%AI5_OpenToView: 90 576 2 938 673 18 1 1 2 40.%AI5_OpenViewLayers: 7.%%EndComments.%%BeginProlog.%%BeginResource: procset Adobe_level2_AI5 1.0 0.%%Title: (Adobe Illustrator (R) Version 5.0 Level 2 Emul
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2341
              Entropy (8bit):6.9734417899888665
              Encrypted:false
              SSDEEP:48:qF/mIXn3l7+ejbL/4nZEsKPKer1OPQqVRqJbPpRRKOv/UVO47f:81nHL4T0KorxvRKkc847f
              MD5:FF04B357B7AB0A8B573C10C6DA945D6A
              SHA1:BCB73D8AF2628463A1B955581999C77F09F805B8
              SHA-256:72F6B34D3C8F424FF0A290A793FCFBF34FD5630A916CD02E0A5DDA0144B5957F
              SHA-512:10DFE631C5FC24CF239D817EEFA14329946E26ED6BCFC1B517E2F9AF81807977428BA2539AAA653A89A372257D494E8136FD6ABBC4F727E6B199400DE05ACCD5
              Malicious:false
              Preview:GIF89aD.d...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....D.d........H......*\...z..Ht@Q...92.p...z.$.@@.E..u.Y.2..0c..q.cB.,[..... ..1..qbM.2~*].....s...S.@.L.j..#..\......h..........].D(..m......@.Z....oO...3=.c...G".(..pL...q]..%....[...#...+...X.h....^.....
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1670
              Entropy (8bit):6.326462043862671
              Encrypted:false
              SSDEEP:48:PF/mIXn3l7+ejbL/4xsgq4sNC6JYp6s/pmp76F:/1nHL404raM/op2
              MD5:B226CC3DA70AAB2EBB8DFFD0C953933D
              SHA1:EA52219A37A140FD98AEA66EA54685DD8158D9B1
              SHA-256:138C240382304F350383B02ED56C69103A9431C0544EB1EC5DCD7DEC7A555DD9
              SHA-512:3D043F41B887D54CCADBF9E40E48D7FFF99B02B6FAF6B1DD0C6C6FEF0F8A17630252D371DE3C60D3EFBA80A974A0670AF3747E634C59BDFBC78544D878D498D4
              Malicious:false
              Preview:GIF89a+.@...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....+.@........H. .z..(tp......@...92....#. A.......C.\.%...)Z..1a.8s..W/..@....3..C...y$.GW.....5.FU..j..;.F(Pc+W.-..X.D-[.*g....F..`.:mkT...Lw...A/.....u.7p..a..9P.....q2..Xg..G....3}AKv.\.d..yL.>..1.#
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):11000
              Entropy (8bit):7.88559092427108
              Encrypted:false
              SSDEEP:192:d+nY6zludc/We/yXy9JHBUoIMSapQdrGlapzmyNMK1vbXkgMmgFW/KxIq3NhZe:YnY6p4c/OCHyowaGUaCcMK1vbXNwFW/l
              MD5:45D9B00C4CF82CC53723B00D876B5E7E
              SHA1:DDD10E798AF209EFCE022E97448E5EE11CEB5621
              SHA-256:0F404764D07A6AE2EF9E1E0E8EAAC278B7D488D61CF1C084146F2F33B485F2ED
              SHA-512:6E89DACF2077E1307DA05C16EF8FDE26E92566086346085BE10A7FD88658B9CDC87A3EC4D17504AF57D5967861B1652FA476B2DDD4D9C6BCFED9C60BB2B03B6F
              Malicious:false
              Preview:GIF89ab.................f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....b..........H......*\....#J.H....3j.... '.;p....(.8X..^.0c.I...z8O.\.....:....$..Fu<8`...P.>%I.gO.C.h-..+.`....@..h....dJ.?...K...H.,U.._.#...g..[.*^.x.....J.L.!.'........=+eZ..i..ynF.8...].y|..m.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3889
              Entropy (8bit):7.425138719078912
              Encrypted:false
              SSDEEP:48:9qqbIh+cE4C8ric/jxK5mxsFBu3/0GIJ6Qap1Y5uMiR8pw5rB/SgijDb+TOh:hy+mnZ7xK5IsTwDQmkdiiG5rB/BE+6h
              MD5:BD12B645A9B0036A9C24298CD7A81E5A
              SHA1:13488E4F28676F1E0CE383F80D13510F07198B99
              SHA-256:4D0BD3228AB4CC3E5159F4337BE969EC7B7334E265C99B7633E3DAF3C3FCFB62
              SHA-512:F62C996857CA6AD28C9C938E0F12106E0DF5A20D1B4B0B0D17F6294A112359BA82268961F2A054BD040B5FE4057F712206D02F2E668675BBCF6DA59A4DA0A1BB
              Malicious:false
              Preview:GIF87ax............................................................................z.....{..o.....m..b...`{.X....vy...hk.Um.N...I`.D..Z^.LP.?R.;!....?C.5C.3#.l..,6.*&.15...`..#(.If.y.....l...._..#/...Hm.>_.y..4R.k..#6..._......w..*K.^.."<.....G{.w..3_."C.Q..F....v..!K...v.2m.)_.[..!R.u.1t.g..)f. X.O..E..1z.g. _.Z..D..:..0..Z.. f.D..0..'z..m.N..C../.z.svC.q/.m.ze7.\..P..I..1%.,...............................................................................................................................................................................................................................................................................................................................................................................................,....x..........H.......D..!...7.PAQ...._l8.... C.<.a...*.x....0q.. ..M.%.<.HBe.@.....Q..7..XC..P..<z3..X...P.jA.%'@.J.lV.......R.,..+....t....7h.....(..a...+^.'..7..L.....V...s..$....a.....8`.9..}K......
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):27809
              Entropy (8bit):5.331778921404698
              Encrypted:false
              SSDEEP:768:geQTVOEcRWsdEmhp6k/GLrPMlK3pJrNIbYDGDMtBgu2Fz6lR5G/r+FWaGK:gnTVOEcRWsdEvLrPJ5JrNIbYDGDMtB9L
              MD5:BA1051DBED2B8676CAA24593B88C91B2
              SHA1:8A58FC19B20BFDC8913515D9B32CCBF8ACF92344
              SHA-256:2944EBC4AF1894951BF9F1250F4E6EDF811C2183745950EA9A8A926715882CF7
              SHA-512:4260CEBA7DA9463F32B0C76A2AC19D2B20C8FE48CFBA3DC7AF748AAE15FA25DCBDA085072DF7EFC8F4B4F304C7ED166FE9F93DC903E32FA1874E82D59E544DEF
              Malicious:false
              Preview:%!PS-Adobe-3.0 EPSF-3.0.%%Creator: Adobe Illustrator(TM) 5.5.%%For: (Bud Northern) (Mark Anderson Design).%%Title: (TCL PWRD LOGO.ILLUS).%%CreationDate: (8/1/96) (4:59 PM).%%BoundingBox: 242 302 377 513.%%HiResBoundingBox: 242.0523 302.5199 376.3322 512.5323.%%DocumentProcessColors: Cyan Magenta Yellow.%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0.%%+ procset Adobe_IllustratorA_AI5 1.0 0.%AI5_FileFormat 1.2.%AI3_ColorUsage: Color.%%CMYKCustomColor: 0 0.45 1 0 (Orange).%%+ 0 0.25 1 0 (Orange Yellow).%%+ 0 0.79 0.91 0 (PANTONE Warm Red CV).%%+ 0 0.79 0.91 0 (TCL RED).%AI3_TemplateBox: 306 396 306 396.%AI3_TileBox: 12 12 600 780.%AI3_DocumentPreview: Macintosh_ColorPic.%AI5_ArtSize: 612 792.%AI5_RulerUnits: 0.%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0.%AI5_TargetResolution: 800.%AI5_NumLayers: 1.%AI5_OpenToView: 102 564 2 938 673 18 1 1 2 40.%AI5_OpenViewLayers: 7.%%EndComments.%%BeginProlog.%%BeginResource: procset Adobe_level2_AI5 1.0 0.%%Title: (Adobe Illustrator (R) Version 5.0 Le
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1615
              Entropy (8bit):7.461273815456419
              Encrypted:false
              SSDEEP:48:aE45BzojC3r1WAQ+HT2gAdKhPFZ/ObchgB8:V5Gb1WN+yfcObmgW
              MD5:DBFAE61191B9FADD4041F4637963D84F
              SHA1:BD971E71AE805C2C2E51DD544D006E92363B6C0C
              SHA-256:BCC0E6458249433E8CBA6C58122B7C0EFA9557CBC8FB5F9392EED5D2579FC70B
              SHA-512:ACEAD81CC1102284ED7D9187398304F21B8287019EB98B0C4EC7398DD8B5BA8E7D19CAA891AA9E7C22017B73D734110096C8A7B41A070191223B5543C39E87AF
              Malicious:false
              Preview:GIF89a@.d.............................f.................f...ff.f3.f..33.3.........f..ff.f3.33.3.f..f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....@.d....@.pH,..E.... ..(...H$..v..j....K....q..5L......^).3.Y7..r..u.v|g..om...\iHl..p...`G..\~....fn[q...P.g.Z.l....y...\.l......f.Z.g...%%....e...e...)....O.f..e. ....O..qf..%..(.H.u..]..&....#4.......@.).....u!.M..2. ..PJ..#..T..a.....P.Gi... <Hb....x..z.3.X.O..f.........].Bt..lB.Q.r...9pP....&...L. ..,`[.....E6.Q.....?.#L......|g........N....[.._........."4......b....G6.........m.zI].....I.@.......I.9...glew...2.B..c>./..2....x.....<...{...7;.....y.I.....4G.Qj0..7..%.W.V...?!..[...X..=..k.h..[Q<.....0.B....(P.x.,.......8O*Z.8P!.$....u.c..Ea!..eC....CB.. .H..E..#..C..E...z..&.Nu........c.0..#.T.M.U........l.p @..s.|..pf!..&.......8.#.8.....*..J>. .t..h6(........#..0.A...*!..)...x..u.Z....*%..H.....*.......`......|.....1.......&.....T*...f.l...
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2489
              Entropy (8bit):7.708754027741608
              Encrypted:false
              SSDEEP:48:/Ev7JJ+3uvz/Hwbcp7igaIwjBui7qFxIIOdJXcI+Ks:M9oWz/7pZAV7qPIImJXtXs
              MD5:711F4E22670FC5798E4F84250C0D0EAA
              SHA1:1A1582650E218B0BE6FFDEFFD64D27F4B9A9870F
              SHA-256:5FC25C30AEE76477F1C4E922931CC806823DF059525583FF5705705D9E913C1C
              SHA-512:220C36010208A87D0F674DA06D6F5B4D6101D196544ABCB4EE32378C46C781589DB1CE7C7DFE6471A8D8E388EE6A279DB237B18AF1EB9130FF9D0222578F1589
              Malicious:false
              Preview:GIF89aa...............................f.................f...ff.f3.f..33.3............f..ff.f3.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....a......@.pH,...r.l:..TB.T..V..z..H.j..h...&.......t"....F...d..gN~Y...g....}..r....g.....o...g.......Y.w..W......N....Z....W....f...tL.~.f....New............W.M.r.........O.q........W-./i.*...`..z..F9.../9..-.......$6..G..S...........zB.,nw.64...e4.......HOt......f.....)..OX..C.eU.(.Qh.....T..<Q.Y.P.L.YxT....2........ji..3.^)zz..O.a..6 ...TZ........^...7.....>|P.....w$...k.ZF.\R.u....F.]Z.--(v+)[Y....=.!.W..+.]..]._.....&..../Ap...j...!..b.:...{.^.=.`...U.....@Hf..\?.(..Lq@.........0..L...a...&.!.....]#..]G \..q...A.H.X[...(.W......,...1a..B...W(.t.8.AdG.)..(P=...Uu.u..A.KM\...'r.R./.W..d2a.0..G...?...B......#H........1Q.0...R....%+...0.I..{.<......QV.tz'.yn.E.p..0i.I.g......L....%....K...A.l.ph.Q.1e...Z....g..2e...smU&d;.J..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2981
              Entropy (8bit):7.758793907956808
              Encrypted:false
              SSDEEP:48:AmEwM8ioQoHJQBTThKVI7G78NLL120GFBBFXJRxlu+BmO/5lNqm7Eq:B57QoHJQt4II8BZ+jxluZO/5lNqm7Eq
              MD5:DA5FB10F4215E9A1F4B162257972F9F3
              SHA1:8DB7FB453B79B8F2B4E67AC30A4BA5B5BDDEBD3B
              SHA-256:62866E95501C436B329A15432355743C6EFD64A37CFB65BCECE465AB63ECF240
              SHA-512:990CF306F04A536E4F92257A07DA2D120877C00573BD0F7B17466D74E797D827F6C127E2BEAADB734A529254595918C3A5F54FDBD859BC325A162C8CD8F6F5BE
              Malicious:false
              Preview:GIF89aq...............................f.................f...ff.f3.f..33.3............f..ff.f3.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3................................................................!.. -dl-.!.......,....q......@.pH,...r.l:....A}H...v..R......D.VF..,%M....^.....fyzU.P..f...i.....t..Uqe..N..Z..i......~....g......u.....g......\...h.....P...h.....Q..g....Z..h......]......\...M...[..s...c2.+R.$. ......#.....)v..4....MO.b.....9......[.M.........h'..<-..=.....HQD....D?.~......W7. ..V.W0..l....*0p}..KP?c.\@KW.S(..M..B.....-q...S2...*.,..P.{....F..._MAn ....i.Y3............zh.y.j@...a876...ui.i..;K.........p...`.,}w....tv.m...Y..........;.;.e).e&.......-.NC.*4..(........*..F........[,w....f......E....h..a3.T.^.........)...C.N8.h\T...+&.z....g]H..B..#.t6..Z.....j.-..N......TI....A........M?..Q&V'...Mb.f.x...h.$r.U .9..Ci. ].4.Zb..@...X....%..<..b)V!........Y)x......T.....h.p.d..h..(........]@.**J.M.U.Jf...Y.:....F..g:..d..6q.-..
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3491
              Entropy (8bit):7.790611381196208
              Encrypted:false
              SSDEEP:96:ROGuxkQ9mcV7RXcECEtqCa+6GK8WseNXhewFIp9ZmL4u:ROGwpVOEbqCrWsUhtIk4u
              MD5:A5E4284D75C457F7A33587E7CE0D1D99
              SHA1:FA98A0FD8910DF2EFB14EDAEC038B4E391FEAB3C
              SHA-256:BAD9116386343F4A4C394BDB87146E49F674F687D52BB847BD9E8198FDA382CC
              SHA-512:4448664925D1C1D9269567905D044BBA48163745646344E08203FCEF5BA1524BA7E03A8903A53DAF7D73FE0D9D820CC9063D4DA2AA1E08EFBF58524B1D69D359
              Malicious:false
              Preview:GIF89a................................f.................f...ff.f3.f..33.3............f..ff.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,...........@.pH,...r.l:..T..F$XIe..V$.x..V.Z.z..F.pxd~..........{....o....l..{.b...hi[}P.k...y.....y.f.._R.\...............m.....y.....x......^.Q...j.....\S.....^.......l......]...[.......).....{....7...`..<...`..">..i.?/..@............>..Z.z@....0B..r...j.V.I.@..;%R...*...J.p.A.t.*..$A*...>`.....@g5BP.A..p.x.............q..8...... ...(.Q..#..@...F..YSK..M..#o.....D.m..-.....k}...BT..V......'.....`.d..~;..9+..6...<b.eZ..y^0]0..I...=.6.....}.0<.Z...M...Y1*35.e.....b...U0F~.-.HT......l2.s.q`-....y...e....dPZ....~.zT.M.... "r.E/k. ...*..Lj@'........Pcd&.(..mxF_w.."K..x!..--Y`..A.....Be.jH.A..\..j.....du#.....]^...>......].i.FMO..].9n1",Y...F...EW.9.....0TY.T...Cv!i`%...Hz@.]..U.!Y...#Dv&pi.z(.mn.A....@Q.0.%...&.4.v.cw(.`cd'|..M9..."...,*.......
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1171
              Entropy (8bit):7.289201491091023
              Encrypted:false
              SSDEEP:24:DOfHIzP8hqiF+oyPOmp3XHhPBlMVvG0ffWLpfc:DGoPM+o0OmZXHhOv5WRc
              MD5:7013CFC23ED23BFF3BDA4952266FA7F4
              SHA1:E5B1DED49095332236439538ECD9DD0B1FD4934B
              SHA-256:462A8FF8FD051A8100E8C6C086F497E4056ACE5B20B44791F4AAB964B010A448
              SHA-512:A887A5EC33B82E4DE412564E86632D9A984E8498F02D8FE081CC4AC091A68DF6CC1A82F4BF99906CFB6EA9D0EF47ADAC2D1B0778DCB997FB24E62FC7A6D77D41
              Malicious:false
              Preview:GIF89a0.K.............................f.................f...ff.f3.f..33.3.........f..ff.f3.3f.33.3.f..ff.ff.f3ff333f.3f.33.33f.3......................................................................!.. -dl-.!.......,....0.K....@.pH,...GD.<:..%SR.Z......<.V.$l.....z......:.. .|v[D..f...z.W.G.Vr...NgsU.yl..qU..`.......`fe`.......Fg....(.&...g.Y.. .."..q.V.$.'.Ez.W....y...Y.U...(#Xrf.........Xux.U..........(U.4...X....G.B..t..1S...R..Y. ...l ..".>.h......,%K....A.....<s....#..8.iK.....a.y$h..DQh.PE)....6.....MyL.qzF..... ."..Y0..a......2..*t..Ma..b...M..R.....\..st..=....Q......,>s`....Qt.,..B.R.....!.$..%.....(...s...B.T...`,".h(. D....8..dC..\Q.p.......x.#A.....:..du..(D.XV......7....S.#n8a....2`...f.:G,...==(......`!..$...t....b..../N|...f..J.x... P&.|.d._!N...].1w.3D.0!....@o&H...N.B.J....pz8..w.i....=r.............@5.-!.......H."..[.j.AB<..p....h...V.D..6.h...ab1F.g...I !.V~.H..V.........:.G..|c...,.....TD5..c[.W.....LC.....FJ..71[..lH.M.....8.:$......
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5473
              Entropy (8bit):7.754239979431754
              Encrypted:false
              SSDEEP:96:+EqG96vSGfyJZ26G6U1LI7nTD2enhjc+2VBnOqcUERVIim:+46KcyJI6G6uU7/LhjlkhQR7m
              MD5:048AFE69735F6974D2CA7384B879820C
              SHA1:267A9520C4390221DCE50177E789A4EBD590F484
              SHA-256:E538F8F4934CA6E1CE29416D292171F28E67DA6C72ED9D236BA42F37445EA41E
              SHA-512:201DA67A52DADA3AE7C533DE49D3C08A9465F7AA12317A0AE90A8C9C04AA69A85EC00AF2D0069023CD255DDA8768977C03C73516E4848376250E8D0D53D232CB
              Malicious:false
              Preview:GIF89ad.d...................RJJ...B99.......RBB..B11ZBB!....R991!!...)....{{B!!R)).JJ.ss.ZZ.BB.kk.RR.JJ.BB9...JJR!!.ZZ.BB.11.99.{s.sk.kc.cZ.ZR.JB.ZR.JB.JB.RJ.B9.91.B9...{.JB.91.B9.B9.1){)!.)!.9)..ZR.JB{91.cR{1).ZJ.ZJ.RB.J9.B1.B1.9).1!....{B9.{k.scc1).kZZ)!c)!.9).B1.9).9).1!.1!.1!.B).9!.9!.1..).....{.sZ1)R)!.B1.B1.ZBR!..9).ZB.9).R9.R9.1!.J1.J1.B).B).9!.9!.1..1..).....sZ.J9.ZB.cJJ!.{1!.B).9!{)..9!.J).B!.B!.9..R1).kJ)!.B1{9).R9.cB.Z9.Z9.B).Z9.B).R1.9!.R1.J).J).B!.1..9....{.s.J9.{Z.ZB.sR.kJk1!.cB.cB.R1.R).1..B!.J!.B.....R91.J1).c.kJ.J).Z1.B!.B!..9!..{R.sJ.Z9.R1{9!..s.R9.Z...J91Z9){B)...............B91..1)!..............................RJR............B)1......R19........BJ.9B..{..s{......!.......,....d.d.@............0@PHa....*.p...7.8.y...C.s6Z.%Q.#s.`:B.N....4jd.K.0..|y....F@.......1~ ......'Y.B"C&R.V.R.4$k.3...D.......Ef*Y3..M........BDV._.....\..).]..>s..$H\%y0WL...d.......D..'..v..1Kz.Zp$;S
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2267
              Entropy (8bit):5.097909341674822
              Encrypted:false
              SSDEEP:48:JlZuZcRTvy3DauG4+bHnr32s3eGw8YKxPiOXR3ojdS+mFf:JScFaz+bL3e8n3XR3ojdtOf
              MD5:C88F99DECEC11AFA967AD33D314F87FE
              SHA1:58769F631EB2C8DED0C274AB1D399085CC7AA845
              SHA-256:2CDE822B93CA16AE535C954B7DFE658B4AD10DF2A193628D1B358F1765E8B198
              SHA-512:4CD59971A2614891B2F0E24FD8A42A706AE10A2E54402D774E5DAA5F6A37DE186F1A45B1722A7C0174F9F80625B13D7C9F48FDB03A7DDBC6E6881F56537B5478
              Malicious:false
              Preview:This software is copyrighted by the Regents of the University of.California, Sun Microsystems, Inc., Scriptics Corporation, ActiveState.Corporation, Apple Inc. and other parties. The following terms apply to.all files associated with the software unless explicitly disclaimed in.individual files...The authors hereby grant permission to use, copy, modify, distribute,.and license this software and its documentation for any purpose, provided.that existing copyright notices are retained in all copies and that this.notice is included verbatim in any distributions. No written agreement,.license, or royalty fee is required for any of the authorized uses..Modifications to this software may be copyrighted by their authors.and need not follow the licensing terms described here, provided that.the new terms are clearly indicated on the first page of each file where.they apply...IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY.FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQ
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):14594
              Entropy (8bit):4.895853767062079
              Encrypted:false
              SSDEEP:384:ZBjtAc4YusFvbg36UFchqHjNw8wSdy+1a22YDE/q:ZFgqUBjW8RQcf
              MD5:C33963D3A512F2E728F722E584C21552
              SHA1:75499CFA62F2DA316915FADA2580122DC3318BAD
              SHA-256:39721233855E97BFA508959B6DD91E1924456E381D36FDFC845E589D82B1B0CC
              SHA-512:EA01D8CB36D446ACE31C5D7E50DFAE575576FD69FD5D413941EEBBA7CCC1075F6774AF3C69469CD7BAF6E1068AA5E5B4C560F550EDD2A8679124E48C55C8E8D7
              Malicious:false
              Preview:# listbox.tcl --.#.# This file defines the default bindings for Tk listbox widgets.# and provides procedures that help in implementing those bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1995 Sun Microsystems, Inc..# Copyright (c) 1998 by Scriptics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#--------------------------------------------------------------------------.# tk::Priv elements used in this file:.#.# afterId -..Token returned by "after" for autoscanning..# listboxPrev -.The last element to be selected or deselected.#...during a selection operation..# listboxSelection -.All of the items that were selected before the.#...current selection operation (such as a mouse.#...drag) started; used to cancel an operation..#--------------------------------------------------------------------------..#-------------------------------------
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9569
              Entropy (8bit):4.736161258754494
              Encrypted:false
              SSDEEP:192:cp4NSZKF/bcaQTViJ8pox8tJRd/v0tAANQSLkROOp+4BQjBC:jSZKF/Iaarpocdn07NQS34ao
              MD5:7176A4FE8EC3EA648854F1FC1BB2EA89
              SHA1:28D96419585881C6222BC917EDB9A5863E7C519B
              SHA-256:D454FC4E25D9DFC704556A689A17AA6F3D726F99592995952BC6492FC8F19F6E
              SHA-512:8C33E1CD3490945DDC5DA0585E655A7FC78C9950886F68C096D103AE510C1024632AB3D41E9573937BB4359D365FFB8F5A10B1CA7BFBD37442F40985107C1C8D
              Malicious:false
              Preview:# megawidget.tcl.#.#.Basic megawidget support classes. Experimental for any use other than.#.the ::tk::IconList megawdget, which is itself only designed for use in.#.the Unix file dialogs..#.# Copyright (c) 2009-2010 Donal K. Fellows.#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#..package require Tk 8.6...::oo::class create ::tk::Megawidget {. superclass ::oo::class. method unknown {w args} {..if {[string match .* $w]} {.. [self] create $w {*}$args.. return $w..}..next $w {*}$args. }. unexport new unknown. self method create {name superclasses body} {..next $name [list \...superclass ::tk::MegawidgetClass {*}$superclasses]\;$body. }.}..::oo::class create ::tk::MegawidgetClass {. variable w hull options IdleCallbacks. constructor args {..# Extract the "widget name" from the object name..set w [namespace tail [self]]...# Configure things..tclParseConfigSpec [my varname op
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):38077
              Entropy (8bit):4.872052715667624
              Encrypted:false
              SSDEEP:768:0K5IzCPGH0a9tVbQDBTo06DpSCeihpzuxdyQYEuH9DAe1:0K5i1HDE6AWuxdRYxHS8
              MD5:181ED74919F081EEB34269500E228470
              SHA1:953EB429F6D98562468327858ED0967BDC21B5AD
              SHA-256:564AC0040176CC5744E3860ABC36B5FFBC648DA20B26A710DC3414EAE487299B
              SHA-512:220E496B464575115BAF1DEDE838E70D5DDD6D199B5B8ACC1763E66D66801021B2D7CD0E1E1846868782116AD8A1F127682073D6EACD7E73F91BCED89F620109
              Malicious:false
              Preview:# menu.tcl --.#.# This file defines the default bindings for Tk menus and menubuttons..# It also implements keyboard traversal of menus and implements a few.# other utility procedures related to menus..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998-1999 by Scriptics Corporation..# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# cursor -..Saves the -cursor option for the posted menubutton..# focus -..Saves the focus during a menu selection operation..#...Focus gets restored here when the menu is unposted..# grabGlobal -..Used in conjunction with tk::Priv(oldGrab): if.#...tk::Priv(oldGrab) is non-empty, then tk::Pr
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):29352
              Entropy (8bit):5.110577585375791
              Encrypted:false
              SSDEEP:768:hmie+xwcBO/SHAqFySrhkvQueYpx8DPF52qdREXXZ2/OODi:I+xwcBO/SHAqFySrhAQueYD8D95TOL
              MD5:5F3793E7E582111C17C85E23194AEFD5
              SHA1:925D973B70252384D1DE9B388C6C2038E646FDDF
              SHA-256:0AC9D11D4046EF4D8E6D219F6941BF69C6AE448C6A1C2F7FC382F84B5786F660
              SHA-512:2922546BA69232DBC205FE83EF54916E334E7AC93B7A26A208341F9C101209DA84C73F48C52BDB8E63E71A545853652B86378EBEB88F000BC16FCFB0EF5D8517
              Malicious:false
              Preview:# mkpsenc.tcl --.#.# This file generates the postscript prolog used by Tk...namespace eval ::tk {. # Creates Postscript encoding vector for ISO-8859-1 (could theoretically. # handle any 8-bit encoding, but Tk never generates characters outside. # ASCII).. #. proc CreatePostscriptEncoding {} {..variable psglyphs..# Now check for known. Even if it is known, it can be other than we..# need. GhostScript seems to be happy with such approach..set result "\[\n"..for {set i 0} {$i<256} {incr i 8} {.. for {set j 0} {$j<8} {incr j} {...set enc [encoding convertfrom "iso8859-1" \....[format %c [expr {$i+$j}]]]...catch {... set hexcode {}... set hexcode [format %04X [scan $enc %c]]...}...if {[info exists psglyphs($hexcode)]} {... append result "/$psglyphs($hexcode)"...} else {... append result "/space"...}.. }.. append result "\n"..}..append result "\]"..return $result. }.. # List of adobe glyph names. Converted from glyphlist.txt, downloaded from. # Ad
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):16527
              Entropy (8bit):4.679051291122852
              Encrypted:false
              SSDEEP:384:aWsDPYblrrfcRcfjAwnAVDTS3ifQjvwMXEcjY:aTRcfjAwGTfQjvPXt0
              MD5:C93F295967350F7010207874992E01A5
              SHA1:CAE8EF749F7618326B3307DA7ED6DEBB380286DD
              SHA-256:52C5B87C99C142D5FC77E0C22B78B7CD63A4861756FD6B39648A2E9A8EDDE953
              SHA-512:F7E60211C0BC1ECEDE03022D622C5B9AAEAE3C203A60B6B034E1886F857C8FAD6BA6B1F7BA1EE7D733720775E7108F1BFD4C5B54A0F4919CE4EB43851D1190F8
              Malicious:false
              Preview:# msgbox.tcl --.#.#.Implements messageboxes for platforms that do not have native.#.messagebox support..#.# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# Ensure existence of ::tk::dialog namespace.#.namespace eval ::tk::dialog {}..image create bitmap ::tk::dialog::b1 -foreground black \.-data "#define b1_width 32\n#define b1_height 32.static unsigned char q1_bits[] = {. 0x00, 0xf8, 0x1f, 0x00, 0x00, 0x07, 0xe0, 0x00, 0xc0, 0x00, 0x00, 0x03,. 0x20, 0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x08, 0x08, 0x00, 0x00, 0x10,. 0x04, 0x00, 0x00, 0x20, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,. 0x01, 0x00, 0x00, 0x80, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,. 0x04, 0x00, 0x00, 0x20, 0x08, 0x00,
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4158
              Entropy (8bit):4.744283779865612
              Encrypted:false
              SSDEEP:48:RC98Kz+4GgKafRXwSl51gmJnANlsgPVG5QOFWQfl5:RC98/4PGi51gmAsgPVjm5
              MD5:EBAFA3EE899EBB06D52C204493CEE27A
              SHA1:95E6C71E4525A8DD91E488B952665AE9C5FBDDED
              SHA-256:D1B0FED0BEA51B3FAF08D8634034C7388BE7148F9B807460B7D185706DB8416F
              SHA-512:ADDE3C85A7A4148BAFD6C8B8902FC8C229F1D1AAF118BE85F44E4667237E66938864E2B7B4486B7C68C89EB4559F1D8367F9F563B9C6C8BCAB66118B36E670B8
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset cs "&Abort" "&P\u0159eru\u0161it". ::msgcat::mcset cs "&About..." "&O programu...". ::msgcat::mcset cs "All Files" "V\u0161echny soubory". ::msgcat::mcset cs "Application Error" "Chyba programu". ::msgcat::mcset cs "Bold Italic". ::msgcat::mcset cs "&Blue" "&Modr\341". ::msgcat::mcset cs "Cancel" "Zru\u0161it". ::msgcat::mcset cs "&Cancel" "&Zru\u0161it". ::msgcat::mcset cs "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nemohu zm\u011bnit atku\341ln\355 adres\341\u0159 na \"%1\$s\".\nP\u0159\355stup odm\355tnut.". ::msgcat::mcset cs "Choose Directory" "V\375b\u011br adres\341\u0159e". ::msgcat::mcset cs "Cl&ear" "Sma&zat". ::msgcat::mcset cs "&Clear Console" "&Smazat konzolu". ::msgcat::mcset cs "Color" "Barva". ::msgcat::mcset cs "Console" "Konzole". ::msgcat::mcset cs "&Copy" "&Kop\355rovat". ::msgcat::mcset cs "Cu&t" "V&y\u0159\355znout". ::msgcat::mcset cs "&Delete" "&Smazat"
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3909
              Entropy (8bit):4.6030170761850915
              Encrypted:false
              SSDEEP:48:G8ONjSf5s80vWCUx5kTvgXTfODYE9lAUt:G8OmB0ZUx5kTv4sbt
              MD5:C414C6972F0AAD5DFA31297919D0587F
              SHA1:529AE0B0CB9D1DBC7F8844F346149E151DE0A36B
              SHA-256:85E6CEE6001927376725F91EAA55D17B3D9E38643E17755A42C05FE491C63BDE
              SHA-512:0F2A777B9C3D6C525097E19D1CC4525E9BAF78E0CABF54DD693C64BC1FD4EA75402D906A8302489997BA83ABA5AFD7CA1DE30FFE0888CD19950F56A9D38B018A
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset da "&Abort" "&Afbryd". ::msgcat::mcset da "&About..." "&Om...". ::msgcat::mcset da "All Files" "Alle filer". ::msgcat::mcset da "Application Error" "Programfejl". ::msgcat::mcset da "&Blue" "&Bl\u00E5". ::msgcat::mcset da "Cancel" "Annuller". ::msgcat::mcset da "&Cancel" "&Annuller". ::msgcat::mcset da "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ikke skifte til katalog \"%1\$s\".\nIngen rettigheder.". ::msgcat::mcset da "Choose Directory" "V\u00E6lg katalog". ::msgcat::mcset da "Cl&ear" "&Ryd". ::msgcat::mcset da "&Clear Console" "&Ryd konsolen". ::msgcat::mcset da "Color" "Farve". ::msgcat::mcset da "Console" "Konsol". ::msgcat::mcset da "&Copy" "&Kopier". ::msgcat::mcset da "Cu&t" "Kli&p". ::msgcat::mcset da "&Delete" "&Slet". ::msgcat::mcset da "Details >>" "Detailer". ::msgcat::mcset da "Directory \"%1\$s\" does not exist." "Katalog \"%1\$s\" findes ikke.". ::msg
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4823
              Entropy (8bit):4.5738552657551566
              Encrypted:false
              SSDEEP:96:13LquGgagtG6vz8MFi9dDvbwKAN92qqMXg07Qt:L1/w5jwKYH1Et
              MD5:07DF877A1166E81256273F1183B5BDC9
              SHA1:CB455F910208E2E55B27A96ABD845FEEDA88711A
              SHA-256:06DD7572626DF5CB0A8D3AFFBAC9BB74CB12469076836D66FD19AE5B5FAB42C7
              SHA-512:197B09F37647D1D5130A084EA1D99D0CC16C815EC0AC31EC07875BEB2DFAE2197E2AF3E323FE8CB35F90912D76D3EB88D1E56F6E026F87AEDFADB7534BA2675A
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset de "&Abort" "&Abbruch". ::msgcat::mcset de "&About..." "&\u00dcber...". ::msgcat::mcset de "All Files" "Alle Dateien". ::msgcat::mcset de "Application Error" "Applikationsfehler". ::msgcat::mcset de "&Apply" "&Anwenden". ::msgcat::mcset de "Bold" "Fett". ::msgcat::mcset de "Bold Italic" "Fett kursiv". ::msgcat::mcset de "&Blue" "&Blau". ::msgcat::mcset de "Cancel" "Abbruch". ::msgcat::mcset de "&Cancel" "&Abbruch". ::msgcat::mcset de "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kann nicht in das Verzeichnis \"%1\$s\" wechseln.\nKeine Rechte vorhanden.". ::msgcat::mcset de "Choose Directory" "W\u00e4hle Verzeichnis". ::msgcat::mcset de "Cl&ear" "&R\u00fccksetzen". ::msgcat::mcset de "&Clear Console" "&Konsole l\u00f6schen". ::msgcat::mcset de "Color" "Farbe". ::msgcat::mcset de "Console" "Konsole". ::msgcat::mcset de "&Copy" "&Kopieren". ::msgcat::mcset de "Cu&t" "Aus&schneid
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8698
              Entropy (8bit):4.296709418881547
              Encrypted:false
              SSDEEP:48:tCrF5o/cmSHbkI8+ETnFI3mC2hk9I+c6M30UPfMNDz91yBFkm5w+kGR8MOFiL0xu:wp5RmSHlsFerVIfM5Loam5VOMAkV
              MD5:C802EA5388476451CD76934417761AA6
              SHA1:25531DF6262E3B1170055735C5A874B9124FEA83
              SHA-256:1D56D0A7C07D34BB8165CBA47FA49351B8BC5A9DB244290B9601C5885D16155C
              SHA-512:251FABBE8B596C74BC1231823C60F5F99CF55A29212327723F5DBE604F678E8E464F2D604D1049754B7C02350712B83BCF4D9542D8167F3CAB9C9B7E5C88EC7D
              Malicious:false
              Preview:## Messages for the Greek (Hellenic - "el") language..## Please report any changes/suggestions to:.## petasis@iit.demokritos.gr..namespace eval ::tk {. ::msgcat::mcset el "&Abort" "\u03a4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03cc\u03c2". ::msgcat::mcset el "About..." "\u03a3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac...". ::msgcat::mcset el "All Files" "\u038c\u03bb\u03b1 \u03c4\u03b1 \u0391\u03c1\u03c7\u03b5\u03af\u03b1". ::msgcat::mcset el "Application Error" "\u039b\u03ac\u03b8\u03bf\u03c2 \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae\u03c2". ::msgcat::mcset el "&Blue" "\u039c\u03c0\u03bb\u03b5". ::msgcat::mcset el "&Cancel" "\u0391\u03ba\u03cd\u03c1\u03c9\u03c3\u03b7". ::msgcat::mcset el \."Cannot change to the directory \"%1\$s\".\nPermission denied." \."\u0394\u03b5\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03ae \u03b7 \u03b1\u03bb\u03bb\u03b1\u03b3\u03ae \u03ba\u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3286
              Entropy (8bit):4.214322279125194
              Encrypted:false
              SSDEEP:24:sqHa4IUXCtvLPgyq1+1ylnJzqFtC2NAXSxFFRRTDubLorIlnB:d64I5tDPgDNnH2SXSZRRTDuPZlB
              MD5:64725ED622DBF1CB3F00479BA84157D7
              SHA1:575429AEABAF6640425AC1BC397B3382C1ED1122
              SHA-256:673C76A48ADA09A154CB038534BF90E3B9C0BA5FD6B1619DB33507DE65553362
              SHA-512:4EBDCAB20D095789BB8D94476CCFD29DEE8DFCF96F1C2030387F0521827A140E22BBB0DAD4B73EABE26D70E1642C9981BC5CBBF0045FEABB9EF98C7CDB67795E
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset en "&Abort". ::msgcat::mcset en "&About...". ::msgcat::mcset en "All Files". ::msgcat::mcset en "Application Error". ::msgcat::mcset en "&Apply". ::msgcat::mcset en "Bold". ::msgcat::mcset en "Bold Italic". ::msgcat::mcset en "&Blue". ::msgcat::mcset en "Cancel". ::msgcat::mcset en "&Cancel". ::msgcat::mcset en "Cannot change to the directory \"%1\$s\".\nPermission denied.". ::msgcat::mcset en "Choose Directory". ::msgcat::mcset en "Cl&ear". ::msgcat::mcset en "&Clear Console". ::msgcat::mcset en "Color". ::msgcat::mcset en "Console". ::msgcat::mcset en "&Copy". ::msgcat::mcset en "Cu&t". ::msgcat::mcset en "&Delete". ::msgcat::mcset en "Details >>". ::msgcat::mcset en "Directory \"%1\$s\" does not exist.". ::msgcat::mcset en "&Directory:". ::msgcat::mcset en "&Edit". ::msgcat::mcset en "Effects". ::msgcat::mcset en "Error: %1\$s". ::msgcat::mcset en "E&xit". ::msgcat
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):63
              Entropy (8bit):4.185724027617087
              Encrypted:false
              SSDEEP:3:fEGp6fR1FAGoW8vMKEQXK:sooLoQO6
              MD5:EC6A7E69AB0B8B767367DB54CC0499A8
              SHA1:6C2D6B622429AB8C17E07C2E0F546469823ABE57
              SHA-256:FB93D455A9D9CF3F822C968DFB273ED931E433F2494D71D6B5F8D83DDE7EACC2
              SHA-512:72077EAB988979EB2EE292ACDB72537172A5E96B4262CE7278B76F0FEBD7E850D18221DB551D1DE3C6EB520985B5E9642936BEEB66032F920593276784525702
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset en_gb Color Colour.}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3916
              Entropy (8bit):4.556739397782912
              Encrypted:false
              SSDEEP:48:9714zhrzeU10xrFf+/eR0Mqp+cIFIXd/KcrtCcuUc6Sq4Pe:97145eFrF2GSMqgcIFIXdyAene
              MD5:09EF4B30B49A71FD4DEA931E334896E1
              SHA1:6C2366CE5961CFDA53259A43E087A813CEE41841
              SHA-256:5DE113DC4CE0DF0D8C54D4812C15EC31387127BF9AFEA028D20C6A5AA8E3AB85
              SHA-512:9DB3BB6B76B1299AE4612DF2A2872ECEE6642FC7DF971BE3A22437154AD25E81E1B1F3E1AA7A281CB3F48F8F8198A846BCB008CCFF91A9720440AFE5BAB7DE84
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset eo "&Abort" "&\u0108esigo". ::msgcat::mcset eo "&About..." "Pri...". ::msgcat::mcset eo "All Files" "\u0108ioj dosieroj". ::msgcat::mcset eo "Application Error" "Aplikoerraro". ::msgcat::mcset eo "&Blue" "&Blua". ::msgcat::mcset eo "Cancel" "Rezignu". ::msgcat::mcset eo "&Cancel" "&Rezignu". ::msgcat::mcset eo "Cannot change to the directory \"%1\$s\".\nPermission denied." "Neeble \u0109angi al dosierulon \"%1\$s\".\nVi ne rajtas tion.". ::msgcat::mcset eo "Choose Directory" "Elektu Dosierujo". ::msgcat::mcset eo "Cl&ear" "&Klaru". ::msgcat::mcset eo "&Clear Console" "&Klaru konzolon". ::msgcat::mcset eo "Color" "Farbo". ::msgcat::mcset eo "Console" "Konzolo". ::msgcat::mcset eo "&Copy" "&Kopiu". ::msgcat::mcset eo "Cu&t" "&Enpo\u015digu". ::msgcat::mcset eo "&Delete" "&Forprenu". ::msgcat::mcset eo "Details >>" "Detaloj >>". ::msgcat::mcset eo "Directory \"%1\$s\" does not exist." "La dosieruj
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3948
              Entropy (8bit):4.486102294561867
              Encrypted:false
              SSDEEP:48:vTaZD2XRgGiWXirZe0uoH02QyTaBi2DcDmQ/jY33l4TCyFv:vmZaXhFbyGB3ELjDV
              MD5:93FFA957E3DCF851DD7EBE587A38F2D5
              SHA1:8C3516F79FB72F32848B40091DA67C81E40FDEFE
              SHA-256:91DC4718DC8566C36E4BCD0C292C01F467CA7661EFF601B870ABCDFE4A94ECBB
              SHA-512:8EC7048DDFF521DE444F697EAB305777BAC24AEA37716DA4FE5374E93CEF66DDD58D535BE8FCBCD2636D623337643B1242798BB8AC7292EA2D81AE030C3A605C
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset es "&Abort" "&Abortar". ::msgcat::mcset es "&About..." "&Acerca de ...". ::msgcat::mcset es "All Files" "Todos los archivos". ::msgcat::mcset es "Application Error" "Error de la aplicaci\u00f3n". ::msgcat::mcset es "&Blue" "&Azul". ::msgcat::mcset es "Cancel" "Cancelar". ::msgcat::mcset es "&Cancel" "&Cancelar". ::msgcat::mcset es "Cannot change to the directory \"%1\$s\".\nPermission denied." "No es posible acceder al directorio \"%1\$s\".\nPermiso denegado.". ::msgcat::mcset es "Choose Directory" "Elegir directorio". ::msgcat::mcset es "Cl&ear" "&Borrar". ::msgcat::mcset es "&Clear Console" "&Borrar consola". ::msgcat::mcset es "Color". ::msgcat::mcset es "Console" "Consola". ::msgcat::mcset es "&Copy" "&Copiar". ::msgcat::mcset es "Cu&t" "Cor&tar". ::msgcat::mcset es "&Delete" "&Borrar". ::msgcat::mcset es "Details >>" "Detalles >>". ::msgcat::mcset es "Directory \"%1\$s\" does not exist." "
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3805
              Entropy (8bit):4.582498923493114
              Encrypted:false
              SSDEEP:48:fiESNtfQIFBqFHjUp4KiOzbgRuhzSAEFlBGr3jd:fiESP1aVdKiHRXcN
              MD5:9FC55235C334F6F6026D5B38AFFB9E10
              SHA1:CAD3805900E860B9491E3EE5C2C0F52ADCA67065
              SHA-256:0A8BBB4D1FD87BF7A90DDFA50F4724994C9CE78D1F3E91CF40C1177DB7941DC5
              SHA-512:FBB5E72BC376DDB9F43B8C79398CA287AFAAAF8292A8CB3AF63241973B1748FD578D49075A1287DA054BA81D3ED61A723F3DE9E10855D5E85620B371D70D9BBD
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset fr "&Abort" "&Annuler". ::msgcat::mcset fr "About..." "\u00c0 propos...". ::msgcat::mcset fr "All Files" "Tous les fichiers". ::msgcat::mcset fr "Application Error" "Erreur d'application". ::msgcat::mcset fr "&Blue" "&Bleu". ::msgcat::mcset fr "Cancel" "Annuler". ::msgcat::mcset fr "&Cancel" "&Annuler". ::msgcat::mcset fr "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossible d'acc\u00e9der au r\u00e9pertoire \"%1\$s\".\nPermission refus\u00e9e.". ::msgcat::mcset fr "Choose Directory" "Choisir r\u00e9pertoire". ::msgcat::mcset fr "Cl&ear" "Effacer". ::msgcat::mcset fr "Color" "Couleur". ::msgcat::mcset fr "Console". ::msgcat::mcset fr "Copy" "Copier". ::msgcat::mcset fr "Cu&t" "Couper". ::msgcat::mcset fr "Delete" "Effacer". ::msgcat::mcset fr "Details >>" "D\u00e9tails >>". ::msgcat::mcset fr "Directory \"%1\$s\" does not exist." "Le r\u00e9pertoire \"%1\$s\" n'existe pas.".
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4600
              Entropy (8bit):4.752507976327236
              Encrypted:false
              SSDEEP:96:IYIzxGy0Kt9C81y/HSzVqUaJf9q/x5a/mETsN:IB1FCt/4vZM+EA
              MD5:E1BA9C40A350BAD78611839A59065BF0
              SHA1:1A148D230C9F8D748D96A79CD4E261AF264D6524
              SHA-256:C8134EAD129E44E9C5043E1DAD81A6A900F0DE71DB3468E2603840038687F1D8
              SHA-512:17EC7F14C708C4D8C77731C26D0CE8AF6EBAB3D1CA878FB9682F15F0546031E39EF601683832631CA329549A630F2C9A3A69B1CC6E3CC927353605834FC62CAE
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset hu "&Abort" "&Megszak\u00edt\u00e1s". ::msgcat::mcset hu "&About..." "N\u00e9vjegy...". ::msgcat::mcset hu "All Files" "Minden f\u00e1jl". ::msgcat::mcset hu "Application Error" "Alkalmaz\u00e1s hiba". ::msgcat::mcset hu "&Blue" "&K\u00e9k". ::msgcat::mcset hu "Cancel" "M\u00e9gsem". ::msgcat::mcset hu "&Cancel" "M\u00e9g&sem". ::msgcat::mcset hu "Cannot change to the directory \"%1\$s\".\nPermission denied." "A k\u00f6nyvt\u00e1rv\u00e1lt\u00e1s nem siker\u00fclt: \"%1\$s\".\nHozz\u00e1f\u00e9r\u00e9s megtagadva.". ::msgcat::mcset hu "Choose Directory" "K\u00f6nyvt\u00e1r kiv\u00e1laszt\u00e1sa". ::msgcat::mcset hu "Cl&ear" "T\u00f6rl\u00e9s". ::msgcat::mcset hu "&Clear Console" "&T\u00f6rl\u00e9s Konzol". ::msgcat::mcset hu "Color" "Sz\u00edn". ::msgcat::mcset hu "Console" "Konzol". ::msgcat::mcset hu "&Copy" "&M\u00e1sol\u00e1s". ::msgcat::mcset hu "Cu&t" "&Kiv\u00e1g\u00e1s". ::msgcat::mcset hu "
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3692
              Entropy (8bit):4.444986253861924
              Encrypted:false
              SSDEEP:48:rtcxronR9zvjZ3hWsH9TYT/dllvOr80nC2dnGHc839kUqg:xcxoXBhlHiT/dlcY0HpVg
              MD5:ADB80EC5B23FC906A1A3313A30D789E6
              SHA1:5FB163BC1086D3366228204078F219FE4BB67CB3
              SHA-256:9F83DD0309ED621100F3187FFCDAE50B75F5973BBE74AF550A78EF0010495DED
              SHA-512:BA6E0C165561CDAEAB565EF1FED4087AB3B41EC3C18432C1BDA9B011E5C7C2E12F6B2CFC9F5C0CFAC1134AE53D80459D8E5B638739C61A851232047DEA7F3BA2
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset it "&Abort" "&Interrompi". ::msgcat::mcset it "&About..." "Informazioni...". ::msgcat::mcset it "All Files" "Tutti i file". ::msgcat::mcset it "Application Error" "Errore dell' applicazione". ::msgcat::mcset it "&Blue" "&Blu". ::msgcat::mcset it "Cancel" "Annulla". ::msgcat::mcset it "&Cancel" "&Annulla". ::msgcat::mcset it "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossibile accedere alla directory \"%1\$s\".\nPermesso negato.". ::msgcat::mcset it "Choose Directory" "Scegli una directory". ::msgcat::mcset it "Cl&ear" "Azzera". ::msgcat::mcset it "&Clear Console" "Azzera Console". ::msgcat::mcset it "Color" "Colore". ::msgcat::mcset it "Console". ::msgcat::mcset it "&Copy" "Copia". ::msgcat::mcset it "Cu&t" "Taglia". ::msgcat::mcset it "Delete" "Cancella". ::msgcat::mcset it "Details >>" "Dettagli >>". ::msgcat::mcset it "Directory \"%1\$s\" does not exist." "La director
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4466
              Entropy (8bit):4.472386382725933
              Encrypted:false
              SSDEEP:48:791wMjS3Md15YNISfTMEu5KIXTLLBIafWUuvfbLnZj4gT7VT4k7BLyslwI6Blb4t:DVe3MX8ISUKYuXbLnZj4MRJhjSIO4t
              MD5:B628EAFD489335ED620014B56821B792
              SHA1:8F6AFF68B42B747D30870D6DA7E058294921406A
              SHA-256:D3D07AAD792C0E83F4704B304931EA549D12CBB3D99A573D9815E954A5710707
              SHA-512:C33D097D2897D20F75A197E30B859DC83C8B4E42F260150BC7205918779D77A8C2390BE65376622F6705C38ECDF6F14B6ABAD29EDE3DE79603025BBBC39BEBC7
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset nl "&Abort" "&Afbreken". ::msgcat::mcset nl "&About..." "Over...". ::msgcat::mcset nl "All Files" "Alle Bestanden". ::msgcat::mcset nl "Application Error" "Toepassingsfout". ::msgcat::mcset nl "&Apply" "Toepassen". ::msgcat::mcset nl "Bold" "Vet". ::msgcat::mcset nl "Bold Italic" "Vet Cursief". ::msgcat::mcset nl "&Blue" "&Blauw". ::msgcat::mcset nl "Cancel" "Annuleren". ::msgcat::mcset nl "&Cancel" "&Annuleren". ::msgcat::mcset nl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan niet naar map \"%1\$s\" gaan.\nU heeft hiervoor geen toestemming.". ::msgcat::mcset nl "Choose Directory" "Kies map". ::msgcat::mcset nl "Cl&ear" "Wissen". ::msgcat::mcset nl "&Clear Console" "&Wis Console". ::msgcat::mcset nl "Color" "Kleur". ::msgcat::mcset nl "Console". ::msgcat::mcset nl "&Copy" "Kopi\u00ebren". ::msgcat::mcset nl "Cu&t" "Knippen". ::msgcat::mcset nl "&Delete" "Wissen". ::
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4841
              Entropy (8bit):4.754441208797498
              Encrypted:false
              SSDEEP:48:mYpnddv1H+BBv5vVXKjB+y7ldBU63XQ3DGHolytTzEQdWaz0ybBaKG:zpdzH+3vLKnG63XdHoMpYYaL
              MD5:17B63EFE0A99F44D27DD41C4CC0A8A7B
              SHA1:3E45C0102B287908D770A31D1906678E785088C2
              SHA-256:1993B4EC2DC009D2E6CA185D0BD565D3F33A4EFA79BACA39E4F97F574D63F305
              SHA-512:F8B9E7BC76A4ED5F948A9E505F3B1A321E322DD57CF88BEF36B6A9AF793462E45432709402151B4BB520B12B089A043CA23FF86106ED7B5C73DFBB6E233907F4
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset pl "&Abort" "&Przerwij". ::msgcat::mcset pl "&About..." "O programie...". ::msgcat::mcset pl "All Files" "Wszystkie pliki". ::msgcat::mcset pl "Application Error" "B\u0142\u0105d w programie". ::msgcat::mcset pl "&Apply" "Zastosuj". ::msgcat::mcset pl "Bold" "Pogrubienie". ::msgcat::mcset pl "Bold Italic" "Pogrubiona kursywa". ::msgcat::mcset pl "&Blue" "&Niebieski". ::msgcat::mcset pl "Cancel" "Anuluj". ::msgcat::mcset pl "&Cancel" "&Anuluj". ::msgcat::mcset pl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nie mo\u017cna otworzy\u0107 katalogu \"%1\$s\".\nOdmowa dost\u0119pu.". ::msgcat::mcset pl "Choose Directory" "Wybierz katalog". ::msgcat::mcset pl "Cl&ear" "&Wyczy\u015b\u0107". ::msgcat::mcset pl "&Clear Console" "&Wyczy\u015b\u0107 konsol\u0119". ::msgcat::mcset pl "Color" "Kolor". ::msgcat::mcset pl "Console" "Konsola". ::msgcat::mcset pl "&Copy" "&Kopiuj". ::msgcat::
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3913
              Entropy (8bit):4.5841256573492135
              Encrypted:false
              SSDEEP:48:k82mOQNHHouc2Ib2dxwj0Hpn4KeJ4iFHh29wDPK8+i92M5L:k82mOenox2x5Hp47mi3ZUMB
              MD5:236356817E391D8871EA59667F47DA0C
              SHA1:948EE95F4549DA8C7D412911D17B4B62CBA22ADD
              SHA-256:AD0E466131D3789DE321D9D0588E19E4647BA82EDE41EEE6EBEF464786F8BDBE
              SHA-512:3AB10D1980D4C1367EA0BB54E50709DF32A870E851EDE80F30F66DA4B09C1ACFFF4E77C462BD815DD67F485DDFF77FEBD09CA29D77EEE55FE8A00D115D600C32
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset pt "&Abort" "&Abortar". ::msgcat::mcset pt "About..." "Sobre ...". ::msgcat::mcset pt "All Files" "Todos os arquivos". ::msgcat::mcset pt "Application Error" "Erro de aplica\u00e7\u00e3o". ::msgcat::mcset pt "&Blue" "&Azul". ::msgcat::mcset pt "Cancel" "Cancelar". ::msgcat::mcset pt "&Cancel" "&Cancelar". ::msgcat::mcset pt "Cannot change to the directory \"%1\$s\".\nPermission denied." "N\u00e3o foi poss\u00edvel mudar para o diret\u00f3rio \"%1\$s\".\nPermiss\u00e3o negada.". ::msgcat::mcset pt "Choose Directory" "Escolha um diret\u00f3rio". ::msgcat::mcset pt "Cl&ear" "Apagar". ::msgcat::mcset pt "&Clear Console" "Apagar Console". ::msgcat::mcset pt "Color" "Cor". ::msgcat::mcset pt "Console". ::msgcat::mcset pt "&Copy" "Copiar". ::msgcat::mcset pt "Cu&t" "Recortar". ::msgcat::mcset pt "&Delete" "Excluir". ::msgcat::mcset pt "Details >>" "Detalhes >>". ::msgcat::mcset pt "Directory \"%1\$s\"
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7214
              Entropy (8bit):4.358559144448363
              Encrypted:false
              SSDEEP:96:ZUEBGTT4Ys7LT3xXkhF2xSrwFlOzFAn9E/j49cDRqRjGSQvN8Nfo5hgV9aWTRtaa:SraFGImk+4RKOGqRyRu
              MD5:D7C27DBDF7B349BE13E09F35BA61A5F8
              SHA1:40A52544B557F19736EA1767BFBF5708A9BBC318
              SHA-256:C863DEBAB79F9682FD0D52D864E328E7333D03F4E9A75DBB342C30807EFDCFFB
              SHA-512:DAF10336096B0574F060757CB6DD24049692F81B969B01BB8FA212035D955B8DA53F5ECDE3613E6AEF3C47165F075CC14363E4B854B2407EA452EAB4D4D31955
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset ru "&Abort" "&\u041e\u0442\u043c\u0435\u043d\u0438\u0442\u044c". ::msgcat::mcset ru "&About..." "\u041f\u0440\u043e...". ::msgcat::mcset ru "All Files" "\u0412\u0441\u0435 \u0444\u0430\u0439\u043b\u044b". ::msgcat::mcset ru "Application Error" "\u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435". ::msgcat::mcset ru "&Blue" " &\u0413\u043e\u043b\u0443\u0431\u043e\u0439". ::msgcat::mcset ru "Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430". ::msgcat::mcset ru "&Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430". ::msgcat::mcset ru "Cannot change to the directory \"%1\$s\".\nPermission denied." \...."\u041d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \"%1\$s\".\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430".
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3832
              Entropy (8bit):4.609382297476727
              Encrypted:false
              SSDEEP:48:g4HXcfWBJdE10M4/00li6z8XIxTB2iDxypdmmZbWxOt:FXcf6H00li9IxTEbQsb7t
              MD5:DB1712B1C1FF0E3A46F8E86FBB78AA4D
              SHA1:28D9DB9CBEE791C09BD272D9C2A6C3DA80EB89EA
              SHA-256:B76EBFA21BC1E937A04A04E5122BE64B5CDEE1F47C7058B71D8B923D70C3B17B
              SHA-512:F79CD72DCD6D1B4212A5058DA5A020E8A157E72E6D84CAFB96463E76C1CED5AC367A2295EF743FDE70C9AB1CF2F4D88A4A73300DFD4F799AA3ECDA6FBF04E588
              Malicious:false
              Preview:namespace eval ::tk {. ::msgcat::mcset sv "&Abort" "&Avsluta". ::msgcat::mcset sv "&About..." "&Om...". ::msgcat::mcset sv "All Files" "Samtliga filer". ::msgcat::mcset sv "Application Error" "Programfel". ::msgcat::mcset sv "&Blue" "&Bl\u00e5". ::msgcat::mcset sv "Cancel" "Avbryt". ::msgcat::mcset sv "&Cancel" "&Avbryt". ::msgcat::mcset sv "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ej n\u00e5 mappen \"%1\$s\".\nSaknar r\u00e4ttigheter.". ::msgcat::mcset sv "Choose Directory" "V\u00e4lj mapp". ::msgcat::mcset sv "Cl&ear" "&Radera". ::msgcat::mcset sv "&Clear Console" "&Radera konsollen". ::msgcat::mcset sv "Color" "F\u00e4rg". ::msgcat::mcset sv "Console" "Konsoll". ::msgcat::mcset sv "&Copy" "&Kopiera". ::msgcat::mcset sv "Cu&t" "Klipp u&t". ::msgcat::mcset sv "&Delete" "&Radera". ::msgcat::mcset sv "Details >>" "Detaljer >>". ::msgcat::mcset sv "Directory \"%1\$s\" does not exist." "Mappen \"%1\$s\" finns
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5594
              Entropy (8bit):4.9941618573215525
              Encrypted:false
              SSDEEP:96:oz4CrtmsXVwM3Er4VAEQ93NZB1o+IFF5ZYi4GUoLf33yLLddzA:oUCrtmsFREEs999o7FF5ZYi4GjLfS/d2
              MD5:7763C90F811620A6C1F0A36BAF9B89CA
              SHA1:30E24595DD683E470FE9F12814D27D6D266B511E
              SHA-256:F6929A5E0D18BC4C6666206C63AC4AAA66EDC4B9F456DFC083300CFA95A44BCD
              SHA-512:2E2887392C67D05EA85DB2E6BFD4AA27779BC82D3B607A7DD221A99EFF0D2A21A6BA47A4F2D2CDFC7CFECD7E93B2B38064C4D5A51406471AE142EC9CC71F5C48
              Malicious:false
              Preview:# obsolete.tcl --.#.# This file contains obsolete procedures that people really shouldn't.# be using anymore, but which are kept around for backward compatibility..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# The procedures below are here strictly for backward compatibility with.# Tk version 3.6 and earlier. The procedures are no longer needed, so.# they are no-ops. You should not use these procedures anymore, since.# they may be removed in some future release...proc tk_menuBar args {}.proc tk_bindForTraversal args {}..# ::tk::classic::restore --.#.# Restore the pre-8.5 (Tk classic) look as the widget defaults for classic.# Tk widgets..#.# The value following an 'option add' call is the new 8.5 value..#.namespace eval ::tk::classic {. # This may need to be adjusted for some windo
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1586
              Entropy (8bit):4.733749898743743
              Encrypted:false
              SSDEEP:48:k2hguC4Zxk+Z0cIWR3afbR1EIC+KtVa+6WX13jZQl9:k6T9N3atqIkeS9FQD
              MD5:D17FE676A057F373B44C9197114F5A69
              SHA1:9745C83EEC8565602F8D74610424848009FFA670
              SHA-256:76DBDBF9216678D48D1640F8FD1E278E7140482E1CAC7680127A9A425CC61DEE
              SHA-512:FF7D9EB64D4367BB11C567E64837CB1DAAA9BE0C8A498CAD00BF63AF45C1826632BC3A09E65D6F51B26EBF2D07285802813ED55C5D697460FC95AF30A943EF8F
              Malicious:false
              Preview:# optMenu.tcl --.#.# This file defines the procedure tk_optionMenu, which creates.# an option button and its associated menu..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_optionMenu --.# This procedure creates an option button named $w and an associated.# menu. Together they provide the functionality of Motif option menus:.# they can be used to select one of many values, and the current value.# appears in the global variable varName, as well as in the text of.# the option menubutton. The name of the menu is returned as the.# procedure's result, so that the caller can use it to change configuration.# options on the menu or otherwise manipulate it..#.# Arguments:.# w -...The name to use for the menubutton..# varName -..Global variable to hold the currently selected value..# first
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8174
              Entropy (8bit):4.9180898441277705
              Encrypted:false
              SSDEEP:192:ZUW5yUd51URCJWgWWWuWVWUKoDOdnAjLDlJymGH91QOW86vkQI:ZLXaCI3dFUlPdnAP69W89
              MD5:ABE618A0891CD6909B945A2098C77D75
              SHA1:A322CCFB33FF73E4A4730B5B21DE4290F9D94622
              SHA-256:60B8579368BB3063F16D25F007385111E0EF8D97BB296B03656DC176E351E3CA
              SHA-512:2DF5A50F3CA7D21F43651651879BCAE1433FF44B0A7ECE349CCF73BECC4780160125B21F69348C97DCD60503FC79A6525DB723962197E8550B42D0AE257FD8E7
              Malicious:false
              Preview:# palette.tcl --.#.# This file contains procedures that change the color palette used.# by Tk..#.# Copyright (c) 1995-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_setPalette --.# Changes the default color scheme for a Tk application by setting.# default colors in the option database and by modifying all of the.# color options for existing widgets that have the default value..#.# Arguments:.# The arguments consist of either a single color name, which.# will be used as the new background color (all other colors will.# be computed from this) or an even number of values consisting of.# option names and values. The name for an option is the one used.# for the option database, such as activeForeground, not -activeforeground...proc ::tk_setPalette {args} {. if {[winfo depth .] == 1} {..# Just return on monochrome displays, otherwise errors will occur..return. }.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5176
              Entropy (8bit):4.933519639131517
              Encrypted:false
              SSDEEP:96:PmpWHrga3awUrH6kdX3pBz6tkm71cHXYV23EmkiYlgfY8:+pWHrP36r6kJ3pBetkm6HXVUmPYlgfY8
              MD5:2DA0A23CC9D6FD970FE00915EA39D8A2
              SHA1:DFE3DC663C19E9A50526A513043D2393869D8F90
              SHA-256:4ADF738B17691489C71C4B9D9A64B12961ADA8667B81856F7ADBC61DFFEADF29
              SHA-512:B458F3D391DF9522D4E7EAE8640AF308B4209CE0D64FD490BFC0177FDE970192295C1EA7229CE36D14FC3E582C7649460B8B7B0214E0FF5629B2B430A99307D4
              Malicious:false
              Preview:# panedwindow.tcl --.#.# This file defines the default bindings for Tk panedwindow widgets and.# provides procedures that help in implementing those bindings...bind Panedwindow <Button-1> { ::tk::panedwindow::MarkSash %W %x %y 1 }.bind Panedwindow <Button-2> { ::tk::panedwindow::MarkSash %W %x %y 0 }..bind Panedwindow <B1-Motion> { ::tk::panedwindow::DragSash %W %x %y 1 }.bind Panedwindow <B2-Motion> { ::tk::panedwindow::DragSash %W %x %y 0 }..bind Panedwindow <ButtonRelease-1> {::tk::panedwindow::ReleaseSash %W 1}.bind Panedwindow <ButtonRelease-2> {::tk::panedwindow::ReleaseSash %W 0}..bind Panedwindow <Motion> { ::tk::panedwindow::Motion %W %x %y }..bind Panedwindow <Leave> { ::tk::panedwindow::Leave %W }..# Initialize namespace.namespace eval ::tk::panedwindow {}..# ::tk::panedwindow::MarkSash --.#.# Handle marking the correct sash for possible dragging.#.# Arguments:.# w..the widget.# x..widget local x coord.# y..widget local y coord.# proxy.whether this should be a prox
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):363
              Entropy (8bit):4.977735142707899
              Encrypted:false
              SSDEEP:6:Cjtl17nOJRVxTc6ynID/cL44ncleXNyLMQ9HECJBIQ08PbDMQ9HECJBIQem8:ot7rOJdg6LYUlVfBIUjjfBIFF
              MD5:A6448AF2C8FAFC9A4F42EACA6BF6AB2E
              SHA1:0B295B46B6DF906E89F40A907022068BC6219302
              SHA-256:CD44EE7F76C37C0C522BD0CFCA41C38CDEDDC74392B2191A3AF1A63D9D18888E
              SHA-512:5B1A8CA5B09B7281DE55460D21D5195C4EE086BEBDC35FA561001181490669FFC67D261F99EAA900467FE97E980EB733C5FFBF9D8C541EDE18992BF4A435C749
              Malicious:false
              Preview:if {[catch {package present Tcl 8.6.0}]} { return }.if {($::tcl_platform(platform) eq "unix") && ([info exists ::env(DISPLAY)]..|| ([info exists ::argv] && ("-display" in $::argv)))} {. package ifneeded Tk 8.6.9 [list load [file join $dir .. .. bin libtk8.6.dll] Tk].} else {. package ifneeded Tk 8.6.9 [list load [file join $dir .. .. bin tk86t.dll] Tk].}.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7381
              Entropy (8bit):4.833263771361282
              Encrypted:false
              SSDEEP:192:keEoaa0QfsimXZrjpgj47e5QeO9uMfUKvLAN6Zo:keEoRHsiWddgkoiUeG
              MD5:EFC567E407C48BF2BE4E09CB18DEFC11
              SHA1:EDEDB6776963B7D629C6ACE9440D24EB78DEA878
              SHA-256:9708F5A1E81E1C3FEAF189020105BE28D27AA8808FF9FB2DCCA040500CF2642A
              SHA-512:BDA5F92BD2F7B9CD29C5A732EC77A71291778A0EC3EABE81575C55DE3E207F663BA28DA4C95174045A74EFFF71B95D907C9D056BAA9E585E6F6DC14A133760BC
              Malicious:false
              Preview:# safetk.tcl --.#.# Support procs to use Tk in safe interpreters..#.# Copyright (c) 1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# see safetk.n for documentation..#.#.# Note: It is now ok to let untrusted code being executed.# between the creation of the interp and the actual loading.# of Tk in that interp because the C side Tk_Init will.# now look up the master interp and ask its safe::TkInit.# for the actual parameters to use for it's initialization (if allowed),.# not relying on the slave state..#..# We use opt (optional arguments parsing).package require opt 0.4.1;..namespace eval ::safe {.. # counter for safe toplevels. variable tkSafeId 0.}..#.# tkInterpInit : prepare the slave interpreter for tk loading.# most of the real job is done by loadTk.# returns the slave name (tkInterpInit does).#.proc ::safe::tkInterpIni
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):7766
              Entropy (8bit):4.933555104215445
              Encrypted:false
              SSDEEP:192:q1xTLI9LUAp8cZIQ+Umuy9vYE2dLTaQfiwHZeABypyTtB:HUN1Umn2dKuHIpCB
              MD5:1CE32CDAEB04C75BFCEEA5FB94B8A9F0
              SHA1:CC7614C9EADE999963EE78B422157B7B0739894C
              SHA-256:58C662DD3D2C653786B05AA2C88831F4E971B9105E4869D866FB6186E83ED365
              SHA-512:1EE5A187615AE32F17936931B30FEA9551F9E3022C1F45A2BCA81624404F4E68022FCF0B03FBD61820EC6958983A8F2FBFC3AD2EC158433F8E8DE9B8FCF48476
              Malicious:false
              Preview:# scale.tcl --.#.# This file defines the default bindings for Tk scale widgets and provides.# procedures that help in implementing the bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1995 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for entries..#-------------------------------------------------------------------------..# Standard Motif bindings:..bind Scale <Enter> {. if {$tk_strictMotif} {..set tk::Priv(activeBg) [%W cget -activebackground]..%W configure -activebackground [%W cget -background]. }. tk::ScaleActivate %W %x %y.}.bind Scale <Motion> {. tk::ScaleActivate %W %x %y.}.bind Scale <Leave> {. if {$tk_strictMotif} {..%W configure -activebackground $tk::Priv(activeBg). }.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12748
              Entropy (8bit):5.026700023745507
              Encrypted:false
              SSDEEP:192:AfVS+eV9fKbBevrpQQtfJMZqSwiXEfY4yhIa7yLIVNpIgdWmD3T1gFpN:Pf4wTGOfmkSwORVqaGcV4q7kpN
              MD5:4CBFFC4E6B3F56A5890E3F7C31C6C378
              SHA1:75DB5205B311F55D1CA1D863B8688A628BF6012A
              SHA-256:6BA3E2D62BD4856D7D7AE87709FCAA23D81EFC38C375C6C5D91639555A84C35D
              SHA-512:65DF7AE09E06C200A8456748DC89095BB8417253E01EC4FDAFB28A84483147DDC77AAF6B49BE9E18A326A94972086A99044BEE3CE5CF8026337DFC6972C92C04
              Malicious:false
              Preview:# scrlbar.tcl --.#.# This file defines the default bindings for Tk scrollbar widgets..# It also provides procedures that help in implementing the bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for scrollbars..#-------------------------------------------------------------------------..# Standard Motif bindings:.if {[tk windowingsystem] eq "x11" || [tk windowingsystem] eq "aqua"} {..bind Scrollbar <Enter> {. if {$tk_strictMotif} {..set tk::Priv(activeBg) [%W cget -activebackground]..%W configure -activebackground [%W cget -background]. }. %W activate [%W identify %x %y].}.bind Scrollbar <Motion> {. %W activate [%W identify %x %y].}..# The
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):15640
              Entropy (8bit):5.001694129885997
              Encrypted:false
              SSDEEP:192:aR1yvxxVRQRrclOniQ14Yvg5bbVFMio1UF9w9P75uaMY+c6RhO1ON6Ql4qRiZ0NO:MyF5XVF61iwZ75/YRhO464z8wdEt
              MD5:9971530F110AC2FB7D7EC91789EA2364
              SHA1:AB553213C092EF077524ED56FC37DA29404C79A7
              SHA-256:5D6E939B44F630A29C4FCB1E2503690C453118607FF301BEF3C07FA980D5075A
              SHA-512:81B4CEC39B03FBECA59781AA54960F0A10A09733634F401D5553E1AAA3EBF12A110C9D555946FCDD70A9CC897514663840745241AD741DC440BB081A12DCF411
              Malicious:false
              Preview:# spinbox.tcl --.#.# This file defines the default bindings for Tk spinbox widgets and provides.# procedures that help in implementing those bindings. The spinbox builds.# off the entry widget, so it can reuse Entry bindings and procedures..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1999-2000 Jeffrey Hobbs.# Copyright (c) 2000 Ajuba Solutions.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for example,.#...start dragging out a
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):20270
              Entropy (8bit):4.749624735829406
              Encrypted:false
              SSDEEP:384:edtm3fv2ZzffGIgowSDxD7n2s7AcBnaUuFyLWFot5gzSG3k96vNTWuoJnfOvWhbk:eds3fv2ZzffGIgowSDxD7nd7AcBnahFN
              MD5:4AD192C43972A6A4834D1D5A7C511750
              SHA1:09CA39647AA1C14DB16014055E48A9B0237639BA
              SHA-256:8E8ECECFD6046FE413F37A91933EEA086E31959B3FBEB127AFDD05CD9141BE9A
              SHA-512:287FAADBC6F65FCC3EA9C1EC10B190712BB36A06D28E59F8D268EA585B4E6B13494BA111DFF6AC2EBF998578999C9C36965C714510FC21A9ACB65FF9B75097CB
              Malicious:false
              Preview:# Tcl autoload index file, version 2.0.# This file is generated by the "auto_mkindex" command.# and sourced to set up indexing information for one or.# more commands. Typically each line is a command that.# sets an element in the auto_index array, where the.# element name is the name of a command and the value is.# a script that loads the command...set auto_index(::tk::dialog::error::Return) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::Details) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::SaveToLog) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::Destroy) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::bgerror) [list source [file join $dir bgerror.tcl]].set auto_index(bgerror) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::ButtonInvoke) [list source [file join $dir button.tcl]].set auto_index(::tk::ButtonAutoInvoke) [list source [file join
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5142
              Entropy (8bit):4.672280480827932
              Encrypted:false
              SSDEEP:96:MgPXEnPQcTtD7zxeHK7ijhgdhAhbbjymL/KK2pLQY4QYNHL43EwzS6ejW:MgPUnPtTtFeqmjhgdhIbbjymL/KKeLQW
              MD5:214FA0731A27E33826F2303750B64784
              SHA1:C2DA41761FB7BAE38DDDEFA22AB57B337F54F5D8
              SHA-256:FB6B35ECB1438BB8A2D816B86FB0C55500C6EA8D24AECB359CC3C7D3B3C54DE0
              SHA-512:2E2A2412CBB090C0728333480B0E07C85087ED932974A235D5BC8C9725DE937520205D988872E1B5BEFA1E80201E046C500BC875A5CBD584A5099930EBBD115A
              Malicious:false
              Preview:# tearoff.tcl --.#.# This file contains procedures that implement tear-off menus..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk::TearoffMenu --.# Given the name of a menu, this procedure creates a torn-off menu.# that is identical to the given menu (including nested submenus)..# The new torn-off menu exists as a toplevel window managed by the.# window manager. The return value is the name of the new menu..# The window is created at the point specified by x and y.#.# Arguments:.# w -...The menu to be torn-off (duplicated)..# x -...x coordinate where window is created.# y -...y coordinate where window is created..proc ::tk::TearOffMenu {w {x 0} {y 0}} {. # Find a unique name to use for the torn-off menu. Find the first. # ancestor of w that is a toplevel but not a menu,
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):33155
              Entropy (8bit):4.908284262811967
              Encrypted:false
              SSDEEP:384:ThZXGSuWlNGbyBFFRzGagUNKEFx8wredkG/gVVFaO/9bembFWaHnla98ffRiqiPp:TYaNGKF6uNdyO4Ona98ffRUAlde
              MD5:03CC27E28E0CFCE1B003C3E936797AB0
              SHA1:C7FE5AE7F35C86EC3724F6A111EAAF2C1A18ABE9
              SHA-256:BCCC1039F0EB331C4BB6BD5848051BB745F242016952723478C93B009F63D254
              SHA-512:5091B10EE8446E6853EF7060EC13AB8CADA0D6448F9081FEBD07546C061F69FC273BBF23BA7AF05D8359E618DD68A5C27F0453480FE3F26E744DB19BFCD115C7
              Malicious:false
              Preview:# text.tcl --.#.# This file defines the default bindings for Tk text widgets and provides.# procedures that help in implementing the bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998 by Scriptics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of ::tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# char -..Character position on the line; kept in order.#...to allow moving up or down past short lines while.#...still remembering the desired position..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for exampl
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):23142
              Entropy (8bit):5.097142507145225
              Encrypted:false
              SSDEEP:384:dmAlIQ7ylH462gngqeObubqLwvoGah0QSA4jLGn3WB0MCdPAWD+g190K5TzMSW4d:dmOIQulHokh0QzMemB0MCD+g1bk+
              MD5:3250EC5B2EFE5BBE4D3EC271F94E5359
              SHA1:6A0FE910041C8DF4F3CDC19871813792E8CC4E4C
              SHA-256:E1067A0668DEBB2D8E8EC3B7BC1AEC3723627649832B20333F9369F28E4DFDBF
              SHA-512:F8E403F3D59D44333BCE2AA7917E6D8115BEC0FE5AE9A1306F215018B05056467643B7AA228154DDCED176072BC903DFB556CB2638F5C55C1285C376079E8FE3
              Malicious:false
              Preview:# tk.tcl --.#.# Initialization script normally executed in the interpreter for each Tk-based.# application. Arranges class bindings for widgets..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Ajuba Solutions..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...# Verify that we have Tk binary and script components from the same release.package require -exact Tk 8.6.9...# Create a ::tk namespace.namespace eval ::tk {. # Set up the msgcat commands. namespace eval msgcat {..namespace export mc mcmax. if {[interp issafe] || [catch {package require msgcat}]} {. # The msgcat package is not available. Supply our own. # minimal replacement.. proc mc {src args} {. return [format $src {*}$args]. }. proc mcmax {args} {.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):38373
              Entropy (8bit):5.143151103117394
              Encrypted:false
              SSDEEP:384:a6NFLvIIaE2wCpxQYt/rJTkA3NN5YAGnk1c6gHZZgkO0Z6INfdpsaUpWz8ZlhL5S:akJ2wKFXuNzClMGH87f12Vb4
              MD5:21985684C432CB918A3E862517842F75
              SHA1:4DBACAEEF8454C1B08993D76857C5F09AA75405A
              SHA-256:AE448DF6FDBBA45D450ABEFEF12799F8362177B0B9FE06F3CA3CB0EDA5E6AA58
              SHA-512:AFEA6C47001455D7E40A5A7728FA4DFAD7BB66B02191E807BB15355847F5B265DEEE6015516807B10E1273710A3D03FAAC7856CB16EFA773813105B23A11960F
              Malicious:false
              Preview:# tkfbox.tcl --.#.#.Implements the "TK" standard file selection dialog box. This dialog.#.box is used on the Unix platforms whenever the tk_strictMotif flag is.#.not set..#.#.The "TK" standard file selection dialog box is similar to the file.#.selection dialog box on Win95(TM). The user can navigate the.#.directories by clicking on the folder icons or by selecting the.#."Directory" option menu. The user can select files by clicking on the.#.file icons or by entering a filename in the "Filename:" entry..#.# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {. namespace import -force ::tk::msgcat::*. variable showHiddenBtn 0. variable showHiddenVar 1.. # Create the images if they did not already exist.. if {![info exists ::tk::Priv(updirImage)]} {..set ::tk::Priv(updirImage)
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3683
              Entropy (8bit):4.872530668776095
              Encrypted:false
              SSDEEP:48:xICsIX5RupDdMrwuQb8BQEQWQEQK9FVGQJFVGDusxzUFIG0usf2kGKQH+n5dvW8m:h7oFAzfphta9DwuTa
              MD5:8FF9D357AF3806D997BB8654E95F530C
              SHA1:62292163299CC229031BB4EAFBE900323056561A
              SHA-256:E36864B33D7C2B47FE26646377BE86FB341BBF2B6DF13E33BD799E87D24FC193
              SHA-512:ECDC47E7D1F0F9C0C052ACA2EB2DE10E78B2256E8DB85D7B52F365C1074A4E24CDB1C7A2780B36DFA36F174FF87B6A31C49F61CC0AC3D2412B3915234D911C9C
              Malicious:false
              Preview:#.# Ttk widget set: Alternate theme.#..namespace eval ttk::theme::alt {.. variable colors. array set colors {..-frame .."#d9d9d9"..-window.."#ffffff"..-darker ."#c3c3c3"..-border.."#414141"..-activebg ."#ececec"..-disabledfg."#a3a3a3"..-selectbg."#4a6984"..-selectfg."#ffffff"..-altindicator."#aaaaaa". }.. ttk::style theme settings alt {...ttk::style configure "." \.. -background .$colors(-frame) \.. -foreground .black \.. -troughcolor.$colors(-darker) \.. -bordercolor.$colors(-border) \.. -selectbackground .$colors(-selectbg) \.. -selectforeground .$colors(-selectfg) \.. -font ..TkDefaultFont \.. ;...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activebg)] ;..ttk::style map "." -foreground [list disabled $colors(-disabledfg)] ;. ttk::style map "." -embossed [list disabled 1] ;...ttk::style configure TButton \.. -anchor center -width -11 -padding "1 1" \.. -relief raised -shiftrelief 1 \.. -highl
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2245
              Entropy (8bit):4.988082031411997
              Encrypted:false
              SSDEEP:48:tdlBlblITKleKgNX1gPc+JFzVPb9ZLJY2ZL7X0jX4:p51gRK7F9DzrMo
              MD5:6466DBA5F7DDB28F280A24E2397DD875
              SHA1:060C504D08B014EB388EFAF48E3720CE5D7F0132
              SHA-256:CBC17D1C434CACD0AB42CDCC4D62ED193F926447189AD258C13738D4EC154A80
              SHA-512:5FAAC1C5FC868DCE8B7A9431BEAEB8117ADDE5C752306CAD7B6FA8123758F2CF37FB1CF18CAC2934F7D07B14FAFCE01581BAD0CA952BFECFCBD9E1E26FF9A64C
              Malicious:false
              Preview:#.# Aqua theme (OSX native look and feel).#..namespace eval ttk::theme::aqua {. ttk::style theme settings aqua {...ttk::style configure . \.. -font TkDefaultFont \.. -background systemWindowBody \.. -foreground systemModelessDialogActiveText \.. -selectbackground systemHighlight \.. -selectforeground systemModelessDialogActiveText \.. -selectborderwidth 0 \.. -insertwidth 1...ttk::style map . \.. -foreground {disabled systemModelessDialogInactiveText... background systemModelessDialogInactiveText} \.. -selectbackground {background systemHighlightSecondary... !focus systemHighlightSecondary} \.. -selectforeground {background systemModelessDialogInactiveText... !focus systemDialogActiveText}...# Workaround for #1100117:..# Actually, on Aqua we probably shouldn't stipple images in..# disabled buttons even if it did work.....ttk::style configure . -stipple {}...ttk::style configure TButton -anchor center -width -6..ttk::style configure Toolbutton -
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2978
              Entropy (8bit):4.8919006418640265
              Encrypted:false
              SSDEEP:48:hpNRZ/rtWkRMC0ScGHsAEfKPi7K1MFNQ6z4Dvh8niT6CUI+SfRHThp:DNRZzse1cGH3UvKmFNQ6z2hT6CUI+4Hb
              MD5:EA7CF40852AFD55FFDA9DB29A0E11322
              SHA1:B7B42FAC93E250B54EB76D95048AC3132B10E6D8
              SHA-256:391B6E333D16497C4B538A7BDB5B16EF11359B6E3B508D470C6E3703488E3B4D
              SHA-512:123D78D6AC34AF4833D05814220757DCCF2A9AF4761FE67A8FE5F67A0D258B3C8D86ED346176FFB936AB3717CFD75B4FAB7373F7853D44FA356BE6E3A75E51B9
              Malicious:false
              Preview:#.# Bindings for Buttons, Checkbuttons, and Radiobuttons..#.# Notes: <Button1-Leave>, <Button1-Enter> only control the "pressed".# state; widgets remain "active" if the pointer is dragged out..# This doesn't seem to be conventional, but it's a nice way.# to provide extra feedback while the grab is active..# (If the button is released off the widget, the grab deactivates and.# we get a <Leave> event then, which turns off the "active" state).#.# Normally, <ButtonRelease> and <ButtonN-Enter/Leave> events are .# delivered to the widget which received the initial <ButtonPress>.# event. However, Tk [grab]s (#1223103) and menu interactions.# (#1222605) can interfere with this. To guard against spurious.# <Button1-Enter> events, the <Button1-Enter> binding only sets.# the pressed state if the button is currently active..#..namespace eval ttk::button {}..bind TButton <Enter> ..{ %W instate !disabled {%W state active} }.bind TButton <Leave>..{ %W state !active }.bind TButton <Key-space>.{ ttk:
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4742
              Entropy (8bit):4.859511673200619
              Encrypted:false
              SSDEEP:48:9zDTlU3tCKW3PiAu4UZQsk+EBSucCtCqM368CtTU/+xgxaYgxaf/sY2+rF5usxzk:ZuHjO7uCkqM3JCNU/igxNgxor2tpuTM
              MD5:AA2987DC061DAA998B73A1AD937EE4BB
              SHA1:33FE9DFA76FB08B9D8D5C3554D13482D330C2DB1
              SHA-256:4ED0ACDD29FC1FB45C6BDC9EFB2CBADE34B93C45D5DBB269A4A4A3044CF4CB7A
              SHA-512:5A83B1FC88E42BB1DAD60D89CD5F2193E6AB59C4902A6C727E0090D1F395C2F122521FDFF250A14109EE5113D5034319199FB260129416EA962559350F217A03
              Malicious:false
              Preview:#.# "Clam" theme..#.# Inspired by the XFCE family of Gnome themes..#..namespace eval ttk::theme::clam {. variable colors . array set colors {..-disabledfg.."#999999"..-frame .."#dcdad5"..-window .."#ffffff"..-dark..."#cfcdc8"..-darker .."#bab5ab"..-darkest.."#9e9a91"..-lighter.."#eeebe7"..-lightest .."#ffffff"..-selectbg.."#4a6984"..-selectfg.."#ffffff"..-altindicator.."#5895bc"..-disabledaltindicator."#a0a0a0". }.. ttk::style theme settings clam {...ttk::style configure "." \.. -background $colors(-frame) \.. -foreground black \.. -bordercolor $colors(-darkest) \.. -darkcolor $colors(-dark) \.. -lightcolor $colors(-lighter) \.. -troughcolor $colors(-darker) \.. -selectbackground $colors(-selectbg) \.. -selectforeground $colors(-selectfg) \.. -selectborderwidth 0 \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -background [list disabled $colors(-frame) \.... active $colors(-lighter)] \.. -foreground [list disabled $colors(
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3828
              Entropy (8bit):4.892728136244756
              Encrypted:false
              SSDEEP:48:yAJZjsTMw96Ey6kvzuVuby+x0M+x06uxjFVGQJFVGQuxzUFIGQutK2MRvD7J+iSz:yAJZ8MVJiVR+x/+xefVItuTy7Urt
              MD5:7DBF35F3F0F9FB68626019FF94EFBCD3
              SHA1:213F18224BF0573744836CD3BEDC83D5E443A406
              SHA-256:30E6766E9B8292793395324E412B0F5A8888512B84B080E247F95BF6EFB11A9D
              SHA-512:9081E5C89ECDE8337C5A52531DEF24924C0BCB3A1F0596D3B986CC59E635F67A78327ABF26209BF71A9BA370A93174298E6ABD11586382D7D70ADEA7E5CCF854
              Malicious:false
              Preview:#.# "classic" Tk theme..#.# Implements Tk's traditional Motif-like look and feel..#..namespace eval ttk::theme::classic {.. variable colors; array set colors {..-frame.."#d9d9d9"..-window.."#ffffff"..-activebg."#ececec"..-troughbg."#c3c3c3"..-selectbg."#c3c3c3"..-selectfg."#000000"..-disabledfg."#a3a3a3"..-indicator."#b03060"..-altindicator."#b05e5e". }.. ttk::style theme settings classic {..ttk::style configure "." \.. -font..TkDefaultFont \.. -background..$colors(-frame) \.. -foreground..black \.. -selectbackground.$colors(-selectbg) \.. -selectforeground.$colors(-selectfg) \.. -troughcolor.$colors(-troughbg) \.. -indicatorcolor.$colors(-frame) \.. -highlightcolor.$colors(-frame) \.. -highlightthickness.1 \.. -selectborderwidth.1 \.. -insertwidth.2 \.. ;...# To match pre-Xft X11 appearance, use:..#.ttk::style configure . -font {Helvetica 12 bold}...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activeb
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):12493
              Entropy (8bit):5.024195855137721
              Encrypted:false
              SSDEEP:192:l/9k9hqpFXQN9uK5Bt3NvnIW+KYNbrulkL90t98VrQETczIT9QeSaQjJI1/P0lcx:BhllSBtVL5MmI0K
              MD5:FBCAA6A08D9830114248F91E10D4C918
              SHA1:FA63C94824BEBD3531086816650D3F3FA73FE434
              SHA-256:9D80AA9701E82862467684D3DFF1A9EC5BBC2BBBA4F4F070518BBDE7E38499BB
              SHA-512:B377C31CC9137851679CBA0560EFE4265792D1576BD781DD42C22014A7A8F3D10D9D48A1154BB88A2987197594C8B728B71FA689CE1B32928F8513796A6A0AA3
              Malicious:false
              Preview:#.# Combobox bindings..#.# <<NOTE-WM-TRANSIENT>>:.#.#.Need to set [wm transient] just before mapping the popdown.#.instead of when it's created, in case a containing frame.#.has been reparented [#1818441]..#.#.On Windows: setting [wm transient] prevents the parent.#.toplevel from becoming inactive when the popdown is posted.#.(Tk 8.4.8+).#.#.On X11: WM_TRANSIENT_FOR on override-redirect windows.#.may be used by compositing managers and by EWMH-aware.#.window managers (even though the older ICCCM spec says.#.it's meaningless)..#.#.On OSX: [wm transient] does utterly the wrong thing..#.Instead, we use [MacWindowStyle "help" "noActivates hideOnSuspend"]..#.The "noActivates" attribute prevents the parent toplevel.#.from deactivating when the popdown is posted, and is also.#.necessary for "help" windows to receive mouse events..#."hideOnSuspend" makes the popdown disappear (resp. reappear).#.when the parent toplevel is deactivated (resp. reactivated)..#.(see [#1814778]). Also set [wm resiz
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4007
              Entropy (8bit):4.827479665184231
              Encrypted:false
              SSDEEP:48:xtIni2E1nmuVoLlTxG6qVXvDiPOaCkhxKLbqnJ2RLWumgMJVZlZPDjsfMh8vIviX:sn+myoLBxG3laOqJlZT3rkdSVOJm0
              MD5:74596004DFDBF2ECF6AF9C851156415D
              SHA1:933318C992B705BF9F8511621B4458ECB8772788
              SHA-256:7BDFFA1C2692C5D1CF67B518F9ACB32FA4B4D9936ED076F4DB835943BC1A00D6
              SHA-512:0D600B21DB67BF9DADBDD49559573078EFB41E473E94124AC4D2551BC10EC764846DC1F7674DAA79F8D2A8AEB4CA27A5E11C2F30EDE47E3ECEE77D60D7842262
              Malicious:false
              Preview:#.# Map symbolic cursor names to platform-appropriate cursors..#.# The following cursors are defined:.#.#.standard.-- default cursor for most controls.#.""..-- inherit cursor from parent window.#.none..-- no cursor.#.#.text..-- editable widgets (entry, text).#.link..-- hyperlinks within text.#.crosshair.-- graphic selection, fine control.#.busy..-- operation in progress.#.forbidden.-- action not allowed.#.#.hresize..-- horizontal resizing.#.vresize..-- vertical resizing.#.# Also resize cursors for each of the compass points,.# {nw,n,ne,w,e,sw,s,se}resize..#.# Platform notes:.#.# Windows doesn't distinguish resizing at the 8 compass points,.# only horizontal, vertical, and the two diagonals..#.# OSX doesn't have resize cursors for nw, ne, sw, or se corners..# We use the Tk-defined X11 fallbacks for these..#.# X11 doesn't have a "forbidden" cursor (usually a slashed circle);.# "pirate" seems to be the conventional cursor for this purpose..#.# Windows has an IDC_HELP cursor, but it's not
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4490
              Entropy (8bit):4.888203318286333
              Encrypted:false
              SSDEEP:96:AMUoi/higxS4JAigxS4J/1+tDtj/9uTaf30QOdt:AMUoQhigQ42igQ4kFMY3n0t
              MD5:0E03292F7678540CB4F3440859863B0C
              SHA1:909849894B02F2C213BDE0FBCED8C1378EB9B81E
              SHA-256:304FF31FC82F6086C93AAA594D83D8DA25866CE1C2AF1208F9E7585D74CA9A51
              SHA-512:87E5D2484E5E7E3C00B319219028B012576B7D73B84A9A13ED15551C9431BF216C0B96376AE5A7070B5A391D9887E55ABF9FA4AFEE971177408B7969363D9302
              Malicious:false
              Preview:#.# Settings for default theme..#..namespace eval ttk::theme::default {. variable colors. array set colors {..-frame..."#d9d9d9"..-foreground.."#000000"..-window..."#ffffff"..-text .."#000000"..-activebg.."#ececec"..-selectbg.."#4a6984"..-selectfg.."#ffffff"..-darker .."#c3c3c3"..-disabledfg.."#a3a3a3"..-indicator.."#4a6984"..-disabledindicator."#a3a3a3"..-altindicator.."#9fbdd8"..-disabledaltindicator."#c0c0c0". }.. ttk::style theme settings default {...ttk::style configure "." \.. -borderwidth .1 \.. -background .$colors(-frame) \.. -foreground .$colors(-foreground) \.. -troughcolor .$colors(-darker) \.. -font ..TkDefaultFont \.. -selectborderwidth.1 \.. -selectbackground.$colors(-selectbg) \.. -selectforeground.$colors(-selectfg) \.. -insertwidth .1 \.. -indicatordiameter.10 \.. ;...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activebg)]..ttk::style map "." -foreground \.. [list disabled $colo
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):16408
              Entropy (8bit):4.974125903666712
              Encrypted:false
              SSDEEP:192:hRy3ALQksU0oayTUXIQzNiQ2iEL8QmOhQVqknFoTOXyJtcC1JMuZm4FZxO252ExD:GoUXmiEyOFWiTOEtcC1q252Ezp
              MD5:F9B29AB14304F18E32821A29233BE816
              SHA1:6D0253274D777E081FA36CC38E51C2ABB9259D0E
              SHA-256:62D1DF52C510A83103BADAB4F3A77ABB1AA3A0E1E21F68ECE0CECCA2CA2F1341
              SHA-512:698DB665E29B29864F9FE65934CCA83A5092D81D5130FFD1EAC68C51327AE9EBC007A60A60E1AF37063017E448CE84A4024D4A412990A1078287B605DF344C70
              Malicious:false
              Preview:#.# DERIVED FROM: tk/library/entry.tcl r1.22.#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 2004, Joe English.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval ttk {. namespace eval entry {..variable State...set State(x) 0..set State(selectMode) none..set State(anchor) 0..set State(scanX) 0..set State(scanIndex) 0..set State(scanMoved) 0...# Button-2 scan speed is (scanNum/scanDen) characters..# per pixel of mouse movement...# The standard Tk entry widget uses the equivalent of..# scanNum = 10, scanDen = average character width...# I don't know why that was chosen...#..set State(scanNum) 1..set State(scanDen) 1..set State(deadband) 3.;# #pixels for mouse-moved deadband.. }.}..### Option database settings..#.option add *TEntry.cursor [ttk::cursor text] widgetDefault..### Bindings..#.# Removed
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5576
              Entropy (8bit):4.956417003071239
              Encrypted:false
              SSDEEP:96:Nduphbitcq1Zs/ZrBiZy227IhLkdhetOstWGbRafkeHH+4:3CheHvsbiZyDmJbRa3+4
              MD5:7017B5C1D53F341F703322A40C76C925
              SHA1:57540C56C92CC86F94B47830A00C29F826DEF28E
              SHA-256:0EB518251FBE9CF0C9451CC1FEF6BB6AEE16D62DA00B0050C83566DA053F68D0
              SHA-512:FD18976A8FBB7E59B12944C2628DBD66D463B2F7342661C8F67160DF37A393FA3C0CE7FDDA31073674B7A46E0A0A7D0A7B29EBE0D9488AFD9EF8B3A39410B5A8
              Malicious:false
              Preview:#.# Font specifications..#.# This file, [source]d at initialization time, sets up the following.# symbolic fonts based on the current platform:.#.# TkDefaultFont.-- default for GUI items not otherwise specified.# TkTextFont.-- font for user text (entry, listbox, others).# TkFixedFont.-- standard fixed width font.# TkHeadingFont.-- headings (column headings, etc).# TkCaptionFont -- dialog captions (primary text in alert dialogs, etc.).# TkTooltipFont.-- font to use for tooltip windows.# TkIconFont.-- font to use for icon captions.# TkMenuFont.-- used to use for menu items.#.# In Tk 8.5, some of these fonts may be provided by the TIP#145 implementation.# (On Windows and Mac OS X as of Oct 2007)..#.# +++ Platform notes:.#.# Windows:.#.The default system font changed from "MS Sans Serif" to "Tahoma".# .in Windows XP/Windows 2000..#.#.MS documentation says to use "Tahoma 8" in Windows 2000/XP,.#.although many MS programs still use "MS Sans Serif 8".#.#.Should use SystemParametersInfo() inst
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4913
              Entropy (8bit):4.841521491900473
              Encrypted:false
              SSDEEP:96:1reigApQy38gaQJy+3nN+PN8JdNhtOPqoK4J+wQCV7EkGxIaqc9ld9qtlWnITOZI:hfbJvnN+PN8JdNHs64J+wQCPGxtqWrqf
              MD5:DB24841643CEBD38D5FFD1D42B42E7F4
              SHA1:E394AF7FAF83FAD863C7B13D855FCF3705C4F1C7
              SHA-256:81B0B7818843E293C55FF541BD95168DB51FE760941D32C7CDE9A521BB42E956
              SHA-512:380272D003D5F90C13571952D0C73F5FCE2A22330F98F29707F3D5BFC29C99D9BF11A947CF2CA64CF7B8DF5E4AFE56FFA00F9455BB30D15611FC5C86130346BE
              Malicious:false
              Preview:#.# Bindings for Menubuttons..#.# Menubuttons have three interaction modes:.#.# Pulldown: Press menubutton, drag over menu, release to activate menu entry.# Popdown: Click menubutton to post menu.# Keyboard: <Key-space> or accelerator key to post menu.#.# (In addition, when menu system is active, "dropdown" -- menu posts.# on mouse-over. Ttk menubuttons don't implement this)..#.# For keyboard and popdown mode, we hand off to tk_popup and let .# the built-in Tk bindings handle the rest of the interaction..#.# ON X11:.#.# Standard Tk menubuttons use a global grab on the menubutton..# This won't work for Ttk menubuttons in pulldown mode,.# since we need to process the final <ButtonRelease> event,.# and this might be delivered to the menu. So instead we.# rely on the passive grab that occurs on <ButtonPress> events,.# and transition to popdown mode when the mouse is released.# or dragged outside the menubutton..# .# ON WINDOWS:.#.# I'm not sure what the hell is going on here. [$menu pos
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):5619
              Entropy (8bit):4.937953914483602
              Encrypted:false
              SSDEEP:96:d4tDJf49tzG809fhQAKWCgQOK/6PF+hEi8YYFSL+3FJVCj0QlK2kfJcQIni:d4tktzwfWngQOK/6PF+hDDYFNJVCj0Q2
              MD5:82C9DFC512E143DDA78F91436937D4DD
              SHA1:26ABC23C1E0C201A217E3CEA7A164171418973B0
              SHA-256:D1E5267CDE3D7BE408B4C94220F7E1833C9D452BB9BA3E194E12A5EB2F9ADB80
              SHA-512:A9D3C04AD67E0DC3F1C12F9E21EF28A61FA84DBF710313D4CA656BDF35DFBBFBA9C268C018004C1F5614DB3A1128025D795BC14B4FFFAA5603A5313199798D04
              Malicious:false
              Preview:#.# Bindings for TNotebook widget.#..namespace eval ttk::notebook {. variable TLNotebooks ;# See enableTraversal.}..bind TNotebook <ButtonPress-1>..{ ttk::notebook::Press %W %x %y }.bind TNotebook <Key-Right>..{ ttk::notebook::CycleTab %W 1; break }.bind TNotebook <Key-Left>..{ ttk::notebook::CycleTab %W -1; break }.bind TNotebook <Control-Key-Tab>.{ ttk::notebook::CycleTab %W 1; break }.bind TNotebook <Control-Shift-Key-Tab>.{ ttk::notebook::CycleTab %W -1; break }.catch {.bind TNotebook <Control-ISO_Left_Tab>.{ ttk::notebook::CycleTab %W -1; break }.}.bind TNotebook <Destroy>..{ ttk::notebook::Cleanup %W }..# ActivateTab $nb $tab --.#.Select the specified tab and set focus..#.# Desired behavior:.#.+ take focus when reselecting the currently-selected tab;.#.+ keep focus if the notebook already has it;.#.+ otherwise set focus to the first traversable widget.#. in the newly-selected tab;.#.+ do not leave the focus in a deselected tab..#.proc ttk::notebook::ActivateTab {w tab} {.
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1920
              Entropy (8bit):4.916119835701688
              Encrypted:false
              SSDEEP:24:kfkVpfktNZz51kfkB6fkO/cfkyk2fkI4fkI1fkxUufkYfkEtNMiyHvyPHfk9tNZ5:0ZPhMiyHvyPQZNtiisZvUriZPaa+fdl
              MD5:A12915FA5CAF93E23518E9011200F5A4
              SHA1:A61F665A408C10419FB81001578D99B43D048720
              SHA-256:CE0053D637B580170938CF552B29AE890559B98EB28038C2F0A23A265DDEB273
              SHA-512:669E1D66F1223CCA6CEB120914D5D876BD3CF401EE4A46F35825361076F19C7341695596A7DBB00D6CFF4624666FB4E7A2D8E7108C3C56A12BDA7B04E99E6F9A
              Malicious:false
              Preview:#.# Bindings for ttk::panedwindow widget..#..namespace eval ttk::panedwindow {. variable State. array set State {..pressed 0. .pressX.-..pressY.-..sash .-..sashPos -. }.}..## Bindings:.#.bind TPanedwindow <ButtonPress-1> .{ ttk::panedwindow::Press %W %x %y }.bind TPanedwindow <B1-Motion>..{ ttk::panedwindow::Drag %W %x %y }.bind TPanedwindow <ButtonRelease-1> .{ ttk::panedwindow::Release %W %x %y }..bind TPanedwindow <Motion> ..{ ttk::panedwindow::SetCursor %W %x %y }.bind TPanedwindow <Enter> ..{ ttk::panedwindow::SetCursor %W %x %y }.bind TPanedwindow <Leave> ..{ ttk::panedwindow::ResetCursor %W }.# See <<NOTE-PW-LEAVE-NOTIFYINFERIOR>>.bind TPanedwindow <<EnteredChild>>.{ ttk::panedwindow::ResetCursor %W }..## Sash movement:.#.proc ttk::panedwindow::Press {w x y} {. variable State.. set sash [$w identify $x $y]. if {$sash eq ""} {. .set State(pressed) 0..return. }. set State(pressed) .1. set State(pressX) .$x. set State(pressY) .$y. set State(sa
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1089
              Entropy (8bit):4.7101709883442755
              Encrypted:false
              SSDEEP:24:o83oOUyNSiBj0oNA7h5EwIa2s0ImxamrNlUImyJDirNPpwWgJ:oMtS6j0eyEw0s02mhlU4khPp4J
              MD5:B0074341A4BDA36BCDFF3EBCAE39EB73
              SHA1:D070A01CC5A787249BC6DAD184B249C4DD37396A
              SHA-256:A9C34F595E547CE94EE65E27C415195D2B210653A9FFCFB39559C5E0FA9C06F8
              SHA-512:AF23563602886A648A42B03CC5485D84FCC094AB90B08DF5261434631B6C31CE38D83A3A60CC7820890C797F6C778D5B5EFF47671CE3EE4710AB14C6110DCC35
              Malicious:false
              Preview:#.# Ttk widget set: progress bar utilities..#..namespace eval ttk::progressbar {. variable Timers.;# Map: widget name -> after ID.}..# Autoincrement --.#.Periodic callback procedure for autoincrement mode.#.proc ttk::progressbar::Autoincrement {pb steptime stepsize} {. variable Timers.. if {![winfo exists $pb]} {. .# widget has been destroyed -- cancel timer..unset -nocomplain Timers($pb)..return. }.. set Timers($pb) [after $steptime \. .[list ttk::progressbar::Autoincrement $pb $steptime $stepsize] ].. $pb step $stepsize.}..# ttk::progressbar::start --.#.Start autoincrement mode. Invoked by [$pb start] widget code..#.proc ttk::progressbar::start {pb {steptime 50} {stepsize 1}} {. variable Timers. if {![info exists Timers($pb)]} {..Autoincrement $pb $steptime $stepsize. }.}..# ttk::progressbar::stop --.#.Cancel autoincrement mode. Invoked by [$pb stop] widget code..#.proc ttk::progressbar::stop {pb} {. variable Timers. if {[info exists Timers($pb
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2698
              Entropy (8bit):4.7624002445430955
              Encrypted:false
              SSDEEP:48:6Zsdayx/HZtYRqucO6wEKyRtZt0TcKVqZ4TFZkPDMiNf:Wde/5tYRquMwEKyFt0TcKVG4TrkLMwf
              MD5:B41A9DF31924DEA36D69CB62891E8472
              SHA1:4C2877FBB210FDBBDE52EA8B5617F68AD2DF7B93
              SHA-256:25D0FE2B415292872EF7ACDB2DFA12D04C080B7F9B1C61F28C81AA2236180479
              SHA-512:A50DB6DA3D40D07610629DE45F06A438C6F2846324C3891C54C99074CFB7BEED329F27918C8A85BADB22C6B64740A2053B891F8E5D129D9B0A1FF103E7137D83
              Malicious:false
              Preview:# scale.tcl - Copyright (C) 2004 Pat Thoyts <patthoyts@users.sourceforge.net>.#.# Bindings for the TScale widget..namespace eval ttk::scale {. variable State. array set State {..dragging 0. }.}..bind TScale <ButtonPress-1> { ttk::scale::Press %W %x %y }.bind TScale <B1-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-1> { ttk::scale::Release %W %x %y }..bind TScale <ButtonPress-2> { ttk::scale::Jump %W %x %y }.bind TScale <B2-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-2> { ttk::scale::Release %W %x %y }..bind TScale <ButtonPress-3> { ttk::scale::Jump %W %x %y }.bind TScale <B3-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-3> { ttk::scale::Release %W %x %y }..## Keyboard navigation bindings:.#.bind TScale <<LineStart>> { %W set [%W cget -from] }.bind TScale <<LineEnd>> { %W set [%W cget -to] }..bind TScale <<PrevChar>> { ttk::scale::Increment %W -1 }.bind TScale <<PrevLine>> {
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):3097
              Entropy (8bit):4.913511104649656
              Encrypted:false
              SSDEEP:96:OsSofRsvfH3Noo2kvrjnWG3Lcyst0Rhrdy:plcHdoorDjWEFeuTy
              MD5:93181DBE76EF9C39849A09242D6DF8C0
              SHA1:DE3B47AFC3E5371BF1CD0541790A9B78A97570AB
              SHA-256:5932043286A30A3CFFB2B6CE68CCDB9172A718F32926E25D3A962AE63CAD515C
              SHA-512:5C85284E063A5DE17F6CE432B3EF899D046A78725BD1F930229576BED1116C03A3EE0611B988E9903F47DA8F694483E5A76464450C48EB14622F6784004B8F7E
              Malicious:false
              Preview:#.# Bindings for TScrollbar widget.#..# Still don't have a working ttk::scrollbar under OSX -.# Swap in a [tk::scrollbar] on that platform,.# unless user specifies -class or -style..#.if {[tk windowingsystem] eq "aqua"} {. rename ::ttk::scrollbar ::ttk::_scrollbar. proc ttk::scrollbar {w args} {..set constructor ::tk::scrollbar..foreach {option _} $args {.. if {$option eq "-class" || $option eq "-style"} {...set constructor ::ttk::_scrollbar...break.. }..}..return [$constructor $w {*}$args]. }.}..namespace eval ttk::scrollbar {. variable State. # State(xPress).--. # State(yPress).-- initial position of mouse at start of drag.. # State(first).-- value of -first at start of drag..}..bind TScrollbar <ButtonPress-1> .{ ttk::scrollbar::Press %W %x %y }.bind TScrollbar <B1-Motion>..{ ttk::scrollbar::Drag %W %x %y }.bind TScrollbar <ButtonRelease-1>.{ ttk::scrollbar::Release %W %x %y }..bind TScrollbar <ButtonPress-2> .{ ttk::scrollbar::Jump %W %x %y }.bind TScrollb
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2406
              Entropy (8bit):4.78080326075935
              Encrypted:false
              SSDEEP:48:KqL4LUBItZ3EZEhHR4vuRbMMie8GMW/H7vZZNQdqrYfy2nL+ZZvBb:KDYBIjHHRmiM1qvbnNQdqriyQIvB
              MD5:3C8916A58C6EE1D61836E500A54C9321
              SHA1:54F3F709698FAD020A048668749CB5A09EDE35AB
              SHA-256:717D2EDD71076EA059903C7144588F8BBD8B0AFE69A55CBF23953149D6694D33
              SHA-512:2B71569A5A96CAC1B708E894A2466B1054C3FAE5405E10799B182012141634BD2A7E9E9F516658E1A6D6E9E776E397608B581501A6CFE2EB4EC54459E9ECB267
              Malicious:false
              Preview:#.# Sizegrip widget bindings..#.# Dragging a sizegrip widget resizes the containing toplevel..#.# NOTE: the sizegrip widget must be in the lower right hand corner..#..switch -- [tk windowingsystem] {. x11 -. win32 {..option add *TSizegrip.cursor [ttk::cursor seresize] widgetDefault. }. aqua {. .# Aqua sizegrips use default Arrow cursor.. }.}..namespace eval ttk::sizegrip {. variable State. array set State {..pressed .0..pressX ..0..pressY ..0..width ..0..height ..0..widthInc.1..heightInc.1. resizeX 1. resizeY 1..toplevel .{}. }.}..bind TSizegrip <ButtonPress-1> ..{ ttk::sizegrip::Press.%W %X %Y }.bind TSizegrip <B1-Motion> ..{ ttk::sizegrip::Drag .%W %X %Y }.bind TSizegrip <ButtonRelease-1> .{ ttk::sizegrip::Release %W %X %Y }..proc ttk::sizegrip::Press {W X Y} {. variable State.. if {[$W instate disabled]} { return }.. set top [winfo toplevel $W].. # If the toplevel is not resizable then bail. foreach {State(resiz
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4255
              Entropy (8bit):4.9576194953603006
              Encrypted:false
              SSDEEP:96:17n+wMf6/ocy2nO6lz+Ni2QQ0Q3LqSFLfhrxJSS3hQb:ln+wMOxVlaNi2QQ0QbdFLfhrxJzhQb
              MD5:86BCA3AB915C2774425B70420E499140
              SHA1:FD4798D79EEBA9CFFABCB2548068591DB531A716
              SHA-256:51F8A6C772648541684B48622FFE41B77871A185A8ACD11E9DEC9EC41D65D9CD
              SHA-512:659FB7E1631ED898E3C11670A04B953EB05CECB42A3C5EFBDD1BD97A7F99061920FD5DB3915476F224BB2C72358623E1B474B0FC3FBB7FD3734487B87A388FD7
              Malicious:false
              Preview:#.# ttk::spinbox bindings.#..namespace eval ttk::spinbox { }..### Spinbox bindings..#.# Duplicate the Entry bindings, override if needed:.#..ttk::copyBindings TEntry TSpinbox..bind TSpinbox <Motion>...{ ttk::spinbox::Motion %W %x %y }.bind TSpinbox <ButtonPress-1> ..{ ttk::spinbox::Press %W %x %y }.bind TSpinbox <ButtonRelease-1> .{ ttk::spinbox::Release %W }.bind TSpinbox <Double-Button-1> .{ ttk::spinbox::DoubleClick %W %x %y }.bind TSpinbox <Triple-Button-1> .{} ;# disable TEntry triple-click..bind TSpinbox <KeyPress-Up>..{ event generate %W <<Increment>> }.bind TSpinbox <KeyPress-Down> ..{ event generate %W <<Decrement>> }..bind TSpinbox <<Increment>>..{ ttk::spinbox::Spin %W +1 }.bind TSpinbox <<Decrement>> ..{ ttk::spinbox::Spin %W -1 }..ttk::bindMouseWheel TSpinbox ..[list ttk::spinbox::MouseWheel %W]..## Motion --.#.Sets cursor..#.proc ttk::spinbox::Motion {w x y} {. if { [$w identify $x $y] eq "textarea". && [$w instate {!readonly !disabled}]. } {..ttk::setCurso
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8898
              Entropy (8bit):4.860766938410698
              Encrypted:false
              SSDEEP:96:2Ou002WQZ4sNNxjKomA3xj9L/37NbbF3r3G4eeMxCSbk3TPMrngEibSB1GjwPBKf:ZWeZ5BDFK+DsXibSQUMHLCGLdE2bZ
              MD5:46B1D0EADBCF11AC51DD14B1A215AE04
              SHA1:339026AE9533F4C331ADF8C71799B222DDD89D4F
              SHA-256:DB6FAA8540C322F3E314968256D8AFFF39A1E4700EC17C7EFE364241F355D80F
              SHA-512:0FC81426857949D5AC9FE7FF3C85A1270BD35BF6E6EAF3FE7AE0DE22A0C0E5CD96D6C9471216DC1DA673FAD949CA96A3751C3D3222474D2206AA9D8A455BA12E
              Malicious:false
              Preview:#.# ttk::treeview widget bindings and utilities..#..namespace eval ttk::treeview {. variable State.. # Enter/Leave/Motion. #. set State(activeWidget) .{}. set State(activeHeading) .{}.. # Press/drag/release:. #. set State(pressMode) .none. set State(pressX)..0.. # For pressMode == "resize". set State(resizeColumn).#0.. # For pressmode == "heading". set State(heading) .{}.}..### Widget bindings..#..bind Treeview.<Motion> ..{ ttk::treeview::Motion %W %x %y }.bind Treeview.<B1-Leave>..{ #nothing }.bind Treeview.<Leave>...{ ttk::treeview::ActivateHeading {} {}}.bind Treeview.<ButtonPress-1> .{ ttk::treeview::Press %W %x %y }.bind Treeview.<Double-ButtonPress-1> .{ ttk::treeview::DoubleClick %W %x %y }.bind Treeview.<ButtonRelease-1> .{ ttk::treeview::Release %W %x %y }.bind Treeview.<B1-Motion> ..{ ttk::treeview::Drag %W %x %y }.bind Treeview .<KeyPress-Up> .{ ttk::treeview::Keynav %W up }.bind Treeview .<KeyPress-Down> .{ ttk::treeview::Keynav %
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):4546
              Entropy (8bit):4.888987944406022
              Encrypted:false
              SSDEEP:96:53a25129CKELfMonw+PzpaVnNqovaq2126262R2D2q2k2j+/2FhbtpGt0vcWOQRg:53j5MoKE7JEnN7CTMDDA6Tlj+uFhbttK
              MD5:E38B399865C45E49419C01FF2ADDCE75
              SHA1:F8A79CBC97A32622922D4A3A5694BCCB3F19DECB
              SHA-256:61BAA0268770F127394A006340D99CE831A1C7AD773181C0C13122F7D2C5B7F6
              SHA-512:285F520B648F5EC70DD79190C3B456F4D6DA2053210985F9E2C84139D8D51908296E4962B336894EE30536F09FAE84B912BC2ABF44A7011620F66CC5D9F71A8C
              Malicious:false
              Preview:#.# Ttk widget set initialization script..#..### Source library scripts..#..namespace eval ::ttk {. variable library. if {![info exists library]} {..set library [file dirname [info script]]. }.}..source [file join $::ttk::library fonts.tcl].source [file join $::ttk::library cursors.tcl].source [file join $::ttk::library utils.tcl]..## ttk::deprecated $old $new --.#.Define $old command as a deprecated alias for $new command.#.$old and $new must be fully namespace-qualified..#.proc ttk::deprecated {old new} {. interp alias {} $old {} ttk::do'deprecate $old $new.}.## do'deprecate --.#.Implementation procedure for deprecated commands --.#.issue a warning (once), then re-alias old to new..#.proc ttk::do'deprecate {old new args} {. deprecated'warning $old $new. interp alias {} $old {} $new. uplevel 1 [linsert $args 0 $new].}..## deprecated'warning --.#.Gripe about use of deprecated commands..#.proc ttk::deprecated'warning {old new} {. puts stderr "$old deprecated -- u
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):8562
              Entropy (8bit):4.958950985117383
              Encrypted:false
              SSDEEP:192:MpEpXI4jqmW/y3gp9F+QE9PBRc+vWHJOfqW8j3ki3LDRdielRu+MXw+:6yXuwg1oPnc+epOEj31/s/5
              MD5:65193FE52D77B8726B75FBF909EE860A
              SHA1:991DEDD4666462DD9776FDF6C21F24D6CF794C85
              SHA-256:C7CC9A15CFA999CF3763772729CC59F629E7E060AF67B7D783C50530B9B756E1
              SHA-512:E43989F5F368D2E19C9A3521FB82C6C1DD9EEB91DF936A980FFC7674C8B236CB84E113908B8C9899B85430E8FC30315BDEC891071822D701C91C5978096341B7
              Malicious:false
              Preview:#.# Utilities for widget implementations..#..### Focus management..#.# See also: #1516479.#..## ttk::takefocus --.#.This is the default value of the "-takefocus" option.#.for ttk::* widgets that participate in keyboard navigation..#.# NOTES:.#.tk::FocusOK (called by tk_focusNext) tests [winfo viewable].#.if -takefocus is 1, empty, or missing; but not if it's a.#.script prefix, so we have to check that here as well..#.#.proc ttk::takefocus {w} {. expr {[$w instate !disabled] && [winfo viewable $w]}.}..## ttk::GuessTakeFocus --.#.This routine is called as a fallback for widgets.#.with a missing or empty -takefocus option..#.#.It implements the same heuristics as tk::FocusOK..#.proc ttk::GuessTakeFocus {w} {. # Don't traverse to widgets with '-state disabled':. #. if {![catch {$w cget -state} state] && $state eq "disabled"} {..return 0. }.. # Allow traversal to widgets with explicit key or focus bindings:. #. if {[regexp {Key|Focus} [concat [bind $w] [bind [winfo c
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):9670
              Entropy (8bit):4.6132627565634055
              Encrypted:false
              SSDEEP:192:kSsdZ6XzgE2kiSCyNPNVVSCIA5l/r5l/rW+i/CE38S7r/2JeJnpna+yfdyMq53Id:QZ6XzD2kFVeArPKJ3z7cQ0383cdd
              MD5:ED071B9CEA98B7594A7E74593211BD38
              SHA1:90998A1A51BCBAA3B4D72B08F5CBF19E330148D2
              SHA-256:98180630FC1E8D7D7C1B20A5FF3352C8BD8CF259DD4EB3B829B8BD4CB8AE76A4
              SHA-512:60C1EA45481AF5CFA3C5E579514DD3F4AC6C8D168553F374D0A3B3E1342E76CB71FA825C306233E185BED057E2B99877BAF9A5E88EBD48CF6DE171A8E7F6A230
              Malicious:false
              Preview:#.# Settings for Microsoft Windows Vista and Server 2008.#..# The Vista theme can only be defined on Windows Vista and above. The theme.# is created in C due to the need to assign a theme-enabled function for .# detecting when themeing is disabled. On systems that cannot support the.# Vista theme, there will be no such theme created and we must not.# evaluate this script...if {"vista" ni [ttk::style theme names]} {. return.}..namespace eval ttk::theme::vista {.. ttk::style theme settings vista {.. .ttk::style configure . \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -insertcolor SystemWindowText \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -foreground [list disabled SystemGrayText] \.. ;...ttk::style configure TButton -anchor center -padding {1 1} -width -11..ttk::style configure TRadiobutton -padding 2..ttk::style configure TCheckbutton -pa
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2867
              Entropy (8bit):4.876730704118724
              Encrypted:false
              SSDEEP:48:679ahSh6FPGh0Ds0IXF6yjAfSAfqFRaBgLtei42kt+5Ql/n+iOaVhttZLgtKZLtO:6UJM0uTk5tm4RX0
              MD5:0AE8205DFBA3C9B8EEAD01AC11C965D6
              SHA1:61E8D2E909CF46886F6EA8571D4234DD336FEFB3
              SHA-256:93E4011CAA9F01802D6DD5E02C3104E619084799E949974DFEE5E0C94D1E3952
              SHA-512:E4448B922CA0FB425F879988537B9DB8F8C8A5A773805607574499506FDD9DEEB9CD41660E497002F78727AFBE3BEC17D9674E99CEF4A9D66FFD9C4536AFE153
              Malicious:false
              Preview:#.# Settings for 'winnative' theme..#..namespace eval ttk::theme::winnative {. ttk::style theme settings winnative {...ttk::style configure "." \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -fieldbackground SystemWindow \.. -insertcolor SystemWindowText \.. -troughcolor SystemScrollbar \.. -font TkDefaultFont \.. ;...ttk::style map "." -foreground [list disabled SystemGrayText] ;. ttk::style map "." -embossed [list disabled 1] ;...ttk::style configure TButton \.. -anchor center -width -11 -relief raised -shiftrelief 1..ttk::style configure TCheckbutton -padding "2 4"..ttk::style configure TRadiobutton -padding "2 4"..ttk::style configure TMenubutton \.. -padding "8 4" -arrowsize 3 -relief raised...ttk::style map TButton -relief {{!disabled pressed} sunken}...ttk::style configure TEntry \.. -padding 2 -selectborderwidth 0 -insertwidth 1..t
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):2375
              Entropy (8bit):4.931678702435916
              Encrypted:false
              SSDEEP:48:NaxYun9ahShCd/T5QNt+7aVzEmAf8Afb9AfMMB+iOaVhttZLgtKZLti:k41eTXM
              MD5:BD892A940333C1B804DF5C4594B0A5E6
              SHA1:4E187F09F45898749CFE7860EDEF0D5EB83D764E
              SHA-256:196C6FEF40FB6296D7762F30058AA73273083906F72F490E69FC77F1D5589B88
              SHA-512:8273A8F789D695601A7BC74DFA2A6BD7FE280EC528869F502A578E90B6DD1613C4BCC5B6CD0D93A5CA0E6538BE740CD370F634DA84064213E1F50B919EBF35B8
              Malicious:false
              Preview:#.# Settings for 'xpnative' theme.#..namespace eval ttk::theme::xpnative {.. ttk::style theme settings xpnative {...ttk::style configure . \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -insertcolor SystemWindowText \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -foreground [list disabled SystemGrayText] \.. ;...ttk::style configure TButton -anchor center -padding {1 1} -width -11..ttk::style configure TRadiobutton -padding 2..ttk::style configure TCheckbutton -padding 2..ttk::style configure TMenubutton -padding {8 4}...ttk::style configure TNotebook -tabmargins {2 2 2 0}..ttk::style map TNotebook.Tab \.. -expand [list selected {2 2 2 2}]...# Treeview:..ttk::style configure Heading -font TkHeadingFont..ttk::style configure Treeview -background SystemWindow..ttk::style map Treeview \.. -background [list selected SystemHighlight] \.. -fore
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):10252
              Entropy (8bit):5.02143730499245
              Encrypted:false
              SSDEEP:192:1kMv11IDCB7PFPHGosvS6UMn8O9MGM/OTMjcrrwrt:xuMYMj+sZ
              MD5:C832FDF24CA1F5C5E9B33FA5ECD11CAC
              SHA1:8082FDE50C428D2511B05F529FCCF02651D5AC93
              SHA-256:E34D828E740F151B96022934AAEC7BB8343E23D040FB54C04641888F51767EB8
              SHA-512:58BEB05778271D4C91527B1CB23491962789D95ACCBC6C28E25D05BD3D6172AAC9A90E7741CD606C69FB8CECC29EE515DA7C7D4E6098BF67F08F18DFB7983323
              Malicious:false
              Preview:# unsupported.tcl --.#.# Commands provided by Tk without official support. Use them at your.# own risk. They may change or go away without notice..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# ----------------------------------------------------------------------.# Unsupported compatibility interface for folks accessing Tk's private.# commands and variable against recommended usage..# ----------------------------------------------------------------------..namespace eval ::tk::unsupported {.. # Map from the old global names of Tk private commands to their. # new namespace-encapsulated names... variable PrivateCommands. array set PrivateCommands {..tkButtonAutoInvoke..::tk::ButtonAutoInvoke..tkButtonDown...::tk::ButtonDown..tkButtonEnter...::tk::ButtonEnter..tkButtonInvoke...::tk::ButtonInvoke..tkButtonLeave...::tk::ButtonLeave..tkButtonUp...::tk::ButtonUp..tkCancelRepeat...::tk::Cance
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):26075
              Entropy (8bit):4.9212533677507535
              Encrypted:false
              SSDEEP:384:obPA7Xi6V2+Bec3ipnFH6HZ1KDZvRcbQ3sd1GkjDo413lK/RIV5MXrSomsjiETwM:orA3TVJc3sd1GkF3cIVf591w
              MD5:F863B7C5680017EE9F744900CC6C3834
              SHA1:155E6E8752F6D48EF8D32CE2228E17EE58C2768E
              SHA-256:9C78A976BBC933863FB0E4C23EE62B26F8EB3D7F101D7D32E6768579499E43B1
              SHA-512:34F5B51EA1A2EFCD53B51A74E7E9B69FB154E017527BBD1CB3961F1619E74BE9D49D0583D193DBA7E8A3904F6C7446F278BC7977011DCCDAEBBE42D71FA5630C
              Malicious:false
              Preview:# xmfbox.tcl --.#.#.Implements the "Motif" style file selection dialog for the.#.Unix platform. This implementation is used only if the.#."::tk_strictMotif" flag is set..#.# Copyright (c) 1996 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Scriptics Corporation.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {}...# ::tk::MotifFDialog --.#.#.Implements a file dialog similar to the standard Motif file.#.selection box..#.# Arguments:.#.type.."open" or "save".#.args..Options parsed by the procedure..#.# Results:.#.When -multiple is set to 0, this returns the absolute pathname.#.of the selected file. (NOTE: This is not the same as a single.#.element list.).#.#.When -multiple is set to > 0, this returns a Tcl list of absolute.# pathnames. The argument for -multiple is ignored, but for consistency.# with Windows it defines the max
              Process:C:\Users\user\Desktop\SecurityUpdate.exe
              File Type:Unknown
              Category:dropped
              Size (bytes):1120944
              Entropy (8bit):5.374356784466345
              Encrypted:false
              SSDEEP:12288:lezMmuZ63NNQCb5Pfhnzr0ql8L8kkM7IRG5eeme6VZyrIBHdQLhfFE+uB/v:lezumZV0m88MMREtV6Vo4uYB/v
              MD5:7AF51031368619638CCA688A7275DB14
              SHA1:64E2CC5AC5AFE8A65AF690047DC03858157E964C
              SHA-256:7F02A99A23CC3FF63ECB10BA6006E2DA7BF685530BAD43882EBF90D042B9EEB6
              SHA-512:FBDE24501288FF9B06FC96FAFF5E7A1849765DF239E816774C04A4A6EF54A0C641ADF4325BFB116952082D3234BAEF12288174AD8C18B62407109F29AA5AB326
              Malicious:false
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.T~~.:-~.:-~.:-w..-x.:-..;,|.:-..?,r.:-..>,v.:-..9,}.:-..;,}.:-%.;,|.:-~.;-4.:-..7,..:-..:,..:-...-..:-..8,..:-Rich~.:-........................PE..d...-3.`.........." .....J..........X).......................................@............`.............................................X............ .......................0......`L..T............................L..8............`...............................text....I.......J.................. ..`.rdata......`.......N..............@..@.data...............................@....pdata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
              File type:PE32+ executable (GUI) x86-64, for MS Windows
              Entropy (8bit):7.995129373544923
              TrID:
              • Win64 Executable GUI (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecurityUpdate.exe
              File size:13265674
              MD5:a9c54f10533b8aa29389220dd3c73103
              SHA1:4c08870c93f41468b5b0cd73193a396ccea984e0
              SHA256:7a1a70bab33d6ee8bae6de2160ae3084c50243f659a2b5fb4c7b966b664c1447
              SHA512:c79ba72b5bad0dab31b783bf9c441fd1790b99f8d51d0dab675c9d07b400970be0fe40c73c73f6bc6d69e534baabe71ab741a2e76067a164f44280073ac7ab2a
              SSDEEP:393216:ZNSajhQ5ZxlHOFyCED9Zk6tN3ZWOT7iiVcc6:XSaj0BzCED9Zk6tN3Vi3c
              TLSH:E4D6338DF2940C6CF993033BB895956EC9B574AE0BE8661F0E1E30505AEF2A53E74F50
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................Z...}c(.....].......].......].......................{.......{.......{.......Rich...........
              Icon Hash:c6c2ccd6f2e0e0f8
              Entrypoint:0x1400088fc
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x6077CF55 [Thu Apr 15 05:29:57 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:2
              File Version Major:5
              File Version Minor:2
              Subsystem Version Major:5
              Subsystem Version Minor:2
              Import Hash:d74d76c7011bfcc0cc1ebcb319809a31
              Instruction
              dec eax
              sub esp, 28h
              call 00007F944D117C2Ch
              dec eax
              add esp, 28h
              jmp 00007F944D1175AFh
              int3
              int3
              inc eax
              push ebx
              dec eax
              sub esp, 20h
              dec eax
              mov ebx, ecx
              xor ecx, ecx
              call dword ptr [000197FFh]
              dec eax
              mov ecx, ebx
              call dword ptr [000197EEh]
              call dword ptr [00019770h]
              dec eax
              mov ecx, eax
              mov edx, C0000409h
              dec eax
              add esp, 20h
              pop ebx
              dec eax
              jmp dword ptr [000197E4h]
              dec eax
              mov dword ptr [esp+08h], ecx
              dec eax
              sub esp, 38h
              mov ecx, 00000017h
              call 00007F944D130473h
              test eax, eax
              je 00007F944D117739h
              mov ecx, 00000002h
              int 29h
              dec eax
              lea ecx, dword ptr [00038467h]
              call 00007F944D1178FFh
              dec eax
              mov eax, dword ptr [esp+38h]
              dec eax
              mov dword ptr [0003854Eh], eax
              dec eax
              lea eax, dword ptr [esp+38h]
              dec eax
              add eax, 08h
              dec eax
              mov dword ptr [000384DEh], eax
              dec eax
              mov eax, dword ptr [00038537h]
              dec eax
              mov dword ptr [000383A8h], eax
              dec eax
              mov eax, dword ptr [esp+40h]
              dec eax
              mov dword ptr [000384ACh], eax
              mov dword ptr [00038382h], C0000409h
              mov dword ptr [0003837Ch], 00000001h
              mov dword ptr [00038386h], 00000001h
              mov eax, 00000008h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x314000x50.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000xf4ec.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x430000x1bd8.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000x6e8.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x2f3d00x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f3f00x138.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x220000x340.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x20d200x20e00False0.5723918726235742data6.466406656847962IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x220000xff660x10000False0.515899658203125data5.786075016484717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x320000x101480xc00False0.13346354166666666data1.8390576220561017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x430000x1bd80x1c00False0.48953683035714285data5.3353008560288515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              _RDATA0x450000x940x200False0.19921875data1.0727615623502313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x460000xf4ec0xf600False0.8037506351626016data7.555760674057198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x560000x6e80x800False0.529296875data5.0840093282182846IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x462080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
              RT_ICON0x470b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
              RT_ICON0x479580x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
              RT_ICON0x47ec00x952cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
              RT_ICON0x513ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0
              RT_ICON0x539940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
              RT_ICON0x54a3c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0
              RT_GROUP_ICON0x54ea40x68data
              RT_MANIFEST0x54f0c0x5deXML 1.0 document, ASCII text, with CRLF line terminators
              DLLImport
              USER32.dllMessageBoxW, MessageBoxA
              KERNEL32.dllGetModuleFileNameW, GetProcAddress, GetCommandLineW, GetEnvironmentVariableW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, SetDllDirectoryW, CreateProcessW, GetStartupInfoW, LoadLibraryExW, CloseHandle, GetCurrentProcess, LoadLibraryA, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, HeapReAlloc, GetLastError, WriteConsoleW, SetEndOfFile, GetExitCodeProcess, FreeLibrary, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, RaiseException, GetCommandLineA, ReadFile, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindClose, FindFirstFileExW, FindNextFileW, SetStdHandle, SetConsoleCtrlHandler, DeleteFileW, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapAlloc, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleCP, GetFileSizeEx, CompareStringW, LCMapStringW, GetCurrentDirectoryW, FlushFileBuffers, GetFileAttributesExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, GetProcessHeap, GetTimeZoneInformation, HeapSize
              ADVAPI32.dllConvertSidToStringSidW, GetTokenInformation, OpenProcessToken, ConvertStringSecurityDescriptorToSecurityDescriptorW
              Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

              Click to jump to process

              Click to jump to process

              Click to jump to process

              Target ID:1
              Start time:18:33:18
              Start date:19/02/2023
              Path:C:\Users\user\Desktop\SecurityUpdate.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecurityUpdate.exe
              Imagebase:0x13f050000
              File size:13265674 bytes
              MD5 hash:A9C54F10533B8AA29389220DD3C73103
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Target ID:2
              Start time:18:33:58
              Start date:19/02/2023
              Path:C:\Users\user\Desktop\SecurityUpdate.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecurityUpdate.exe
              Imagebase:0x13f050000
              File size:13265674 bytes
              MD5 hash:A9C54F10533B8AA29389220DD3C73103
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Reset < >

                Execution Graph

                Execution Coverage:14.9%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:14.7%
                Total number of Nodes:2000
                Total number of Limit Nodes:70
                execution_graph 15992 13f071bed 15995 13f05b59c LeaveCriticalSection 15992->15995 16019 13f0562f8 16020 13f0562fd 16019->16020 16026 13f05645c 16020->16026 16028 13f055fb4 16020->16028 16029 13f057ac0 16020->16029 16022 13f057380 14 API calls 16025 13f0561e3 16022->16025 16023 13f057ac0 12 API calls 16024 13f056755 16023->16024 16027 13f057ac0 12 API calls 16024->16027 16024->16028 16026->16023 16026->16028 16027->16028 16028->16022 16028->16025 16036 13f057b20 16029->16036 16030 13f058a18 8 API calls 16031 13f058070 16030->16031 16032 13f057bef 16033 13f058680 _wfindfirst32i64 8 API calls 16032->16033 16034 13f057dc8 16033->16034 16034->16026 16035 13f05802c 16035->16030 16036->16032 16036->16035 15804 13f05fdfc 15805 13f05fe63 15804->15805 15806 13f05fe2a 15804->15806 15805->15806 15807 13f05fe68 FindFirstFileExW 15805->15807 15808 13f05deb4 _get_daylight 13 API calls 15806->15808 15809 13f05fed1 15807->15809 15810 13f05fe8a GetLastError 15807->15810 15811 13f05fe2f 15808->15811 15864 13f06006c 15809->15864 15814 13f05fea4 15810->15814 15818 13f05fe95 15810->15818 15812 13f063618 _invalid_parameter_noinfo 30 API calls 15811->15812 15815 13f05fe3a 15812->15815 15819 13f05deb4 _get_daylight 13 API calls 15814->15819 15824 13f058680 _wfindfirst32i64 8 API calls 15815->15824 15817 13f05fec1 15820 13f05deb4 _get_daylight 13 API calls 15817->15820 15818->15817 15822 13f05feb1 15818->15822 15823 13f05fe9f 15818->15823 15819->15815 15820->15815 15821 13f06006c _wfindfirst32i64 10 API calls 15825 13f05fef7 15821->15825 15826 13f05deb4 _get_daylight 13 API calls 15822->15826 15823->15814 15823->15817 15827 13f05fe4e 15824->15827 15828 13f06006c _wfindfirst32i64 10 API calls 15825->15828 15826->15815 15829 13f05ff05 15828->15829 15830 13f068bf8 _wfindfirst32i64 30 API calls 15829->15830 15831 13f05ff23 15830->15831 15831->15815 15832 13f05ff2f 15831->15832 15833 13f063638 _wfindfirst32i64 17 API calls 15832->15833 15834 13f05ff43 15833->15834 15835 13f05ff6d 15834->15835 15838 13f05ffac FindNextFileW 15834->15838 15836 13f05deb4 _get_daylight 13 API calls 15835->15836 15837 13f05ff72 15836->15837 15839 13f063618 _invalid_parameter_noinfo 30 API calls 15837->15839 15840 13f05fffc 15838->15840 15841 13f05ffbb GetLastError 15838->15841 15842 13f05ff7d 15839->15842 15843 13f06006c _wfindfirst32i64 10 API calls 15840->15843 15844 13f05ffc6 15841->15844 15845 13f05ffd5 15841->15845 15849 13f058680 _wfindfirst32i64 8 API calls 15842->15849 15847 13f060014 15843->15847 15848 13f05ffef 15844->15848 15852 13f05ffe2 15844->15852 15853 13f05ffd0 15844->15853 15846 13f05deb4 _get_daylight 13 API calls 15845->15846 15846->15842 15851 13f06006c _wfindfirst32i64 10 API calls 15847->15851 15850 13f05deb4 _get_daylight 13 API calls 15848->15850 15855 13f05ff90 15849->15855 15850->15842 15856 13f060022 15851->15856 15854 13f05deb4 _get_daylight 13 API calls 15852->15854 15853->15845 15853->15848 15854->15842 15857 13f06006c _wfindfirst32i64 10 API calls 15856->15857 15858 13f060030 15857->15858 15859 13f068bf8 _wfindfirst32i64 30 API calls 15858->15859 15860 13f06004e 15859->15860 15860->15842 15861 13f060056 15860->15861 15862 13f063638 _wfindfirst32i64 17 API calls 15861->15862 15863 13f06006a 15862->15863 15865 13f060084 15864->15865 15866 13f06008a FileTimeToSystemTime 15864->15866 15865->15866 15868 13f0600af 15865->15868 15867 13f060099 SystemTimeToTzSpecificLocalTime 15866->15867 15866->15868 15867->15868 15869 13f058680 _wfindfirst32i64 8 API calls 15868->15869 15870 13f05fee9 15869->15870 15870->15821 16047 13f056cfc 16048 13f0561e3 16047->16048 16049 13f05615f 16047->16049 16049->16048 16050 13f057380 14 API calls 16049->16050 16050->16048 13356 13f058788 13381 13f058be8 13356->13381 13359 13f0588d4 13458 13f058f14 IsProcessorFeaturePresent 13359->13458 13360 13f0587a4 __scrt_acquire_startup_lock 13362 13f0588de 13360->13362 13364 13f0587c2 13360->13364 13363 13f058f14 __scrt_fastfail 7 API calls 13362->13363 13368 13f0588e9 13363->13368 13372 13f058804 __scrt_release_startup_lock 13364->13372 13389 13f061e14 13364->13389 13367 13f0587e7 13370 13f05886d 13398 13f059060 13370->13398 13372->13370 13447 13f0620f4 13372->13447 13373 13f058872 13401 13f051000 13373->13401 13378 13f058895 13378->13368 13454 13f058d7c 13378->13454 13465 13f0591dc 13381->13465 13384 13f058c17 13467 13f0627b8 13384->13467 13385 13f05879c 13385->13359 13385->13360 13390 13f061e27 13389->13390 13391 13f0587e3 13390->13391 13801 13f0586a4 13390->13801 13818 13f05b400 13390->13818 13391->13367 13394 13f061db0 13391->13394 13395 13f061de5 13394->13395 13396 13f061dff 13394->13396 13395->13396 13896 13f05876c 13395->13896 13396->13372 13905 13f0597d0 13398->13905 13402 13f05100b 13401->13402 13907 13f055180 13402->13907 13404 13f05101d 13918 13f05e914 13404->13918 13410 13f058680 _wfindfirst32i64 8 API calls 13411 13f052ad2 13410->13411 13452 13f0590a4 GetModuleHandleW 13411->13452 13412 13f052a30 13446 13f052abd 13412->13446 13943 13f054490 13412->13943 13414 13f052a70 13958 13f054af0 13414->13958 13419 13f052ae5 13427 13f052b07 13419->13427 13969 13f052960 13419->13969 13420 13f0519f0 103 API calls 13423 13f052aa0 13420->13423 13423->13419 13426 13f052aa4 13423->13426 13425 13f052b1c SetDllDirectoryW 14076 13f05a4f8 13425->14076 14051 13f051dd0 13426->14051 14062 13f0554b0 13427->14062 13428 13f052bc2 13973 13f052790 13428->13973 13436 13f054490 42 API calls 13440 13f052bff 13436->13440 13438 13f052b30 13438->13446 14082 13f0528d0 13438->14082 13440->13446 13994 13f054b30 13440->13994 13446->13410 13448 13f062118 13447->13448 13449 13f06212a 13447->13449 13448->13370 15611 13f062804 13449->15611 13453 13f0590b5 13452->13453 13453->13378 13455 13f058d8d 13454->13455 13456 13f0588ac 13455->13456 13457 13f059dc0 __scrt_initialize_crt 7 API calls 13455->13457 13456->13367 13457->13456 13459 13f058f39 __scrt_fastfail memcpy_s 13458->13459 13460 13f058f58 RtlCaptureContext RtlLookupFunctionEntry 13459->13460 13461 13f058f81 RtlVirtualUnwind 13460->13461 13462 13f058fbd memcpy_s 13460->13462 13461->13462 13463 13f058fef IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13462->13463 13464 13f059041 __scrt_fastfail 13463->13464 13464->13362 13466 13f058c0a __scrt_dllmain_crt_thread_attach 13465->13466 13466->13384 13466->13385 13469 13f06b718 13467->13469 13468 13f058c1c 13468->13385 13474 13f059dc0 13468->13474 13469->13468 13480 13f06a870 13469->13480 13486 13f066be4 13469->13486 13493 13f06a7b8 13469->13493 13508 13f064b60 13469->13508 13475 13f059dc8 13474->13475 13476 13f059dd2 13474->13476 13779 13f05a040 13475->13779 13476->13385 13481 13f06a87d 13480->13481 13482 13f06a8c2 13480->13482 13519 13f066a70 13481->13519 13482->13469 13773 13f065e9c 13486->13773 13494 13f06a7db 13493->13494 13495 13f06a7e5 13494->13495 13777 13f068a68 EnterCriticalSection 13494->13777 13497 13f06a857 13495->13497 13500 13f06292c 33 API calls 13495->13500 13497->13469 13501 13f06a86f 13500->13501 13504 13f066a70 33 API calls 13501->13504 13507 13f06a8c2 13501->13507 13505 13f06a8ac 13504->13505 13506 13f06a5f4 43 API calls 13505->13506 13506->13507 13507->13469 13778 13f068a68 EnterCriticalSection 13508->13778 13520 13f066a81 13519->13520 13525 13f066a86 13519->13525 13521 13f065f2c _invalid_parameter_noinfo 6 API calls 13520->13521 13521->13525 13522 13f065f74 _invalid_parameter_noinfo 6 API calls 13524 13f066aa5 13522->13524 13523 13f066a8e 13532 13f066b08 13523->13532 13562 13f06292c 13523->13562 13524->13523 13526 13f063680 _invalid_parameter_noinfo 13 API calls 13524->13526 13525->13522 13525->13523 13528 13f066ab8 13526->13528 13530 13f066ad6 13528->13530 13531 13f066ac6 13528->13531 13534 13f065f74 _invalid_parameter_noinfo 6 API calls 13530->13534 13533 13f065f74 _invalid_parameter_noinfo 6 API calls 13531->13533 13544 13f06a5f4 13532->13544 13535 13f066acd 13533->13535 13536 13f066ade 13534->13536 13540 13f0636f8 __free_lconv_mon 13 API calls 13535->13540 13537 13f066af4 13536->13537 13538 13f066ae2 13536->13538 13539 13f06674c _invalid_parameter_noinfo 13 API calls 13537->13539 13541 13f065f74 _invalid_parameter_noinfo 6 API calls 13538->13541 13542 13f066afc 13539->13542 13540->13523 13541->13535 13543 13f0636f8 __free_lconv_mon 13 API calls 13542->13543 13543->13523 13545 13f06a7b8 43 API calls 13544->13545 13546 13f06a61d 13545->13546 13633 13f06a300 13546->13633 13549 13f06a637 13549->13482 13550 13f063738 _fread_nolock 14 API calls 13552 13f06a648 13550->13552 13551 13f06a6e3 13553 13f0636f8 __free_lconv_mon 13 API calls 13551->13553 13552->13551 13640 13f06a8ec 13552->13640 13553->13549 13556 13f06a6de 13557 13f05deb4 _get_daylight 13 API calls 13556->13557 13557->13551 13558 13f06a740 13558->13551 13651 13f06a144 13558->13651 13559 13f06a703 13559->13558 13560 13f0636f8 __free_lconv_mon 13 API calls 13559->13560 13560->13558 13571 13f060770 13562->13571 13597 13f060658 13571->13597 13602 13f068a68 EnterCriticalSection 13597->13602 13666 13f05be30 13633->13666 13636 13f06a332 13638 13f06a337 GetACP 13636->13638 13639 13f06a347 13636->13639 13637 13f06a320 GetOEMCP 13637->13639 13638->13639 13639->13549 13639->13550 13641 13f06a300 35 API calls 13640->13641 13642 13f06a917 13641->13642 13643 13f06a954 IsValidCodePage 13642->13643 13648 13f06a997 memcpy_s 13642->13648 13646 13f06a965 13643->13646 13643->13648 13644 13f058680 _wfindfirst32i64 8 API calls 13645 13f06a6d7 13644->13645 13645->13556 13645->13559 13647 13f06a99c GetCPInfo 13646->13647 13650 13f06a96e memcpy_s 13646->13650 13647->13648 13647->13650 13648->13644 13698 13f06a410 13650->13698 13772 13f068a68 EnterCriticalSection 13651->13772 13667 13f05be54 13666->13667 13673 13f05be4f 13666->13673 13668 13f06699c 33 API calls 13667->13668 13667->13673 13669 13f05be6f 13668->13669 13674 13f066c44 13669->13674 13673->13636 13673->13637 13675 13f05be92 13674->13675 13676 13f066c59 13674->13676 13678 13f066c78 13675->13678 13676->13675 13682 13f06b584 13676->13682 13679 13f066ca0 13678->13679 13680 13f066c8d 13678->13680 13679->13673 13680->13679 13695 13f06a8d0 13680->13695 13683 13f06699c 33 API calls 13682->13683 13684 13f06b593 13683->13684 13685 13f06b5dc 13684->13685 13694 13f068a68 EnterCriticalSection 13684->13694 13685->13675 13696 13f06699c 33 API calls 13695->13696 13697 13f06a8d9 13696->13697 13699 13f06a44d GetCPInfo 13698->13699 13708 13f06a545 13698->13708 13700 13f06a460 13699->13700 13699->13708 13709 13f06b0c0 13700->13709 13701 13f058680 _wfindfirst32i64 8 API calls 13703 13f06a5de 13701->13703 13703->13648 13708->13701 13710 13f05be30 33 API calls 13709->13710 13711 13f06b102 13710->13711 13729 13f067c10 13711->13729 13730 13f067c18 MultiByteToWideChar 13729->13730 13774 13f065b5c try_get_function 5 API calls 13773->13774 13775 13f065ec4 TlsAlloc 13774->13775 13780 13f05a04f 13779->13780 13782 13f059dcd 13779->13782 13787 13f05a264 13780->13787 13783 13f05a098 13782->13783 13784 13f05a0c3 13783->13784 13785 13f05a0a6 DeleteCriticalSection 13784->13785 13786 13f05a0c7 13784->13786 13785->13784 13786->13476 13791 13f05a0d0 13787->13791 13792 13f05a1f5 TlsFree 13791->13792 13799 13f05a113 try_get_function 13791->13799 13793 13f05a140 LoadLibraryExW 13795 13f05a1b7 13793->13795 13796 13f05a161 GetLastError 13793->13796 13794 13f05a1d7 GetProcAddress 13794->13792 13798 13f05a1e8 13794->13798 13795->13794 13797 13f05a1ce FreeLibrary 13795->13797 13796->13799 13797->13794 13798->13792 13799->13792 13799->13793 13799->13794 13800 13f05a183 LoadLibraryExW 13799->13800 13800->13795 13800->13799 13802 13f0586b4 13801->13802 13830 13f05f130 13802->13830 13804 13f0586c0 13836 13f058c34 13804->13836 13806 13f058f14 __scrt_fastfail 7 API calls 13808 13f058759 13806->13808 13807 13f0586d8 _RTC_Initialize 13816 13f05872d 13807->13816 13841 13f058de4 13807->13841 13808->13390 13810 13f0586ed 13844 13f06162c 13810->13844 13816->13806 13817 13f058749 13816->13817 13817->13390 13819 13f05b42a 13818->13819 13820 13f063680 _invalid_parameter_noinfo 13 API calls 13819->13820 13821 13f05b449 13820->13821 13822 13f0636f8 __free_lconv_mon 13 API calls 13821->13822 13823 13f05b457 13822->13823 13824 13f063680 _invalid_parameter_noinfo 13 API calls 13823->13824 13828 13f05b481 13823->13828 13825 13f05b473 13824->13825 13827 13f0636f8 __free_lconv_mon 13 API calls 13825->13827 13827->13828 13829 13f05b48a 13828->13829 13891 13f065fc8 13828->13891 13829->13390 13831 13f05f141 13830->13831 13832 13f05deb4 _get_daylight 13 API calls 13831->13832 13833 13f05f149 13831->13833 13834 13f05f158 13832->13834 13833->13804 13835 13f063618 _invalid_parameter_noinfo 30 API calls 13834->13835 13835->13833 13837 13f058c45 13836->13837 13840 13f058c4a __scrt_acquire_startup_lock 13836->13840 13838 13f058f14 __scrt_fastfail 7 API calls 13837->13838 13837->13840 13839 13f058cbe 13838->13839 13840->13807 13870 13f058da8 13841->13870 13843 13f058ded 13843->13810 13845 13f0586f9 13844->13845 13846 13f06164c 13844->13846 13845->13816 13869 13f058eb8 InitializeSListHead 13845->13869 13847 13f061654 13846->13847 13848 13f06166a GetModuleFileNameW 13846->13848 13849 13f05deb4 _get_daylight 13 API calls 13847->13849 13852 13f061695 13848->13852 13850 13f061659 13849->13850 13851 13f063618 _invalid_parameter_noinfo 30 API calls 13850->13851 13851->13845 13885 13f0615cc 13852->13885 13855 13f0616dd 13856 13f05deb4 _get_daylight 13 API calls 13855->13856 13857 13f0616e2 13856->13857 13860 13f0636f8 __free_lconv_mon 13 API calls 13857->13860 13858 13f061717 13862 13f0636f8 __free_lconv_mon 13 API calls 13858->13862 13859 13f0616f5 13859->13858 13863 13f061743 13859->13863 13864 13f06175c 13859->13864 13861 13f0616f0 13860->13861 13861->13845 13862->13845 13865 13f0636f8 __free_lconv_mon 13 API calls 13863->13865 13866 13f0636f8 __free_lconv_mon 13 API calls 13864->13866 13867 13f06174c 13865->13867 13866->13858 13868 13f0636f8 __free_lconv_mon 13 API calls 13867->13868 13868->13861 13871 13f058dc2 13870->13871 13873 13f058dbb 13870->13873 13874 13f062644 13871->13874 13873->13843 13877 13f062290 13874->13877 13884 13f068a68 EnterCriticalSection 13877->13884 13886 13f0615e4 13885->13886 13890 13f06161c 13885->13890 13887 13f063680 _invalid_parameter_noinfo 13 API calls 13886->13887 13886->13890 13888 13f061612 13887->13888 13889 13f0636f8 __free_lconv_mon 13 API calls 13888->13889 13889->13890 13890->13855 13890->13859 13892 13f065b5c try_get_function 5 API calls 13891->13892 13893 13f065ffe 13892->13893 13894 13f066008 13893->13894 13895 13f066013 InitializeCriticalSectionAndSpinCount 13893->13895 13894->13828 13895->13894 13904 13f0590f8 SetUnhandledExceptionFilter 13896->13904 13906 13f059077 GetStartupInfoW 13905->13906 13906->13373 13908 13f05519f 13907->13908 13909 13f0551a7 13908->13909 13910 13f0551f0 WideCharToMultiByte 13908->13910 13912 13f055246 WideCharToMultiByte 13908->13912 13913 13f055297 13908->13913 13909->13404 13910->13908 13910->13913 13912->13908 13912->13913 14120 13f051c80 13913->14120 13914 13f0552c3 13915 13f0552e1 13914->13915 13917 13f05a4f8 __vcrt_freefls 14 API calls 13914->13917 13916 13f05a4f8 __vcrt_freefls 14 API calls 13915->13916 13916->13909 13917->13914 13919 13f068020 13918->13919 13920 13f0680a3 13919->13920 13923 13f068064 13919->13923 13921 13f05deb4 _get_daylight 13 API calls 13920->13921 13922 13f0680a8 13921->13922 13924 13f063618 _invalid_parameter_noinfo 30 API calls 13922->13924 14149 13f067f00 13923->14149 13925 13f052a10 13924->13925 13927 13f051ae0 13925->13927 13928 13f051af5 13927->13928 13930 13f051b10 13928->13930 14157 13f051b30 13928->14157 13930->13446 13931 13f052d20 13930->13931 13932 13f058610 13931->13932 13933 13f052d2c GetModuleFileNameW 13932->13933 13934 13f052d72 13933->13934 13935 13f052d5b 13933->13935 14193 13f0555c0 13934->14193 13936 13f051c80 16 API calls 13935->13936 13938 13f052d6e 13936->13938 13941 13f058680 _wfindfirst32i64 8 API calls 13938->13941 13940 13f051dd0 18 API calls 13940->13938 13942 13f052daf 13941->13942 13942->13412 13944 13f05449a 13943->13944 13945 13f0554b0 16 API calls 13944->13945 13946 13f0544bc GetEnvironmentVariableW 13945->13946 13947 13f054526 13946->13947 13948 13f0544d4 ExpandEnvironmentStringsW 13946->13948 13949 13f058680 _wfindfirst32i64 8 API calls 13947->13949 13950 13f0555c0 18 API calls 13948->13950 13951 13f054538 13949->13951 13952 13f0544fc 13950->13952 13951->13414 13952->13947 13953 13f054506 13952->13953 14204 13f06282c 13953->14204 13956 13f058680 _wfindfirst32i64 8 API calls 13957 13f05451e 13956->13957 13957->13414 13959 13f0554b0 16 API calls 13958->13959 13960 13f054b07 SetEnvironmentVariableW 13959->13960 13961 13f05a4f8 __vcrt_freefls 14 API calls 13960->13961 13962 13f052a7f 13961->13962 13963 13f0519f0 13962->13963 13964 13f051a00 13963->13964 13967 13f051a7f 13964->13967 14220 13f051710 13964->14220 13967->13419 13967->13420 13970 13f0529a0 13969->13970 13972 13f052977 13969->13972 13970->13427 13970->13428 13972->13970 14528 13f0516e0 13972->14528 13974 13f05282f 13973->13974 13979 13f0527ff 13973->13979 13975 13f052866 13974->13975 13976 13f051aa0 65 API calls 13974->13976 13977 13f058680 _wfindfirst32i64 8 API calls 13975->13977 13976->13974 13978 13f052878 13977->13978 13978->13446 13983 13f054a80 13978->13983 13979->13974 13981 13f0516e0 18 API calls 13979->13981 14532 13f051430 13979->14532 14566 13f052050 13979->14566 13981->13979 13984 13f0554b0 16 API calls 13983->13984 13985 13f054a9f 13984->13985 13986 13f0554b0 16 API calls 13985->13986 13987 13f054aaf 13986->13987 13988 13f05fd9c 31 API calls 13987->13988 13989 13f054abd 13988->13989 13990 13f05a4f8 __vcrt_freefls 14 API calls 13989->13990 13991 13f054ac7 13990->13991 13992 13f05a4f8 __vcrt_freefls 14 API calls 13991->13992 13993 13f052bf3 13992->13993 13993->13436 13995 13f054b40 13994->13995 13996 13f0554b0 16 API calls 13995->13996 13997 13f054b71 13996->13997 15254 13f060a2c 13997->15254 14000 13f060a2c 16 API calls 14001 13f054b8a 14000->14001 14002 13f060a2c 16 API calls 14001->14002 14003 13f054b94 14002->14003 14004 13f060a2c 16 API calls 14003->14004 14005 13f054b9e GetStartupInfoW 14004->14005 14006 13f054beb 14005->14006 15272 13f0628a4 14006->15272 14010 13f054bfa 14011 13f0628a4 _fread_nolock 30 API calls 14010->14011 14012 13f054c11 14011->14012 14013 13f0605e0 30 API calls 14012->14013 14014 13f054c18 14013->14014 14052 13f051df0 memcpy_s 14051->14052 14053 13f0554b0 16 API calls 14052->14053 14054 13f051e6a 14053->14054 14055 13f051e6f 14054->14055 14056 13f051ea9 MessageBoxA 14054->14056 14057 13f0554b0 16 API calls 14055->14057 14058 13f051ec3 14056->14058 14059 13f051e89 MessageBoxW 14057->14059 14060 13f058680 _wfindfirst32i64 8 API calls 14058->14060 14059->14058 14061 13f051ed3 14060->14061 14061->13446 14063 13f055557 MultiByteToWideChar 14062->14063 14064 13f0554d1 MultiByteToWideChar 14062->14064 14065 13f05559f 14063->14065 14066 13f05557a 14063->14066 14067 13f0554f7 14064->14067 14070 13f05551c 14064->14070 14065->13425 14068 13f051c80 14 API calls 14066->14068 14069 13f051c80 14 API calls 14067->14069 14071 13f05558d 14068->14071 14072 13f05550a 14069->14072 14070->14063 14073 13f055532 14070->14073 14071->13425 14072->13425 14074 13f051c80 14 API calls 14073->14074 14075 13f055545 14074->14075 14075->13425 14077 13f0636f8 14076->14077 14078 13f06372f 14077->14078 14079 13f0636fd HeapFree 14077->14079 14078->13438 14079->14078 14080 13f063718 14079->14080 14081 13f05deb4 _get_daylight 13 API calls 14080->14081 14081->14078 14083 13f0528dc 14082->14083 14084 13f051640 18 API calls 14083->14084 14085 13f052900 14084->14085 14086 13f052941 14085->14086 14089 13f052937 14085->14089 14090 13f051dd0 18 API calls 14085->14090 14087 13f058680 _wfindfirst32i64 8 API calls 14086->14087 14088 13f052951 14087->14088 14092 13f052540 14088->14092 15317 13f054ea0 MultiByteToWideChar 14089->15317 14090->14089 14093 13f05254d 14092->14093 15330 13f053a30 14093->15330 14097 13f058680 _wfindfirst32i64 8 API calls 14099 13f05277f 14097->14099 14098 13f052585 14116 13f0525e2 14098->14116 15378 13f0537b0 14098->15378 14099->13446 14101 13f052595 14101->14116 15389 13f053930 14101->15389 14104 13f0525d6 14106 13f051dd0 18 API calls 14104->14106 14105 13f0525ec 14107 13f052605 14105->14107 14115 13f05261a 14105->14115 14106->14116 14108 13f051dd0 18 API calls 14107->14108 14108->14116 14110 13f0516e0 18 API calls 14110->14115 14111 13f052757 14112 13f051dd0 18 API calls 14111->14112 14112->14116 14113 13f05273a 14114 13f051dd0 18 API calls 14113->14114 14114->14116 14115->14110 14115->14111 14115->14113 14115->14116 14117 13f052722 14115->14117 14118 13f05a4f8 __vcrt_freefls 14 API calls 14115->14118 15394 13f0512a0 14115->15394 14116->14097 14119 13f051dd0 18 API calls 14117->14119 14118->14115 14119->14116 14135 13f058610 14120->14135 14123 13f051cc9 14137 13f055030 14123->14137 14125 13f051d00 memcpy_s 14126 13f0554b0 13 API calls 14125->14126 14127 13f051d55 14126->14127 14128 13f051d94 MessageBoxA 14127->14128 14129 13f051d5a 14127->14129 14131 13f051dae 14128->14131 14130 13f0554b0 13 API calls 14129->14130 14132 13f051d74 MessageBoxW 14130->14132 14133 13f058680 _wfindfirst32i64 8 API calls 14131->14133 14132->14131 14134 13f051dbe 14133->14134 14134->13914 14136 13f051c9c GetLastError 14135->14136 14136->14123 14138 13f05503c 14137->14138 14139 13f055057 GetLastError 14138->14139 14140 13f05505d FormatMessageW 14138->14140 14139->14140 14141 13f055090 14140->14141 14142 13f0550ac WideCharToMultiByte 14140->14142 14143 13f051c80 13 API calls 14141->14143 14144 13f0550e6 14142->14144 14145 13f0550a3 14142->14145 14143->14145 14146 13f051c80 13 API calls 14144->14146 14147 13f058680 _wfindfirst32i64 8 API calls 14145->14147 14146->14145 14148 13f055115 14147->14148 14148->14125 14156 13f05b590 EnterCriticalSection 14149->14156 14158 13f051b4c 14157->14158 14159 13f05deb4 _get_daylight 13 API calls 14158->14159 14160 13f051ba4 14159->14160 14172 13f05ded4 14160->14172 14162 13f051bab memcpy_s 14163 13f0554b0 16 API calls 14162->14163 14164 13f051c00 14163->14164 14165 13f051c05 14164->14165 14166 13f051c3f MessageBoxA 14164->14166 14167 13f0554b0 16 API calls 14165->14167 14168 13f051c59 14166->14168 14169 13f051c1f MessageBoxW 14167->14169 14170 13f058680 _wfindfirst32i64 8 API calls 14168->14170 14169->14168 14171 13f051c69 14170->14171 14171->13930 14173 13f066b18 _invalid_parameter_noinfo 13 API calls 14172->14173 14174 13f05dee6 14173->14174 14175 13f05deee 14174->14175 14176 13f063680 _invalid_parameter_noinfo 13 API calls 14174->14176 14179 13f05df21 14174->14179 14175->14162 14177 13f05df16 14176->14177 14178 13f0636f8 __free_lconv_mon 13 API calls 14177->14178 14178->14179 14179->14175 14184 13f067860 14179->14184 14182 13f063638 _wfindfirst32i64 17 API calls 14183 13f05df79 14182->14183 14187 13f067878 14184->14187 14185 13f06787d 14186 13f05deb4 _get_daylight 13 API calls 14185->14186 14189 13f05df5a 14185->14189 14192 13f067887 14186->14192 14187->14185 14187->14189 14190 13f0678c2 14187->14190 14188 13f063618 _invalid_parameter_noinfo 30 API calls 14188->14189 14189->14175 14189->14182 14190->14189 14191 13f05deb4 _get_daylight 13 API calls 14190->14191 14191->14192 14192->14188 14194 13f055652 WideCharToMultiByte 14193->14194 14195 13f0555e4 WideCharToMultiByte 14193->14195 14197 13f052d85 14194->14197 14198 13f05567f 14194->14198 14196 13f05560e 14195->14196 14200 13f055625 14195->14200 14199 13f051c80 16 API calls 14196->14199 14197->13938 14197->13940 14201 13f051c80 16 API calls 14198->14201 14199->14197 14200->14194 14202 13f05563b 14200->14202 14201->14197 14203 13f051c80 16 API calls 14202->14203 14203->14197 14205 13f062843 14204->14205 14208 13f05450e 14204->14208 14205->14208 14211 13f0628cc 14205->14211 14208->13956 14209 13f063638 _wfindfirst32i64 17 API calls 14210 13f0628a0 14209->14210 14212 13f0628d9 14211->14212 14214 13f0628e3 14211->14214 14212->14214 14218 13f0628fe 14212->14218 14213 13f05deb4 _get_daylight 13 API calls 14215 13f0628ea 14213->14215 14214->14213 14216 13f063618 _invalid_parameter_noinfo 30 API calls 14215->14216 14217 13f062870 14216->14217 14217->14208 14217->14209 14218->14217 14219 13f05deb4 _get_daylight 13 API calls 14218->14219 14219->14215 14221 13f051733 14220->14221 14234 13f051743 14220->14234 14264 13f052e30 14221->14264 14223 13f05a4f8 __vcrt_freefls 14 API calls 14224 13f051837 14223->14224 14225 13f05184e 14224->14225 14226 13f05186b 14224->14226 14251 13f05181f 14224->14251 14227 13f051b30 40 API calls 14225->14227 14228 13f05a8e4 _fread_nolock 46 API calls 14226->14228 14227->14251 14233 13f051880 14228->14233 14229 13f051817 14231 13f05a4f8 __vcrt_freefls 14 API calls 14229->14231 14230 13f051886 14232 13f051b30 40 API calls 14230->14232 14231->14251 14232->14251 14233->14230 14236 13f051901 14233->14236 14237 13f05191e 14233->14237 14234->14229 14241 13f051829 14234->14241 14234->14251 14274 13f05a8e4 14234->14274 14239 13f051b30 40 API calls 14236->14239 14238 13f05a8e4 _fread_nolock 46 API calls 14237->14238 14240 13f051933 14238->14240 14239->14251 14240->14230 14242 13f051945 14240->14242 14241->14223 14277 13f05a628 14242->14277 14245 13f05195d 14246 13f051dd0 18 API calls 14245->14246 14246->14251 14247 13f0519b3 14248 13f05a598 64 API calls 14247->14248 14247->14251 14248->14251 14249 13f051970 14249->14247 14250 13f051dd0 18 API calls 14249->14250 14250->14247 14251->13967 14252 13f05a598 14251->14252 14253 13f05a5af 14252->14253 14255 13f05a5cd 14252->14255 14254 13f05deb4 _get_daylight 13 API calls 14253->14254 14257 13f05a5b4 14254->14257 14260 13f05a5bf 14255->14260 14527 13f05b590 EnterCriticalSection 14255->14527 14259 13f063618 _invalid_parameter_noinfo 30 API calls 14257->14259 14259->14260 14260->13967 14265 13f052e3c 14264->14265 14266 13f0554b0 16 API calls 14265->14266 14267 13f052e67 14266->14267 14268 13f0554b0 16 API calls 14267->14268 14269 13f052e7a 14268->14269 14283 13f05eed8 14269->14283 14272 13f058680 _wfindfirst32i64 8 API calls 14273 13f052e99 14272->14273 14273->14234 14513 13f05a904 14274->14513 14278 13f05a631 14277->14278 14280 13f051959 14277->14280 14279 13f05deb4 _get_daylight 13 API calls 14278->14279 14281 13f05a636 14279->14281 14280->14245 14280->14249 14282 13f063618 _invalid_parameter_noinfo 30 API calls 14281->14282 14282->14280 14284 13f05ee0c 14283->14284 14285 13f05ee32 14284->14285 14288 13f05ee65 14284->14288 14286 13f05deb4 _get_daylight 13 API calls 14285->14286 14287 13f05ee37 14286->14287 14289 13f063618 _invalid_parameter_noinfo 30 API calls 14287->14289 14290 13f05ee78 14288->14290 14291 13f05ee6b 14288->14291 14292 13f052e89 14289->14292 14302 13f063970 14290->14302 14293 13f05deb4 _get_daylight 13 API calls 14291->14293 14292->14272 14293->14292 14315 13f068a68 EnterCriticalSection 14302->14315 14514 13f05a92e 14513->14514 14525 13f05a8fc 14513->14525 14515 13f05a93d memcpy_s 14514->14515 14516 13f05a97a 14514->14516 14514->14525 14518 13f05deb4 _get_daylight 13 API calls 14515->14518 14526 13f05b590 EnterCriticalSection 14516->14526 14520 13f05a952 14518->14520 14522 13f063618 _invalid_parameter_noinfo 30 API calls 14520->14522 14522->14525 14525->14234 14529 13f051701 14528->14529 14530 13f0516f5 14528->14530 14529->13972 14531 13f051dd0 18 API calls 14530->14531 14531->14529 14610 13f054220 14532->14610 14534 13f051444 14535 13f051449 14534->14535 14619 13f054540 14534->14619 14535->13979 14538 13f051497 14541 13f0514d0 14538->14541 14543 13f052e30 98 API calls 14538->14543 14539 13f051477 14540 13f051b30 40 API calls 14539->14540 14542 13f05148d 14540->14542 14545 13f051506 14541->14545 14546 13f0514e6 14541->14546 14542->13979 14544 13f0514af 14543->14544 14544->14541 14547 13f0514b7 14544->14547 14549 13f051524 14545->14549 14550 13f05150c 14545->14550 14548 13f051b30 40 API calls 14546->14548 14551 13f051dd0 18 API calls 14547->14551 14560 13f0514c6 14548->14560 14554 13f051546 14549->14554 14555 13f051565 14549->14555 14635 13f051040 14550->14635 14551->14560 14553 13f051614 14557 13f05a598 64 API calls 14553->14557 14558 13f051b30 40 API calls 14554->14558 14561 13f05a8e4 _fread_nolock 46 API calls 14555->14561 14562 13f0515c5 14555->14562 14565 13f0515c3 14555->14565 14657 13f05b2ec 14555->14657 14556 13f05a598 64 API calls 14556->14553 14557->14542 14558->14560 14559 13f05a4f8 __vcrt_freefls 14 API calls 14559->14560 14560->14553 14560->14556 14561->14555 14564 13f051b30 40 API calls 14562->14564 14564->14565 14565->14559 14568 13f052066 14566->14568 14567 13f052489 14568->14567 15045 13f0524a0 14568->15045 14571 13f0521a7 14573 13f054220 80 API calls 14571->14573 14572 13f0524a0 55 API calls 14574 13f0521a3 14572->14574 14575 13f0521af 14573->14575 14574->14571 14576 13f052215 14574->14576 14577 13f0521cc 14575->14577 15051 13f054100 14575->15051 14578 13f0524a0 55 API calls 14576->14578 14581 13f051dd0 18 API calls 14577->14581 14609 13f0521e6 14577->14609 14580 13f05223e 14578->14580 14582 13f052298 14580->14582 14583 13f0524a0 55 API calls 14580->14583 14581->14609 14582->14577 14584 13f054220 80 API calls 14582->14584 14585 13f05226b 14583->14585 14590 13f0522a8 14584->14590 14585->14582 14588 13f0524a0 55 API calls 14585->14588 14586 13f058680 _wfindfirst32i64 8 API calls 14587 13f05220a 14586->14587 14587->13979 14588->14582 14589 13f051ae0 40 API calls 14595 13f0522ff 14589->14595 14590->14577 14590->14589 14591 13f0523c6 14590->14591 14591->14577 14600 13f0523de 14591->14600 14592 13f052462 14593 13f051dd0 18 API calls 14592->14593 14594 13f0523c1 14593->14594 14596 13f051aa0 65 API calls 14594->14596 14595->14577 14595->14592 14599 13f05238c 14595->14599 14596->14577 14597 13f051430 144 API calls 14597->14600 14598 13f0516e0 18 API calls 14598->14600 14601 13f051710 103 API calls 14599->14601 14600->14597 14600->14598 14602 13f052444 14600->14602 14600->14609 14603 13f0523a3 14601->14603 14604 13f051dd0 18 API calls 14602->14604 14603->14600 14605 13f0523a7 14603->14605 14606 13f052455 14604->14606 14607 13f051b30 40 API calls 14605->14607 14608 13f051aa0 65 API calls 14606->14608 14607->14594 14608->14609 14609->14586 14611 13f054268 14610->14611 14612 13f054232 14610->14612 14611->14534 14666 13f051640 14612->14666 14617 13f051dd0 18 API calls 14618 13f05425d 14617->14618 14618->14534 14622 13f054550 14619->14622 14620 13f054709 14621 13f058680 _wfindfirst32i64 8 API calls 14620->14621 14623 13f05146f 14621->14623 14622->14620 15004 13f05eae8 14622->15004 14623->14538 14623->14539 14625 13f0546b9 14626 13f0554b0 16 API calls 14625->14626 14628 13f0546d1 14626->14628 14627 13f0546f8 14630 13f052e30 98 API calls 14627->14630 14628->14627 15013 13f051ee0 14628->15013 14630->14620 14631 13f0545dd 14631->14620 14631->14625 14632 13f05eae8 37 API calls 14631->14632 14633 13f0554b0 16 API calls 14631->14633 14634 13f055320 32 API calls 14631->14634 14632->14631 14633->14631 14634->14631 14636 13f051096 14635->14636 14637 13f0510c3 14636->14637 14638 13f05109d 14636->14638 14641 13f0510dd 14637->14641 14642 13f0510f9 14637->14642 14639 13f051dd0 18 API calls 14638->14639 14640 13f0510b0 14639->14640 14640->14560 14643 13f051b30 40 API calls 14641->14643 14644 13f05110b 14642->14644 14653 13f051127 memcpy_s 14642->14653 14647 13f0510f4 14643->14647 14645 13f051b30 40 API calls 14644->14645 14645->14647 14646 13f05a8e4 _fread_nolock 46 API calls 14646->14653 14648 13f05a4f8 __vcrt_freefls 14 API calls 14647->14648 14649 13f051279 14648->14649 14651 13f05a4f8 __vcrt_freefls 14 API calls 14649->14651 14650 13f05a628 30 API calls 14650->14653 14652 13f051281 14651->14652 14652->14560 14653->14646 14653->14647 14653->14650 14654 13f0511f5 14653->14654 14655 13f05b2ec 64 API calls 14653->14655 14656 13f051dd0 18 API calls 14654->14656 14655->14653 14656->14647 14658 13f05b326 14657->14658 14659 13f05b30c 14657->14659 14658->14555 14659->14658 14660 13f05b316 14659->14660 14661 13f05b32e 14659->14661 14662 13f05deb4 _get_daylight 13 API calls 14660->14662 15037 13f05b09c 14661->15037 14664 13f05b31b 14662->14664 14665 13f063618 _invalid_parameter_noinfo 30 API calls 14664->14665 14665->14658 14668 13f051665 14666->14668 14667 13f0516a2 14670 13f054280 14667->14670 14668->14667 14669 13f051dd0 18 API calls 14668->14669 14669->14667 14671 13f054298 14670->14671 14672 13f0542b8 14671->14672 14673 13f05430b 14671->14673 14675 13f054490 42 API calls 14672->14675 14674 13f054310 GetTempPathW 14673->14674 14676 13f054325 14674->14676 14677 13f0542c4 14675->14677 14689 13f0543e6 14676->14689 14692 13f05a4f8 __vcrt_freefls 14 API calls 14676->14692 14696 13f054371 14676->14696 14726 13f060fcc 14676->14726 14729 13f055320 14676->14729 14747 13f053fb0 14677->14747 14681 13f058680 _wfindfirst32i64 8 API calls 14684 13f05424d 14681->14684 14684->14611 14684->14617 14685 13f05a4f8 __vcrt_freefls 14 API calls 14687 13f0542f4 14685->14687 14687->14674 14688 13f0542f8 14687->14688 14690 13f051dd0 18 API calls 14688->14690 14691 13f0555c0 18 API calls 14689->14691 14693 13f054304 14690->14693 14694 13f0543f7 14691->14694 14692->14676 14698 13f0543c2 14693->14698 14695 13f05a4f8 __vcrt_freefls 14 API calls 14694->14695 14697 13f0543ff 14695->14697 14696->14698 14699 13f0554b0 16 API calls 14696->14699 14697->14698 14701 13f0554b0 16 API calls 14697->14701 14698->14681 14700 13f054387 14699->14700 14702 13f0543c9 SetEnvironmentVariableW 14700->14702 14703 13f05438c 14700->14703 14704 13f054415 14701->14704 14708 13f05a4f8 __vcrt_freefls 14 API calls 14702->14708 14705 13f0554b0 16 API calls 14703->14705 14706 13f05444d SetEnvironmentVariableW 14704->14706 14707 13f05441a 14704->14707 14710 13f05439c 14705->14710 14709 13f054448 14706->14709 14711 13f0554b0 16 API calls 14707->14711 14708->14698 14712 13f05a4f8 __vcrt_freefls 14 API calls 14709->14712 14713 13f05fd9c 31 API calls 14710->14713 14714 13f05442a 14711->14714 14712->14698 14715 13f0543aa 14713->14715 14716 13f05fd9c 31 API calls 14714->14716 14717 13f05a4f8 __vcrt_freefls 14 API calls 14715->14717 14718 13f054438 14716->14718 14719 13f0543b2 14717->14719 14720 13f05a4f8 __vcrt_freefls 14 API calls 14718->14720 14721 13f05a4f8 __vcrt_freefls 14 API calls 14719->14721 14722 13f054440 14720->14722 14723 13f0543ba 14721->14723 14724 13f05a4f8 __vcrt_freefls 14 API calls 14722->14724 14725 13f05a4f8 __vcrt_freefls 14 API calls 14723->14725 14724->14709 14725->14698 14779 13f060c30 14726->14779 14730 13f058610 14729->14730 14731 13f055330 GetCurrentProcess OpenProcessToken 14730->14731 14732 13f0553f1 14731->14732 14733 13f05537b GetTokenInformation 14731->14733 14734 13f05a4f8 __vcrt_freefls 14 API calls 14732->14734 14735 13f0553a8 14733->14735 14736 13f05539d GetLastError 14733->14736 14737 13f0553f9 14734->14737 14735->14732 14740 13f0553be GetTokenInformation 14735->14740 14736->14732 14736->14735 14738 13f055404 CloseHandle 14737->14738 14739 13f05540a 14737->14739 14738->14739 14741 13f055433 LocalFree ConvertStringSecurityDescriptorToSecurityDescriptorW 14739->14741 14740->14732 14742 13f0553e4 ConvertSidToStringSidW 14740->14742 14743 13f055466 CreateDirectoryW 14741->14743 14744 13f055478 14741->14744 14742->14732 14743->14744 14745 13f058680 _wfindfirst32i64 8 API calls 14744->14745 14746 13f055491 14745->14746 14746->14676 14748 13f053fbc 14747->14748 14749 13f0554b0 16 API calls 14748->14749 14750 13f053fde 14749->14750 14751 13f053fe6 14750->14751 14752 13f053ff9 ExpandEnvironmentStringsW 14750->14752 14753 13f051dd0 18 API calls 14751->14753 14754 13f05a4f8 __vcrt_freefls 14 API calls 14752->14754 14761 13f053ff2 14753->14761 14755 13f054022 14754->14755 14756 13f054026 14755->14756 14757 13f054039 14755->14757 14758 13f051dd0 18 API calls 14756->14758 14895 13f05ed58 14757->14895 14758->14761 14760 13f058680 _wfindfirst32i64 8 API calls 14763 13f0540f2 14760->14763 14761->14760 14763->14698 14769 13f05fd9c 14763->14769 14764 13f054066 memcpy_s 14767 13f0540cc CreateDirectoryW 14764->14767 14768 13f0540a9 CreateDirectoryW 14764->14768 14765 13f054056 14766 13f051dd0 18 API calls 14765->14766 14766->14761 14767->14761 14768->14764 14770 13f05fda9 14769->14770 14771 13f05fdbc 14769->14771 14773 13f05deb4 _get_daylight 13 API calls 14770->14773 14996 13f05fa18 14771->14996 14775 13f05fdae 14773->14775 14777 13f063618 _invalid_parameter_noinfo 30 API calls 14775->14777 14776 13f0542ea 14776->14685 14777->14776 14822 13f0698f0 14779->14822 14872 13f0695e0 14822->14872 14893 13f068a68 EnterCriticalSection 14872->14893 14896 13f05ed77 14895->14896 14897 13f05ede0 14895->14897 14896->14897 14899 13f05ed7c 14896->14899 14936 13f0683c4 14897->14936 14900 13f05ed8f 14899->14900 14901 13f05edac 14899->14901 14909 13f05eb18 GetFullPathNameW 14900->14909 14917 13f05eb8c GetFullPathNameW 14901->14917 14902 13f05404e 14902->14764 14902->14765 14907 13f05edca 14907->14902 14908 13f05a4f8 __vcrt_freefls 14 API calls 14907->14908 14908->14902 14910 13f05eb3e GetLastError 14909->14910 14914 13f05eb54 14909->14914 14911 13f05de44 _fread_nolock 13 API calls 14910->14911 14913 13f05eb4b 14911->14913 14912 13f05eb50 14912->14902 14915 13f05deb4 _get_daylight 13 API calls 14913->14915 14914->14912 14916 13f05deb4 _get_daylight 13 API calls 14914->14916 14915->14912 14916->14912 14918 13f05ebc3 GetLastError 14917->14918 14920 13f05ebd9 14917->14920 14919 13f05de44 _fread_nolock 13 API calls 14918->14919 14922 13f05ebd0 14919->14922 14921 13f05ebd5 14920->14921 14923 13f05ebf7 14920->14923 14925 13f05a4f8 __vcrt_freefls 14 API calls 14920->14925 14927 13f05ec70 14921->14927 14924 13f05deb4 _get_daylight 13 API calls 14922->14924 14923->14921 14926 13f05ec30 GetFullPathNameW 14923->14926 14924->14921 14925->14923 14926->14918 14926->14921 14928 13f05ece9 memcpy_s 14927->14928 14929 13f05ec99 memcpy_s 14927->14929 14928->14907 14929->14928 14930 13f05ecd2 14929->14930 14933 13f05ed0b 14929->14933 14931 13f05deb4 _get_daylight 13 API calls 14930->14931 14932 13f05ecd7 14931->14932 14934 13f063618 _invalid_parameter_noinfo 30 API calls 14932->14934 14933->14928 14935 13f05deb4 _get_daylight 13 API calls 14933->14935 14934->14928 14935->14932 14939 13f0681dc 14936->14939 14940 13f068208 14939->14940 14941 13f068231 14939->14941 14942 13f05deb4 _get_daylight 13 API calls 14940->14942 14943 13f068235 14941->14943 14944 13f068256 14941->14944 14945 13f06820d 14942->14945 14970 13f068344 14943->14970 14982 13f067934 14944->14982 14950 13f063618 _invalid_parameter_noinfo 30 API calls 14945->14950 14949 13f06823e 14951 13f05de94 _fread_nolock 13 API calls 14949->14951 14952 13f068218 14950->14952 14953 13f068243 14951->14953 14956 13f058680 _wfindfirst32i64 8 API calls 14952->14956 14955 13f05deb4 _get_daylight 13 API calls 14953->14955 14954 13f06825b 14957 13f0682ff 14954->14957 14961 13f068283 14954->14961 14955->14945 14958 13f068226 14956->14958 14957->14940 14959 13f068307 14957->14959 14958->14902 14960 13f05eb18 15 API calls 14959->14960 14960->14952 14962 13f05eb8c 17 API calls 14961->14962 14963 13f0682c0 14962->14963 14964 13f0682e7 14963->14964 14965 13f0682c4 14963->14965 14964->14952 14968 13f05a4f8 __vcrt_freefls 14 API calls 14964->14968 14966 13f05ec70 30 API calls 14965->14966 14967 13f0682cd 14966->14967 14967->14952 14969 13f05a4f8 __vcrt_freefls 14 API calls 14967->14969 14968->14952 14969->14952 14971 13f06837d 14970->14971 14972 13f06835e 14970->14972 14973 13f068388 GetDriveTypeW 14971->14973 14981 13f068379 14971->14981 14974 13f05de94 _fread_nolock 13 API calls 14972->14974 14973->14981 14975 13f068363 14974->14975 14977 13f05deb4 _get_daylight 13 API calls 14975->14977 14976 13f058680 _wfindfirst32i64 8 API calls 14979 13f06823a 14976->14979 14978 13f06836e 14977->14978 14980 13f063618 _invalid_parameter_noinfo 30 API calls 14978->14980 14979->14949 14979->14954 14980->14981 14981->14976 14983 13f0597d0 memcpy_s 14982->14983 14984 13f06796a GetCurrentDirectoryW 14983->14984 14985 13f0679a8 14984->14985 14986 13f067981 14984->14986 14987 13f063680 _invalid_parameter_noinfo 13 API calls 14985->14987 14988 13f058680 _wfindfirst32i64 8 API calls 14986->14988 14989 13f0679b7 14987->14989 14992 13f067a15 14988->14992 14990 13f0679c1 GetCurrentDirectoryW 14989->14990 14991 13f0679d0 14989->14991 14990->14991 14993 13f0679d5 14990->14993 14994 13f05deb4 _get_daylight 13 API calls 14991->14994 14992->14954 14995 13f0636f8 __free_lconv_mon 13 API calls 14993->14995 14994->14993 14995->14986 15003 13f068a68 EnterCriticalSection 14996->15003 15005 13f06699c 33 API calls 15004->15005 15007 13f05eafd 15005->15007 15006 13f0681d5 15024 13f058a18 15006->15024 15007->15006 15010 13f0680fc 15007->15010 15011 13f058680 _wfindfirst32i64 8 API calls 15010->15011 15012 13f0681ca 15011->15012 15012->14631 15014 13f051f00 memcpy_s 15013->15014 15015 13f0554b0 16 API calls 15014->15015 15016 13f051f7a 15015->15016 15017 13f051f7f 15016->15017 15018 13f051fb9 MessageBoxA 15016->15018 15019 13f0554b0 16 API calls 15017->15019 15020 13f051fd3 15018->15020 15021 13f051f99 MessageBoxW 15019->15021 15022 13f058680 _wfindfirst32i64 8 API calls 15020->15022 15021->15020 15023 13f051fe3 15022->15023 15023->14627 15027 13f058a2c IsProcessorFeaturePresent 15024->15027 15028 13f058a42 15027->15028 15033 13f058ac8 RtlCaptureContext RtlLookupFunctionEntry 15028->15033 15034 13f058af8 RtlVirtualUnwind 15033->15034 15035 13f058a56 15033->15035 15034->15035 15036 13f058910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15035->15036 15044 13f05b590 EnterCriticalSection 15037->15044 15046 13f0524d4 15045->15046 15047 13f05250b 15046->15047 15075 13f05e80c 15046->15075 15049 13f058680 _wfindfirst32i64 8 API calls 15047->15049 15050 13f052156 15049->15050 15050->14571 15050->14572 15052 13f05410e 15051->15052 15053 13f052e30 98 API calls 15052->15053 15054 13f054135 15053->15054 15055 13f054540 115 API calls 15054->15055 15056 13f054143 15055->15056 15057 13f05415d 15056->15057 15058 13f0541f3 15056->15058 15228 13f05a5fc 15057->15228 15059 13f0541ef 15058->15059 15061 13f05a598 64 API calls 15058->15061 15062 13f058680 _wfindfirst32i64 8 API calls 15059->15062 15061->15059 15064 13f054215 15062->15064 15063 13f0541d0 15065 13f05a598 64 API calls 15063->15065 15064->14577 15067 13f0541e7 15065->15067 15066 13f05a8e4 _fread_nolock 46 API calls 15073 13f054162 15066->15073 15068 13f05a598 64 API calls 15067->15068 15068->15059 15069 13f05a628 30 API calls 15069->15073 15070 13f05b2ec 64 API calls 15070->15073 15071 13f054199 15234 13f060fe8 15071->15234 15072 13f05a5fc 30 API calls 15072->15073 15073->15063 15073->15066 15073->15069 15073->15070 15073->15071 15073->15072 15076 13f05e835 15075->15076 15077 13f05e829 15075->15077 15079 13f05be30 33 API calls 15076->15079 15092 13f05e0f4 15077->15092 15080 13f05e85d 15079->15080 15083 13f05e86d 15080->15083 15116 13f065d84 15080->15116 15119 13f05df7c 15083->15119 15085 13f05e8c5 15087 13f05e82e 15085->15087 15089 13f0636f8 __free_lconv_mon 13 API calls 15085->15089 15086 13f05e8d9 15088 13f05e0f4 52 API calls 15086->15088 15087->15047 15090 13f05e8e5 15088->15090 15089->15087 15090->15087 15091 13f0636f8 __free_lconv_mon 13 API calls 15090->15091 15091->15087 15093 13f05e11a 15092->15093 15094 13f05e139 memcpy_s 15092->15094 15095 13f05de94 _fread_nolock 13 API calls 15093->15095 15094->15093 15097 13f05e169 CreateFileW 15094->15097 15096 13f05e11f 15095->15096 15098 13f05deb4 _get_daylight 13 API calls 15096->15098 15099 13f05e202 15097->15099 15100 13f05e19e 15097->15100 15101 13f05e126 15098->15101 15167 13f05e708 15099->15167 15141 13f05e288 GetFileType 15100->15141 15103 13f063618 _invalid_parameter_noinfo 30 API calls 15101->15103 15107 13f05e131 15103->15107 15106 13f05e1ac memcpy_s 15106->15107 15112 13f05e1de CloseHandle 15106->15112 15107->15087 15108 13f05e217 15187 13f05e4c4 15108->15187 15109 13f05e20b 15110 13f05de44 _fread_nolock 13 API calls 15109->15110 15115 13f05e215 15110->15115 15112->15107 15115->15106 15117 13f065b5c try_get_function 5 API calls 15116->15117 15118 13f065da4 15117->15118 15118->15083 15120 13f05dfa5 15119->15120 15121 13f05dfc7 15119->15121 15122 13f05dfb3 15120->15122 15125 13f0636f8 __free_lconv_mon 13 API calls 15120->15125 15123 13f05e020 15121->15123 15124 13f05dfcb 15121->15124 15122->15085 15122->15086 15126 13f067c10 _fread_nolock MultiByteToWideChar 15123->15126 15124->15122 15129 13f0636f8 __free_lconv_mon 13 API calls 15124->15129 15133 13f05dfdf 15124->15133 15125->15122 15131 13f05e03b 15126->15131 15127 13f063738 _fread_nolock 14 API calls 15127->15122 15128 13f05e042 GetLastError 15130 13f05de44 _fread_nolock 13 API calls 15128->15130 15129->15133 15135 13f05e04f 15130->15135 15131->15128 15132 13f05e07b 15131->15132 15136 13f05e06f 15131->15136 15140 13f0636f8 __free_lconv_mon 13 API calls 15131->15140 15132->15122 15134 13f067c10 _fread_nolock MultiByteToWideChar 15132->15134 15133->15127 15138 13f05e0c3 15134->15138 15139 13f05deb4 _get_daylight 13 API calls 15135->15139 15137 13f063738 _fread_nolock 14 API calls 15136->15137 15137->15132 15138->15122 15138->15128 15139->15122 15140->15136 15142 13f05e38e 15141->15142 15145 13f05e2d6 15141->15145 15143 13f05e396 15142->15143 15144 13f05e3b8 15142->15144 15146 13f05e39a 15143->15146 15147 13f05e3a9 GetLastError 15143->15147 15148 13f05e3db PeekNamedPipe 15144->15148 15155 13f05e379 15144->15155 15149 13f05e600 23 API calls 15145->15149 15153 13f05e2f0 memcpy_s 15145->15153 15151 13f05deb4 _get_daylight 13 API calls 15146->15151 15152 13f05de44 _fread_nolock 13 API calls 15147->15152 15148->15155 15149->15153 15150 13f05e311 GetFileInformationByHandle 15150->15147 15154 13f05e326 15150->15154 15151->15155 15152->15155 15153->15150 15153->15155 15157 13f05e4c4 34 API calls 15154->15157 15156 13f058680 _wfindfirst32i64 8 API calls 15155->15156 15158 13f05e414 15156->15158 15159 13f05e331 15157->15159 15158->15106 15204 13f05e42c 15159->15204 15162 13f05e42c 10 API calls 15163 13f05e350 15162->15163 15164 13f05e42c 10 API calls 15163->15164 15165 13f05e361 15164->15165 15165->15155 15166 13f05deb4 _get_daylight 13 API calls 15165->15166 15166->15155 15168 13f05e73e 15167->15168 15170 13f05deb4 _get_daylight 13 API calls 15168->15170 15185 13f05e7e1 15168->15185 15169 13f058680 _wfindfirst32i64 8 API calls 15171 13f05e207 15169->15171 15172 13f05e752 15170->15172 15171->15108 15171->15109 15173 13f05deb4 _get_daylight 13 API calls 15172->15173 15174 13f05e759 15173->15174 15175 13f05ed58 39 API calls 15174->15175 15176 13f05e76f 15175->15176 15177 13f05deb4 _get_daylight 13 API calls 15176->15177 15179 13f05e777 15177->15179 15178 13f05e7d6 15182 13f05a4f8 __vcrt_freefls 14 API calls 15178->15182 15179->15178 15180 13f05deb4 _get_daylight 13 API calls 15179->15180 15184 13f05e77c 15179->15184 15181 13f05e78a 15180->15181 15183 13f05ed58 39 API calls 15181->15183 15182->15185 15183->15184 15184->15178 15186 13f05e7c4 GetDriveTypeW 15184->15186 15185->15169 15186->15178 15188 13f05e4ec 15187->15188 15196 13f05e224 15188->15196 15211 13f067aa0 15188->15211 15190 13f05e580 15191 13f067aa0 34 API calls 15190->15191 15190->15196 15192 13f05e593 15191->15192 15193 13f067aa0 34 API calls 15192->15193 15192->15196 15194 13f05e5a6 15193->15194 15195 13f067aa0 34 API calls 15194->15195 15194->15196 15195->15196 15197 13f05e600 15196->15197 15198 13f05e61a 15197->15198 15199 13f05e652 15198->15199 15200 13f05e62a 15198->15200 15201 13f067934 23 API calls 15199->15201 15202 13f05de44 _fread_nolock 13 API calls 15200->15202 15203 13f05e63a 15200->15203 15201->15203 15202->15203 15203->15115 15205 13f05e458 FileTimeToSystemTime 15204->15205 15206 13f05e44b 15204->15206 15207 13f05e453 15205->15207 15208 13f05e46a SystemTimeToTzSpecificLocalTime 15205->15208 15206->15205 15206->15207 15209 13f058680 _wfindfirst32i64 8 API calls 15207->15209 15208->15207 15210 13f05e340 15209->15210 15210->15162 15212 13f067aad 15211->15212 15213 13f067ad1 15211->15213 15212->15213 15214 13f067ab2 15212->15214 15215 13f067b0b 15213->15215 15218 13f067b2a 15213->15218 15216 13f05deb4 _get_daylight 13 API calls 15214->15216 15217 13f05deb4 _get_daylight 13 API calls 15215->15217 15219 13f067ab7 15216->15219 15220 13f067b10 15217->15220 15221 13f05be30 33 API calls 15218->15221 15222 13f063618 _invalid_parameter_noinfo 30 API calls 15219->15222 15223 13f063618 _invalid_parameter_noinfo 30 API calls 15220->15223 15226 13f067b37 15221->15226 15224 13f067ac2 15222->15224 15225 13f067b1b 15223->15225 15224->15190 15225->15190 15226->15225 15227 13f06d3f8 34 API calls 15226->15227 15227->15226 15229 13f05a605 15228->15229 15230 13f05a615 15228->15230 15231 13f05deb4 _get_daylight 13 API calls 15229->15231 15230->15073 15232 13f05a60a 15231->15232 15233 13f063618 _invalid_parameter_noinfo 30 API calls 15232->15233 15233->15230 15235 13f060ff0 15234->15235 15236 13f06102d 15235->15236 15237 13f06100c 15235->15237 15253 13f05b590 EnterCriticalSection 15236->15253 15238 13f05deb4 _get_daylight 13 API calls 15237->15238 15240 13f061011 15238->15240 15242 13f063618 _invalid_parameter_noinfo 30 API calls 15240->15242 15244 13f06101b 15242->15244 15244->15063 15255 13f060a54 15254->15255 15266 13f060b07 memcpy_s 15254->15266 15256 13f060b17 15255->15256 15258 13f060a6b 15255->15258 15262 13f066b18 _invalid_parameter_noinfo 13 API calls 15256->15262 15256->15266 15257 13f05deb4 _get_daylight 13 API calls 15259 13f054b80 15257->15259 15290 13f068a68 EnterCriticalSection 15258->15290 15259->14000 15263 13f060b33 15262->15263 15263->15266 15268 13f063738 _fread_nolock 14 API calls 15263->15268 15266->15257 15266->15259 15268->15266 15273 13f054bf3 15272->15273 15274 13f0628ad 15272->15274 15278 13f0605e0 15273->15278 15275 13f05deb4 _get_daylight 13 API calls 15274->15275 15276 13f0628b2 15275->15276 15277 13f063618 _invalid_parameter_noinfo 30 API calls 15276->15277 15277->15273 15279 13f0605e9 15278->15279 15282 13f0605fe 15278->15282 15280 13f05de94 _fread_nolock 13 API calls 15279->15280 15281 13f0605ee 15280->15281 15284 13f05deb4 _get_daylight 13 API calls 15281->15284 15283 13f05de94 _fread_nolock 13 API calls 15282->15283 15286 13f0605f6 15282->15286 15285 13f060639 15283->15285 15284->15286 15287 13f05deb4 _get_daylight 13 API calls 15285->15287 15286->14010 15288 13f060641 15287->15288 15289 13f063618 _invalid_parameter_noinfo 30 API calls 15288->15289 15289->15286 15318 13f054ee9 15317->15318 15322 13f054ee0 15317->15322 15320 13f054f0f MultiByteToWideChar 15318->15320 15318->15322 15319 13f051c80 16 API calls 15323 13f054f45 15319->15323 15321 13f054f47 LoadLibraryA GetProcAddress GetProcAddress 15320->15321 15320->15322 15324 13f054f86 15321->15324 15325 13f055018 15321->15325 15322->15319 15323->15321 15324->15325 15326 13f05a4f8 __vcrt_freefls 14 API calls 15324->15326 15325->14086 15327 13f054fd5 15326->15327 15328 13f055030 16 API calls 15327->15328 15329 13f054fef 15327->15329 15328->15325 15329->14086 15331 13f053a40 15330->15331 15332 13f053a7b 15331->15332 15335 13f053a9b 15331->15335 15333 13f051dd0 18 API calls 15332->15333 15334 13f053a91 15333->15334 15337 13f058680 _wfindfirst32i64 8 API calls 15334->15337 15336 13f053ada 15335->15336 15338 13f053af2 15335->15338 15342 13f051dd0 18 API calls 15335->15342 15420 13f052dc0 15336->15420 15344 13f05256a 15337->15344 15339 13f053b29 15338->15339 15340 13f051dd0 18 API calls 15338->15340 15341 13f054cf0 31 API calls 15339->15341 15340->15339 15345 13f053b36 15341->15345 15342->15336 15344->14116 15352 13f053db0 15344->15352 15347 13f053b5d 15345->15347 15348 13f053b3b 15345->15348 15431 13f052f70 GetProcAddress 15347->15431 15349 13f051c80 16 API calls 15348->15349 15349->15334 15353 13f0554b0 16 API calls 15352->15353 15354 13f053dcf 15353->15354 15355 13f053dd4 15354->15355 15356 13f053deb 15354->15356 15357 13f051dd0 18 API calls 15355->15357 15359 13f0554b0 16 API calls 15356->15359 15358 13f053de0 15357->15358 15358->14098 15360 13f053e19 15359->15360 15363 13f053ec0 15360->15363 15364 13f053e9b 15360->15364 15376 13f053e1e 15360->15376 15361 13f051dd0 18 API calls 15362 13f053f95 15361->15362 15362->14098 15366 13f0554b0 16 API calls 15363->15366 15365 13f051dd0 18 API calls 15364->15365 15367 13f053eb0 15365->15367 15368 13f053ed9 15366->15368 15367->14098 15368->15376 15529 13f053b90 15368->15529 15372 13f053f62 15374 13f05a4f8 __vcrt_freefls 14 API calls 15372->15374 15373 13f053f2a 15373->15372 15375 13f05a4f8 __vcrt_freefls 14 API calls 15373->15375 15373->15376 15374->15376 15375->15373 15376->15361 15377 13f053f7e 15376->15377 15377->14098 15379 13f0537c7 15378->15379 15379->15379 15380 13f0537e9 15379->15380 15388 13f053800 15379->15388 15381 13f051dd0 18 API calls 15380->15381 15382 13f0537f5 15381->15382 15382->14101 15383 13f05390b 15383->14101 15384 13f0516e0 18 API calls 15384->15388 15385 13f0512a0 105 API calls 15385->15388 15386 13f051dd0 18 API calls 15386->15388 15387 13f05a4f8 __vcrt_freefls 14 API calls 15387->15388 15388->15383 15388->15384 15388->15385 15388->15386 15388->15387 15391 13f0525a5 15389->15391 15392 13f05394b 15389->15392 15390 13f0516e0 18 API calls 15390->15392 15391->14104 15391->14105 15391->14116 15392->15390 15392->15391 15393 13f051dd0 18 API calls 15392->15393 15393->15392 15395 13f0512b6 15394->15395 15396 13f0512e8 15394->15396 15397 13f052e30 98 API calls 15395->15397 15400 13f0512fe 15396->15400 15401 13f05131f 15396->15401 15398 13f0512c6 15397->15398 15398->15396 15399 13f0512ce 15398->15399 15403 13f051b30 40 API calls 15400->15403 15406 13f051354 15401->15406 15407 13f051334 15401->15407 15421 13f052dca 15420->15421 15422 13f0554b0 16 API calls 15421->15422 15423 13f052df2 15422->15423 15424 13f058680 _wfindfirst32i64 8 API calls 15423->15424 15425 13f052e1a 15424->15425 15425->15338 15426 13f054cf0 15425->15426 15427 13f0554b0 16 API calls 15426->15427 15428 13f054d07 LoadLibraryExW 15427->15428 15429 13f05a4f8 __vcrt_freefls 14 API calls 15428->15429 15430 13f054d24 15429->15430 15430->15338 15432 13f052fb0 GetProcAddress 15431->15432 15440 13f052f92 15431->15440 15433 13f052fd5 GetProcAddress 15432->15433 15432->15440 15434 13f052ffa GetProcAddress 15433->15434 15433->15440 15436 13f053022 GetProcAddress 15434->15436 15434->15440 15435 13f051c80 16 API calls 15437 13f052fa5 15435->15437 15438 13f05304a GetProcAddress 15436->15438 15436->15440 15437->15334 15439 13f053072 GetProcAddress 15438->15439 15438->15440 15439->15440 15441 13f05309a GetProcAddress 15439->15441 15440->15435 15442 13f0530b6 15441->15442 15443 13f0530c2 GetProcAddress 15441->15443 15442->15443 15444 13f0530de 15443->15444 15445 13f0530ea GetProcAddress 15443->15445 15444->15445 15446 13f053106 15445->15446 15447 13f053112 GetProcAddress 15445->15447 15446->15447 15448 13f05312e 15447->15448 15449 13f05313a GetProcAddress 15447->15449 15448->15449 15450 13f053156 15449->15450 15451 13f053162 GetProcAddress 15449->15451 15450->15451 15452 13f05317e 15451->15452 15453 13f05318a GetProcAddress 15451->15453 15452->15453 15454 13f0531a6 15453->15454 15455 13f0531b2 GetProcAddress 15453->15455 15454->15455 15456 13f0531ce 15455->15456 15457 13f0531da GetProcAddress 15455->15457 15456->15457 15458 13f0531f6 15457->15458 15459 13f053202 GetProcAddress 15457->15459 15458->15459 15460 13f05321e 15459->15460 15461 13f05322a GetProcAddress 15459->15461 15460->15461 15462 13f053246 15461->15462 15463 13f053252 GetProcAddress 15461->15463 15462->15463 15464 13f05326e 15463->15464 15533 13f053baa mbstowcs 15529->15533 15530 13f058680 _wfindfirst32i64 8 API calls 15532 13f053d75 15530->15532 15531 13f0516e0 18 API calls 15531->15533 15555 13f0556b0 15532->15555 15533->15531 15534 13f053cb8 15533->15534 15536 13f053d8e 15533->15536 15554 13f053d56 15533->15554 15535 13f0628a4 _fread_nolock 30 API calls 15534->15535 15534->15554 15537 13f053ccf 15535->15537 15539 13f051dd0 18 API calls 15536->15539 15566 13f05f170 15537->15566 15539->15554 15540 13f053cdb 15541 13f0628a4 _fread_nolock 30 API calls 15540->15541 15554->15530 15557 13f0556cf 15555->15557 15556 13f0556d7 15556->15373 15557->15556 15558 13f055720 MultiByteToWideChar 15557->15558 15559 13f0557ac 15557->15559 15560 13f055768 MultiByteToWideChar 15557->15560 15558->15557 15558->15559 15561 13f051c80 16 API calls 15559->15561 15560->15557 15560->15559 15562 13f0557d8 15561->15562 15563 13f0557f1 15562->15563 15565 13f05a4f8 __vcrt_freefls 14 API calls 15562->15565 15565->15562 15567 13f05f1c9 15566->15567 15568 13f05f199 15566->15568 15569 13f05f1ce 15567->15569 15570 13f05f1db 15567->15570 15568->15567 15576 13f05f1b9 15568->15576 15571 13f05deb4 _get_daylight 13 API calls 15569->15571 15572 13f05f244 15570->15572 15575 13f05f20b 15570->15575 15578 13f05f1d3 15571->15578 15573 13f05deb4 _get_daylight 13 API calls 15572->15573 15574 13f05f1be 15573->15574 15580 13f063618 _invalid_parameter_noinfo 30 API calls 15574->15580 15591 13f0602d4 EnterCriticalSection 15575->15591 15579 13f05deb4 _get_daylight 13 API calls 15576->15579 15578->15540 15579->15574 15580->15578 15612 13f06699c 33 API calls 15611->15612 15614 13f06280d 15612->15614 15613 13f06292c 33 API calls 15615 13f062823 15613->15615 15614->15613 15616 13f059d98 15623 13f05a064 15616->15623 15619 13f059da5 15635 13f05a348 15623->15635 15626 13f059da1 15626->15619 15628 13f059ff8 15626->15628 15627 13f05a098 __vcrt_uninitialize_locks DeleteCriticalSection 15627->15626 15640 13f05a21c 15628->15640 15636 13f05a0d0 __vcrt_FlsAlloc 5 API calls 15635->15636 15637 13f05a37e 15636->15637 15638 13f05a393 InitializeCriticalSectionAndSpinCount 15637->15638 15639 13f05a07c 15637->15639 15638->15639 15639->15626 15639->15627 15641 13f05a0d0 __vcrt_FlsAlloc 5 API calls 15640->15641 15642 13f05a241 TlsAlloc 15641->15642 16961 13f0606a0 16966 13f068a68 EnterCriticalSection 16961->16966 16112 13f071b1b 16113 13f071b2a 16112->16113 16115 13f071b34 16112->16115 16116 13f068abc LeaveCriticalSection 16113->16116 16117 13f06681c 16118 13f066821 16117->16118 16119 13f066836 16117->16119 16123 13f06683c 16118->16123 16124 13f06687e 16123->16124 16125 13f066886 16123->16125 16126 13f0636f8 __free_lconv_mon 13 API calls 16124->16126 16127 13f0636f8 __free_lconv_mon 13 API calls 16125->16127 16126->16125 16128 13f066893 16127->16128 16129 13f0636f8 __free_lconv_mon 13 API calls 16128->16129 16130 13f0668a0 16129->16130 16131 13f0636f8 __free_lconv_mon 13 API calls 16130->16131 16132 13f0668ad 16131->16132 16133 13f0636f8 __free_lconv_mon 13 API calls 16132->16133 16134 13f0668ba 16133->16134 16135 13f0636f8 __free_lconv_mon 13 API calls 16134->16135 16136 13f0668c7 16135->16136 16137 13f0636f8 __free_lconv_mon 13 API calls 16136->16137 16138 13f0668d4 16137->16138 16139 13f0636f8 __free_lconv_mon 13 API calls 16138->16139 16140 13f0668e1 16139->16140 16141 13f0636f8 __free_lconv_mon 13 API calls 16140->16141 16142 13f0668f1 16141->16142 16143 13f0636f8 __free_lconv_mon 13 API calls 16142->16143 16144 13f066901 16143->16144 16149 13f0666ec 16144->16149 16163 13f068a68 EnterCriticalSection 16149->16163 13341 13f056e28 13342 13f056167 13341->13342 13344 13f0561e3 13342->13344 13345 13f057380 13342->13345 13346 13f0573a5 13345->13346 13347 13f0573bb memcpy_s 13345->13347 13349 13f063738 13346->13349 13347->13344 13350 13f063783 13349->13350 13354 13f063747 _invalid_parameter_noinfo 13349->13354 13351 13f05deb4 _get_daylight 13 API calls 13350->13351 13353 13f063781 13351->13353 13352 13f06376a RtlAllocateHeap 13352->13353 13352->13354 13353->13347 13354->13350 13354->13352 13355 13f06b7dc _invalid_parameter_noinfo 2 API calls 13354->13355 13355->13354 16172 13f05592d 16173 13f055935 16172->16173 16174 13f057380 14 API calls 16173->16174 16175 13f0561e3 16173->16175 16174->16175 15871 13f05a9ac 15872 13f05a9f1 15871->15872 15873 13f05a9ce 15871->15873 15872->15873 15875 13f05a9f6 15872->15875 15874 13f05deb4 _get_daylight 13 API calls 15873->15874 15876 13f05a9d3 15874->15876 15884 13f05b590 EnterCriticalSection 15875->15884 15878 13f063618 _invalid_parameter_noinfo 30 API calls 15876->15878 15880 13f05a9de 15878->15880 17170 13f0621b8 17173 13f06213c 17170->17173 17180 13f068a68 EnterCriticalSection 17173->17180 16176 13f05b534 16177 13f05b53f 16176->16177 16185 13f0661d0 16177->16185 16198 13f068a68 EnterCriticalSection 16185->16198 15885 13f05abbc 15886 13f05abf2 15885->15886 15887 13f05abd3 15885->15887 15897 13f05b590 EnterCriticalSection 15886->15897 15888 13f05deb4 _get_daylight 13 API calls 15887->15888 15890 13f05abd8 15888->15890 15893 13f063618 _invalid_parameter_noinfo 30 API calls 15890->15893 15895 13f05abe3 15893->15895 13191 13f0647c8 13192 13f0647f1 13191->13192 13193 13f064809 13191->13193 13216 13f05de94 13192->13216 13195 13f064883 13193->13195 13200 13f06483a 13193->13200 13197 13f05de94 _fread_nolock 13 API calls 13195->13197 13199 13f064888 13197->13199 13201 13f05deb4 _get_daylight 13 API calls 13199->13201 13215 13f0602d4 EnterCriticalSection 13200->13215 13203 13f064890 13201->13203 13222 13f063618 13203->13222 13214 13f0647fe 13225 13f066b18 GetLastError 13216->13225 13218 13f05de9d 13219 13f05deb4 13218->13219 13220 13f066b18 _invalid_parameter_noinfo 13 API calls 13219->13220 13221 13f05debd 13220->13221 13221->13214 13307 13f063568 13222->13307 13226 13f066b3a 13225->13226 13229 13f066b3f 13225->13229 13248 13f065f2c 13226->13248 13231 13f066b47 SetLastError 13229->13231 13252 13f065f74 13229->13252 13231->13218 13235 13f066b93 13237 13f065f74 _invalid_parameter_noinfo 6 API calls 13235->13237 13236 13f066b83 13238 13f065f74 _invalid_parameter_noinfo 6 API calls 13236->13238 13240 13f066b9b 13237->13240 13239 13f066b8a 13238->13239 13264 13f0636f8 13239->13264 13241 13f066bb1 13240->13241 13242 13f066b9f 13240->13242 13269 13f06674c 13241->13269 13244 13f065f74 _invalid_parameter_noinfo 6 API calls 13242->13244 13244->13239 13274 13f065b5c 13248->13274 13253 13f065b5c try_get_function 5 API calls 13252->13253 13254 13f065fa2 13253->13254 13255 13f065fb4 TlsSetValue 13254->13255 13256 13f065fac 13254->13256 13255->13256 13256->13231 13257 13f063680 13256->13257 13263 13f063691 _invalid_parameter_noinfo 13257->13263 13258 13f0636e2 13260 13f05deb4 _get_daylight 12 API calls 13258->13260 13259 13f0636c6 RtlAllocateHeap 13261 13f0636e0 13259->13261 13259->13263 13260->13261 13261->13235 13261->13236 13263->13258 13263->13259 13284 13f06b7dc 13263->13284 13265 13f0636fd HeapFree 13264->13265 13267 13f06372f 13264->13267 13266 13f063718 13265->13266 13265->13267 13268 13f05deb4 _get_daylight 12 API calls 13266->13268 13267->13231 13268->13267 13293 13f066624 13269->13293 13275 13f065bbd TlsGetValue 13274->13275 13282 13f065bb8 try_get_function 13274->13282 13276 13f065bec LoadLibraryExW 13278 13f065c0d GetLastError 13276->13278 13276->13282 13277 13f065ca0 13277->13275 13279 13f065cae GetProcAddress 13277->13279 13278->13282 13280 13f065cbf 13279->13280 13280->13275 13281 13f065c85 FreeLibrary 13281->13282 13282->13275 13282->13276 13282->13277 13282->13281 13283 13f065c47 LoadLibraryExW 13282->13283 13283->13282 13287 13f06b80c 13284->13287 13292 13f068a68 EnterCriticalSection 13287->13292 13305 13f068a68 EnterCriticalSection 13293->13305 13308 13f066b18 _invalid_parameter_noinfo 13 API calls 13307->13308 13309 13f06358d 13308->13309 13310 13f06359e 13309->13310 13315 13f063638 IsProcessorFeaturePresent 13309->13315 13310->13214 13316 13f06364b 13315->13316 13319 13f063404 13316->13319 13320 13f06343e __scrt_fastfail memcpy_s 13319->13320 13321 13f063466 RtlCaptureContext RtlLookupFunctionEntry 13320->13321 13322 13f0634d6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13321->13322 13323 13f0634a0 RtlVirtualUnwind 13321->13323 13324 13f063528 __scrt_fastfail 13322->13324 13323->13322 13327 13f058680 13324->13327 13328 13f05868a 13327->13328 13329 13f058696 GetCurrentProcess TerminateProcess 13328->13329 13330 13f058944 IsProcessorFeaturePresent 13328->13330 13331 13f05895b 13330->13331 13336 13f058b38 RtlCaptureContext 13331->13336 13337 13f058b52 RtlLookupFunctionEntry 13336->13337 13338 13f058b68 RtlVirtualUnwind 13337->13338 13339 13f05896e 13337->13339 13338->13337 13338->13339 13340 13f058910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13339->13340 16208 13f069a44 16219 13f06f2fc 16208->16219 16220 13f06f327 16219->16220 16221 13f0636f8 __free_lconv_mon 13 API calls 16220->16221 16222 13f06f33f 16220->16222 16221->16220 16223 13f0636f8 __free_lconv_mon 13 API calls 16222->16223 16224 13f069a4d 16222->16224 16223->16222 16225 13f068a68 EnterCriticalSection 16224->16225 15750 13f067ccc 15751 13f067eb4 15750->15751 15753 13f067d0f _isindst 15750->15753 15752 13f05deb4 _get_daylight 13 API calls 15751->15752 15768 13f067ea6 15752->15768 15753->15751 15756 13f067d8b _isindst 15753->15756 15754 13f058680 _wfindfirst32i64 8 API calls 15755 13f067ecf 15754->15755 15771 13f06df4c 15756->15771 15761 13f067ee0 15763 13f063638 _wfindfirst32i64 17 API calls 15761->15763 15765 13f067ef4 15763->15765 15768->15754 15769 13f067de8 15769->15768 15795 13f06df8c 15769->15795 15772 13f06df5a 15771->15772 15776 13f067da9 15771->15776 15802 13f068a68 EnterCriticalSection 15772->15802 15777 13f06d518 15776->15777 15778 13f06d521 15777->15778 15782 13f067dbe 15777->15782 15779 13f05deb4 _get_daylight 13 API calls 15778->15779 15780 13f06d526 15779->15780 15781 13f063618 _invalid_parameter_noinfo 30 API calls 15780->15781 15781->15782 15782->15761 15783 13f06d548 15782->15783 15784 13f06d551 15783->15784 15788 13f067dcf 15783->15788 15785 13f05deb4 _get_daylight 13 API calls 15784->15785 15786 13f06d556 15785->15786 15787 13f063618 _invalid_parameter_noinfo 30 API calls 15786->15787 15787->15788 15788->15761 15789 13f06d578 15788->15789 15790 13f06d581 15789->15790 15792 13f067de0 15789->15792 15791 13f05deb4 _get_daylight 13 API calls 15790->15791 15793 13f06d586 15791->15793 15792->15761 15792->15769 15794 13f063618 _invalid_parameter_noinfo 30 API calls 15793->15794 15794->15792 15803 13f068a68 EnterCriticalSection 15795->15803 16226 13f071a57 16227 13f071a67 16226->16227 16230 13f05b59c LeaveCriticalSection 16227->16230 15644 13f061ce0 15645 13f061cf9 15644->15645 15646 13f061cf0 15644->15646 15646->15645 15650 13f06181c 15646->15650 15651 13f061835 15650->15651 15658 13f061831 15650->15658 15668 13f06acac GetEnvironmentStringsW 15651->15668 15654 13f061842 15656 13f0636f8 __free_lconv_mon 13 API calls 15654->15656 15656->15658 15658->15645 15660 13f061bb8 15658->15660 15659 13f0636f8 __free_lconv_mon 13 API calls 15659->15654 15661 13f061bd3 15660->15661 15666 13f061be6 15660->15666 15661->15645 15662 13f063680 _invalid_parameter_noinfo 13 API calls 15662->15666 15663 13f061c5c 15664 13f0636f8 __free_lconv_mon 13 API calls 15663->15664 15664->15661 15665 13f067c10 MultiByteToWideChar _fread_nolock 15665->15666 15666->15661 15666->15662 15666->15663 15666->15665 15667 13f0636f8 __free_lconv_mon 13 API calls 15666->15667 15667->15666 15669 13f06183a 15668->15669 15670 13f06acd0 15668->15670 15669->15654 15675 13f06198c 15669->15675 15671 13f063738 _fread_nolock 14 API calls 15670->15671 15673 13f06ad0a memcpy_s 15671->15673 15672 13f0636f8 __free_lconv_mon 13 API calls 15674 13f06ad2a FreeEnvironmentStringsW 15672->15674 15673->15672 15674->15669 15676 13f0619b4 15675->15676 15677 13f063680 _invalid_parameter_noinfo 13 API calls 15676->15677 15687 13f0619ef 15677->15687 15678 13f061a64 15679 13f0636f8 __free_lconv_mon 13 API calls 15678->15679 15680 13f06184f 15679->15680 15680->15659 15681 13f063680 _invalid_parameter_noinfo 13 API calls 15681->15687 15682 13f061a55 15701 13f061aa0 15682->15701 15686 13f0636f8 __free_lconv_mon 13 API calls 15686->15678 15687->15678 15687->15681 15687->15682 15688 13f061a8c 15687->15688 15689 13f0636f8 __free_lconv_mon 13 API calls 15687->15689 15692 13f068bf8 15687->15692 15690 13f063638 _wfindfirst32i64 17 API calls 15688->15690 15689->15687 15691 13f061a9e 15690->15691 15693 13f068c05 15692->15693 15694 13f068c0f 15692->15694 15693->15694 15698 13f068c2b 15693->15698 15695 13f05deb4 _get_daylight 13 API calls 15694->15695 15700 13f068c17 15695->15700 15696 13f063618 _invalid_parameter_noinfo 30 API calls 15697 13f068c23 15696->15697 15697->15687 15698->15697 15699 13f05deb4 _get_daylight 13 API calls 15698->15699 15699->15700 15700->15696 15702 13f061aa5 15701->15702 15703 13f061a5d 15701->15703 15704 13f061ace 15702->15704 15705 13f0636f8 __free_lconv_mon 13 API calls 15702->15705 15703->15686 15706 13f0636f8 __free_lconv_mon 13 API calls 15704->15706 15705->15702 15706->15703 16231 13f068c60 16232 13f068c84 16231->16232 16235 13f068c98 16231->16235 16233 13f05deb4 _get_daylight 13 API calls 16232->16233 16234 13f068c89 16233->16234 16236 13f068f32 16235->16236 16238 13f068cdb 16235->16238 16331 13f0692a4 16235->16331 16237 13f05deb4 _get_daylight 13 API calls 16236->16237 16274 13f068d67 16237->16274 16240 13f068d37 16238->16240 16241 13f068d01 16238->16241 16248 13f068d2b 16238->16248 16244 13f063680 _invalid_parameter_noinfo 13 API calls 16240->16244 16240->16274 16346 13f061ca4 16241->16346 16242 13f068de5 16249 13f068e02 16242->16249 16255 13f068e54 16242->16255 16247 13f068d4d 16244->16247 16252 13f0636f8 __free_lconv_mon 13 API calls 16247->16252 16248->16242 16248->16274 16352 13f06f04c 16248->16352 16254 13f0636f8 __free_lconv_mon 13 API calls 16249->16254 16250 13f0636f8 __free_lconv_mon 13 API calls 16250->16234 16251 13f068d0f 16251->16248 16257 13f0692a4 33 API calls 16251->16257 16253 13f068d5b 16252->16253 16253->16248 16259 13f063680 _invalid_parameter_noinfo 13 API calls 16253->16259 16253->16274 16256 13f068e0b 16254->16256 16258 13f06b658 33 API calls 16255->16258 16255->16274 16266 13f068e10 16256->16266 16388 13f06b658 16256->16388 16257->16248 16260 13f068e8f 16258->16260 16261 13f068d86 16259->16261 16262 13f0636f8 __free_lconv_mon 13 API calls 16260->16262 16264 13f0636f8 __free_lconv_mon 13 API calls 16261->16264 16262->16266 16264->16248 16265 13f068e3c 16267 13f0636f8 __free_lconv_mon 13 API calls 16265->16267 16266->16266 16268 13f063680 _invalid_parameter_noinfo 13 API calls 16266->16268 16266->16274 16267->16266 16269 13f068ed9 16268->16269 16270 13f068f20 16269->16270 16271 13f0628cc 30 API calls 16269->16271 16272 13f0636f8 __free_lconv_mon 13 API calls 16270->16272 16273 13f068ef0 16271->16273 16272->16274 16275 13f068ef4 16273->16275 16276 13f068f6b 16273->16276 16274->16250 16397 13f06f164 16275->16397 16278 13f063638 _wfindfirst32i64 17 API calls 16276->16278 16280 13f068f7f 16278->16280 16281 13f068fa8 16280->16281 16285 13f068fbc 16280->16285 16283 13f05deb4 _get_daylight 13 API calls 16281->16283 16282 13f05deb4 _get_daylight 13 API calls 16282->16270 16284 13f068fad 16283->16284 16286 13f06924f 16285->16286 16288 13f068ffb 16285->16288 16416 13f06938c 16285->16416 16287 13f05deb4 _get_daylight 13 API calls 16286->16287 16292 13f069086 16287->16292 16290 13f069055 16288->16290 16293 13f069023 16288->16293 16300 13f069049 16288->16300 16290->16292 16296 13f063680 _invalid_parameter_noinfo 13 API calls 16290->16296 16311 13f06907d 16290->16311 16291 13f069104 16298 13f069174 16291->16298 16304 13f069121 16291->16304 16302 13f0636f8 __free_lconv_mon 13 API calls 16292->16302 16431 13f061ce0 16293->16431 16301 13f06906f 16296->16301 16297 13f063680 _invalid_parameter_noinfo 13 API calls 16303 13f0690a8 16297->16303 16298->16292 16312 13f06b658 33 API calls 16298->16312 16300->16291 16300->16292 16437 13f06ef0c 16300->16437 16306 13f0636f8 __free_lconv_mon 13 API calls 16301->16306 16302->16284 16307 13f0636f8 __free_lconv_mon 13 API calls 16303->16307 16308 13f0636f8 __free_lconv_mon 13 API calls 16304->16308 16305 13f069031 16305->16300 16309 13f06938c 33 API calls 16305->16309 16306->16311 16307->16300 16310 13f06912a 16308->16310 16309->16300 16315 13f06b658 33 API calls 16310->16315 16317 13f069130 16310->16317 16311->16292 16311->16297 16311->16300 16313 13f0691b0 16312->16313 16314 13f0636f8 __free_lconv_mon 13 API calls 16313->16314 16314->16317 16316 13f06915c 16315->16316 16318 13f0636f8 __free_lconv_mon 13 API calls 16316->16318 16317->16292 16317->16317 16319 13f063680 _invalid_parameter_noinfo 13 API calls 16317->16319 16318->16317 16320 13f0691fb 16319->16320 16321 13f06923d 16320->16321 16323 13f068bf8 _wfindfirst32i64 30 API calls 16320->16323 16322 13f0636f8 __free_lconv_mon 13 API calls 16321->16322 16322->16292 16324 13f069211 16323->16324 16325 13f069215 SetEnvironmentVariableW 16324->16325 16326 13f06928d 16324->16326 16325->16321 16328 13f069238 16325->16328 16327 13f063638 _wfindfirst32i64 17 API calls 16326->16327 16329 13f0692a1 16327->16329 16330 13f05deb4 _get_daylight 13 API calls 16328->16330 16330->16321 16332 13f0692d9 16331->16332 16339 13f0692c1 16331->16339 16333 13f063680 _invalid_parameter_noinfo 13 API calls 16332->16333 16334 13f0692fd 16333->16334 16336 13f06935e 16334->16336 16340 13f063680 _invalid_parameter_noinfo 13 API calls 16334->16340 16341 13f0636f8 __free_lconv_mon 13 API calls 16334->16341 16342 13f0628cc 30 API calls 16334->16342 16343 13f06936d 16334->16343 16345 13f069382 16334->16345 16335 13f06292c 33 API calls 16337 13f069388 16335->16337 16338 13f0636f8 __free_lconv_mon 13 API calls 16336->16338 16338->16339 16339->16238 16340->16334 16341->16334 16342->16334 16344 13f063638 _wfindfirst32i64 17 API calls 16343->16344 16344->16345 16345->16335 16347 13f061cb4 16346->16347 16348 13f061cbd 16346->16348 16347->16348 16461 13f0617b0 16347->16461 16348->16236 16348->16251 16353 13f06e1ec 16352->16353 16354 13f06f059 16352->16354 16356 13f06e1f9 16353->16356 16357 13f06e22f 16353->16357 16355 13f05be30 33 API calls 16354->16355 16359 13f06f08d 16355->16359 16360 13f05deb4 _get_daylight 13 API calls 16356->16360 16375 13f06e1a0 16356->16375 16358 13f06e259 16357->16358 16366 13f06e27e 16357->16366 16361 13f05deb4 _get_daylight 13 API calls 16358->16361 16362 13f06f092 16359->16362 16365 13f06f0a3 16359->16365 16369 13f06f0ba 16359->16369 16363 13f06e203 16360->16363 16364 13f06e25e 16361->16364 16362->16248 16367 13f063618 _invalid_parameter_noinfo 30 API calls 16363->16367 16368 13f063618 _invalid_parameter_noinfo 30 API calls 16364->16368 16370 13f05deb4 _get_daylight 13 API calls 16365->16370 16372 13f05be30 33 API calls 16366->16372 16377 13f06e269 16366->16377 16371 13f06e20e 16367->16371 16368->16377 16373 13f06f0d6 16369->16373 16374 13f06f0c4 16369->16374 16376 13f06f0a8 16370->16376 16371->16248 16372->16377 16379 13f06f0e7 16373->16379 16380 13f06f0fe 16373->16380 16378 13f05deb4 _get_daylight 13 API calls 16374->16378 16375->16248 16381 13f063618 _invalid_parameter_noinfo 30 API calls 16376->16381 16377->16248 16382 13f06f0c9 16378->16382 16510 13f06e23c 16379->16510 16519 13f070a40 16380->16519 16381->16362 16385 13f063618 _invalid_parameter_noinfo 30 API calls 16382->16385 16385->16362 16387 13f05deb4 _get_daylight 13 API calls 16387->16362 16389 13f06b697 16388->16389 16390 13f06b67a 16388->16390 16392 13f06b6a1 16389->16392 16554 13f06fb08 16389->16554 16390->16389 16391 13f06b688 16390->16391 16393 13f05deb4 _get_daylight 13 API calls 16391->16393 16561 13f06fb44 16392->16561 16396 13f06b68d memcpy_s 16393->16396 16396->16265 16398 13f05be30 33 API calls 16397->16398 16399 13f06f1ca 16398->16399 16400 13f065d84 5 API calls 16399->16400 16401 13f06f1d8 16399->16401 16400->16401 16402 13f05df7c 16 API calls 16401->16402 16403 13f06f230 16402->16403 16404 13f05be30 33 API calls 16403->16404 16405 13f06f2bc 16403->16405 16407 13f06f243 16404->16407 16406 13f06f2cd 16405->16406 16408 13f0636f8 __free_lconv_mon 13 API calls 16405->16408 16409 13f068f17 16406->16409 16411 13f0636f8 __free_lconv_mon 13 API calls 16406->16411 16410 13f065d84 5 API calls 16407->16410 16413 13f06f24c 16407->16413 16408->16406 16409->16270 16409->16282 16410->16413 16411->16409 16412 13f05df7c 16 API calls 16414 13f06f2a3 16412->16414 16413->16412 16414->16405 16415 13f06f2ab SetEnvironmentVariableW 16414->16415 16415->16405 16417 13f0693cc 16416->16417 16418 13f0693af 16416->16418 16419 13f063680 _invalid_parameter_noinfo 13 API calls 16417->16419 16418->16288 16426 13f0693f0 16419->16426 16420 13f069474 16422 13f06292c 33 API calls 16420->16422 16421 13f069451 16423 13f0636f8 __free_lconv_mon 13 API calls 16421->16423 16424 13f06947a 16422->16424 16423->16418 16425 13f063680 _invalid_parameter_noinfo 13 API calls 16425->16426 16426->16420 16426->16421 16426->16425 16427 13f0636f8 __free_lconv_mon 13 API calls 16426->16427 16428 13f068bf8 _wfindfirst32i64 30 API calls 16426->16428 16429 13f069460 16426->16429 16427->16426 16428->16426 16430 13f063638 _wfindfirst32i64 17 API calls 16429->16430 16430->16420 16432 13f061cf9 16431->16432 16433 13f061cf0 16431->16433 16432->16286 16432->16305 16433->16432 16434 13f06181c 33 API calls 16433->16434 16435 13f061d02 16434->16435 16435->16432 16436 13f061bb8 14 API calls 16435->16436 16436->16432 16438 13f06ef19 16437->16438 16441 13f06ef46 16437->16441 16439 13f06ef1e 16438->16439 16438->16441 16440 13f05deb4 _get_daylight 13 API calls 16439->16440 16443 13f06ef23 16440->16443 16442 13f06ef8a 16441->16442 16445 13f06efa9 16441->16445 16459 13f06ef7e __crtLCMapStringW 16441->16459 16444 13f05deb4 _get_daylight 13 API calls 16442->16444 16446 13f063618 _invalid_parameter_noinfo 30 API calls 16443->16446 16447 13f06ef8f 16444->16447 16448 13f06efc5 16445->16448 16449 13f06efb3 16445->16449 16450 13f06ef2e 16446->16450 16451 13f063618 _invalid_parameter_noinfo 30 API calls 16447->16451 16453 13f05be30 33 API calls 16448->16453 16452 13f05deb4 _get_daylight 13 API calls 16449->16452 16450->16300 16451->16459 16455 13f06efb8 16452->16455 16454 13f06efd2 16453->16454 16454->16459 16573 13f070620 16454->16573 16456 13f063618 _invalid_parameter_noinfo 30 API calls 16455->16456 16456->16459 16459->16300 16460 13f05deb4 _get_daylight 13 API calls 16460->16459 16462 13f0617c5 16461->16462 16463 13f0617c9 16461->16463 16462->16348 16473 13f061ae4 16462->16473 16464 13f06a870 43 API calls 16463->16464 16465 13f0617ce 16464->16465 16481 13f06aba8 GetEnvironmentStringsW 16465->16481 16468 13f0617db 16471 13f0636f8 __free_lconv_mon 13 API calls 16468->16471 16471->16462 16472 13f0636f8 __free_lconv_mon 13 API calls 16472->16468 16474 13f061b03 16473->16474 16479 13f061b16 16473->16479 16474->16348 16475 13f063680 _invalid_parameter_noinfo 13 API calls 16475->16479 16476 13f061ba8 16478 13f0636f8 __free_lconv_mon 13 API calls 16476->16478 16477 13f0683ec WideCharToMultiByte 16477->16479 16478->16474 16479->16474 16479->16475 16479->16476 16479->16477 16480 13f0636f8 __free_lconv_mon 13 API calls 16479->16480 16480->16479 16482 13f06abd6 16481->16482 16492 13f06ac78 16481->16492 16485 13f0683ec WideCharToMultiByte 16482->16485 16483 13f06ac82 FreeEnvironmentStringsW 16484 13f0617d3 16483->16484 16484->16468 16493 13f061884 16484->16493 16486 13f06ac28 16485->16486 16487 13f063738 _fread_nolock 14 API calls 16486->16487 16486->16492 16488 13f06ac37 16487->16488 16489 13f06ac61 16488->16489 16490 13f0683ec WideCharToMultiByte 16488->16490 16491 13f0636f8 __free_lconv_mon 13 API calls 16489->16491 16490->16489 16491->16492 16492->16483 16492->16484 16495 13f0618ab 16493->16495 16494 13f063680 _invalid_parameter_noinfo 13 API calls 16506 13f0618e0 16494->16506 16495->16494 16496 13f06194f 16497 13f0636f8 __free_lconv_mon 13 API calls 16496->16497 16498 13f0617e8 16497->16498 16498->16472 16499 13f063680 _invalid_parameter_noinfo 13 API calls 16499->16506 16500 13f061940 16501 13f061aa0 13 API calls 16500->16501 16503 13f061948 16501->16503 16502 13f0628cc 30 API calls 16502->16506 16504 13f0636f8 __free_lconv_mon 13 API calls 16503->16504 16504->16496 16505 13f061977 16507 13f063638 _wfindfirst32i64 17 API calls 16505->16507 16506->16496 16506->16499 16506->16500 16506->16502 16506->16505 16508 13f0636f8 __free_lconv_mon 13 API calls 16506->16508 16509 13f061989 16507->16509 16508->16506 16511 13f06e270 16510->16511 16512 13f06e259 16510->16512 16511->16512 16516 13f06e27e 16511->16516 16513 13f05deb4 _get_daylight 13 API calls 16512->16513 16514 13f06e25e 16513->16514 16515 13f063618 _invalid_parameter_noinfo 30 API calls 16514->16515 16518 13f06e269 16515->16518 16517 13f05be30 33 API calls 16516->16517 16516->16518 16517->16518 16518->16362 16520 13f05be30 33 API calls 16519->16520 16521 13f070a65 16520->16521 16524 13f0706e0 16521->16524 16527 13f07072a 16524->16527 16525 13f058680 _wfindfirst32i64 8 API calls 16526 13f06f125 16525->16526 16526->16362 16526->16387 16528 13f0707b1 16527->16528 16530 13f07079c GetCPInfo 16527->16530 16535 13f0707b5 16527->16535 16529 13f067c10 _fread_nolock MultiByteToWideChar 16528->16529 16528->16535 16531 13f070849 16529->16531 16530->16528 16530->16535 16532 13f07087c 16531->16532 16533 13f063738 _fread_nolock 14 API calls 16531->16533 16531->16535 16534 13f067c10 _fread_nolock MultiByteToWideChar 16532->16534 16537 13f0709f9 16532->16537 16533->16532 16536 13f0708eb 16534->16536 16535->16525 16536->16537 16538 13f067c10 _fread_nolock MultiByteToWideChar 16536->16538 16537->16535 16539 13f0636f8 __free_lconv_mon 13 API calls 16537->16539 16540 13f070911 16538->16540 16539->16535 16540->16537 16541 13f063738 _fread_nolock 14 API calls 16540->16541 16544 13f07093a 16540->16544 16541->16544 16542 13f067c10 _fread_nolock MultiByteToWideChar 16543 13f0709ab 16542->16543 16545 13f0709dd 16543->16545 16548 13f065dc0 16543->16548 16544->16542 16544->16545 16545->16537 16546 13f0636f8 __free_lconv_mon 13 API calls 16545->16546 16546->16537 16549 13f065b5c try_get_function 5 API calls 16548->16549 16550 13f065dfe 16549->16550 16551 13f065e03 16550->16551 16552 13f066108 __crtLCMapStringW 5 API calls 16550->16552 16551->16545 16553 13f065e5f CompareStringW 16552->16553 16553->16551 16555 13f06fb11 16554->16555 16556 13f06fb2a HeapSize 16554->16556 16557 13f05deb4 _get_daylight 13 API calls 16555->16557 16558 13f06fb16 16557->16558 16559 13f063618 _invalid_parameter_noinfo 30 API calls 16558->16559 16560 13f06fb21 16559->16560 16560->16392 16562 13f06fb63 16561->16562 16563 13f06fb59 16561->16563 16565 13f06fb68 16562->16565 16571 13f06fb6f _invalid_parameter_noinfo 16562->16571 16564 13f063738 _fread_nolock 14 API calls 16563->16564 16569 13f06fb61 16564->16569 16568 13f0636f8 __free_lconv_mon 13 API calls 16565->16568 16566 13f06fb75 16570 13f05deb4 _get_daylight 13 API calls 16566->16570 16567 13f06fba2 HeapReAlloc 16567->16569 16567->16571 16568->16569 16569->16396 16570->16569 16571->16566 16571->16567 16572 13f06b7dc _invalid_parameter_noinfo 2 API calls 16571->16572 16572->16571 16575 13f070649 __crtLCMapStringW 16573->16575 16574 13f06f00e 16574->16459 16574->16460 16575->16574 16576 13f065dc0 6 API calls 16575->16576 16576->16574 15707 13f0570e0 15708 13f05710e 15707->15708 15709 13f0570f5 15707->15709 15709->15708 15711 13f063738 14 API calls 15709->15711 15710 13f057168 15711->15710 15712 13f061f5c 15713 13f061fc3 15712->15713 15714 13f061f79 GetModuleHandleW 15712->15714 15722 13f061e54 15713->15722 15714->15713 15720 13f061f86 15714->15720 15720->15713 15736 13f062064 GetModuleHandleExW 15720->15736 15742 13f068a68 EnterCriticalSection 15722->15742 15737 13f0620a9 15736->15737 15738 13f06208a GetProcAddress 15736->15738 15740 13f0620b3 FreeLibrary 15737->15740 15741 13f0620b9 15737->15741 15738->15737 15739 13f0620a1 15738->15739 15739->15737 15740->15741 15741->15713

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 222 13f06da94-13f06dac5 call 13f06d510 call 13f06d578 227 13f06dc84-13f06dcc6 call 13f063638 call 13f06d510 call 13f06d578 222->227 228 13f06dacb-13f06dad6 call 13f06d518 222->228 248 13f06de2d-13f06de9d call 13f063638 call 13f069910 227->248 249 13f06dccc-13f06dcd7 call 13f06d518 227->249 228->227 233 13f06dadc-13f06dae6 228->233 235 13f06dae8-13f06daee 233->235 236 13f06db0e-13f06db17 call 13f0636f8 233->236 239 13f06daf1-13f06dafc 235->239 247 13f06db1a-13f06db21 236->247 242 13f06db06-13f06db08 239->242 243 13f06dafe-13f06db04 239->243 242->236 246 13f06dc73-13f06dc83 242->246 243->239 243->242 247->247 250 13f06db23-13f06db43 call 13f063738 call 13f0636f8 247->250 267 13f06dea6-13f06dea9 248->267 268 13f06de9f-13f06dea4 248->268 249->248 257 13f06dcdd-13f06dce8 call 13f06d548 249->257 250->246 263 13f06db49-13f06db50 250->263 257->248 269 13f06dcee-13f06dd11 call 13f0636f8 GetTimeZoneInformation 257->269 263->263 266 13f06db52-13f06db60 call 13f0628cc 263->266 266->227 280 13f06db66-13f06db80 call 13f067860 266->280 272 13f06deb0-13f06dec0 call 13f063738 267->272 273 13f06deab-13f06deae 267->273 271 13f06def4-13f06df06 268->271 284 13f06dd17-13f06dd38 269->284 285 13f06de06-13f06de2c call 13f06d508 call 13f06d4f8 call 13f06d500 269->285 276 13f06df17 call 13f06dc9c 271->276 277 13f06df08-13f06df0b 271->277 289 13f06dec2 272->289 290 13f06decb-13f06dee6 call 13f069910 272->290 273->271 291 13f06df1c-13f06df48 call 13f0636f8 call 13f058680 276->291 277->276 281 13f06df0d-13f06df15 call 13f06da94 277->281 280->227 306 13f06db86-13f06db89 280->306 281->291 292 13f06dd43-13f06dd4a 284->292 293 13f06dd3a-13f06dd40 284->293 297 13f06dec4-13f06dec9 call 13f0636f8 289->297 309 13f06dee8-13f06deeb 290->309 310 13f06deed-13f06deef call 13f0636f8 290->310 300 13f06dd5e-13f06dd60 292->300 301 13f06dd4c-13f06dd54 292->301 293->292 297->273 304 13f06dd62-13f06dda3 call 13f06ad88 call 13f0683ec 300->304 301->300 303 13f06dd56-13f06dd5c 301->303 303->304 327 13f06dda5-13f06dda8 304->327 328 13f06ddb3-13f06ddb6 304->328 313 13f06db94-13f06dbb4 call 13f0633ac 306->313 314 13f06db8b-13f06db92 306->314 309->297 310->271 326 13f06dbb7-13f06dbba 313->326 314->306 314->313 329 13f06dbc5-13f06dbc8 326->329 330 13f06dbbc-13f06dbc3 326->330 327->328 331 13f06ddaa-13f06ddb1 327->331 332 13f06ddb9-13f06ddee call 13f0683ec 328->332 329->326 330->329 333 13f06dbca-13f06dbcd 330->333 331->332 344 13f06ddff-13f06de03 332->344 345 13f06ddf0-13f06ddf3 332->345 334 13f06dc28-13f06dc2c 333->334 335 13f06dbcf-13f06dbea call 13f0633ac 333->335 339 13f06dc33-13f06dc41 334->339 340 13f06dc2e-13f06dc30 334->340 347 13f06dc01-13f06dc03 335->347 348 13f06dbec 335->348 341 13f06dc43-13f06dc58 call 13f067860 339->341 342 13f06dc5c 339->342 340->339 341->227 355 13f06dc5a 341->355 349 13f06dc5f-13f06dc71 call 13f06d508 call 13f06d4f8 342->349 344->285 345->344 350 13f06ddf5-13f06ddfd 345->350 347->334 354 13f06dc05-13f06dc18 call 13f0633ac 347->354 352 13f06dbee-13f06dbf3 348->352 349->246 350->285 352->347 356 13f06dbf5-13f06dbff 352->356 362 13f06dc21-13f06dc26 354->362 355->349 356->347 356->352 362->334 363 13f06dc1a-13f06dc1c 362->363 363->334 364 13f06dc1e 363->364 364->362
                C-Code - Quality: 92%
                			E0000000113F06DA94(void* __ecx, void* __eflags, intOrPtr* __rax, signed int __rbx, signed char* __rcx, void* __r9, long long _a8, signed int _a16, signed int _a24) {
                				void* _t28;
                				signed int _t37;
                				signed int _t40;
                				intOrPtr _t41;
                				intOrPtr _t43;
                				void* _t44;
                				void* _t49;
                				void* _t50;
                				signed int _t66;
                				signed char* _t72;
                				signed char _t80;
                				intOrPtr _t92;
                				intOrPtr* _t94;
                				signed char* _t96;
                				signed int* _t97;
                				signed long long _t99;
                				intOrPtr* _t103;
                				char* _t104;
                				intOrPtr* _t105;
                				intOrPtr* _t106;
                				void* _t107;
                				intOrPtr* _t108;
                				signed char* _t113;
                				signed char* _t125;
                				void* _t137;
                				intOrPtr* _t138;
                
                				_t94 = __rax;
                				_a8 = __rbx;
                				E0000000113F06D510(_t28);
                				_a16 = _a16 & 0x00000000;
                				_a24 = _a24 & 0x00000000;
                				_t138 = _t94;
                				if (E0000000113F06D578(_t94,  &_a16) != 0) goto 0x3f06dc84;
                				if (E0000000113F06D518(_t94,  &_a24) != 0) goto 0x3f06dc84;
                				_t113 =  *0x3f092018;
                				_t72 = _t113;
                				if (_t72 == 0) goto 0x3f06db0e;
                				r9d = __rcx[_t113 - __rcx] & 0x000000ff;
                				if (_t72 != 0) goto 0x3f06db06;
                				_t96 =  &(__rcx[1]);
                				if (r9d != 0) goto 0x3f06daf1;
                				if (( *__rcx & 0x000000ff) - r9d == 0) goto 0x3f06dc73;
                				E0000000113F0636F8(_t96, _t113);
                				_t99 = __rbx | 0xffffffff;
                				if (__rcx[_t99 + 1] != 0) goto 0x3f06db1a;
                				E0000000113F063738(_t96, _t99 + 2);
                				 *0x3f092018 = _t96;
                				E0000000113F0636F8(_t96, _t99 + 2);
                				if ( *0x3f092018 == 0) goto 0x3f06dc73;
                				_t100 = _t99 + 1;
                				if (__rcx[_t99 + 1] != 0) goto 0x3f06db49;
                				if (E0000000113F0628CC(_t96,  *0x3f092018, _t99 + 2, __rcx) != 0) goto 0x3f06dc84;
                				_t12 =  &(_t96[3]); // 0x3
                				r13d = _t12;
                				r9d = r13d;
                				if (E0000000113F067860(_t96, _t100,  *_t138, _t99 + 2, __rcx, __r9) != 0) goto 0x3f06dc84;
                				_t80 =  *__rcx;
                				if (_t80 == 0) goto 0x3f06db94;
                				_t125 =  &(__rcx[1]);
                				if (_t80 != 0) goto 0x3f06db86;
                				sil =  *_t125;
                				_t103 =  !=  ? _t125 :  &(_t125[1]);
                				_t37 = E0000000113F0633AC(_t103);
                				dil = 0x30;
                				_a16 = _t37 * 0xe10;
                				if ( *_t103 == 0x2b) goto 0x3f06dbc5;
                				if ( *_t103 - dil - 9 > 0) goto 0x3f06dbca;
                				_t104 = _t103 + 1;
                				goto 0x3f06dbb7;
                				if ( *_t104 != 0x3a) goto 0x3f06dc28;
                				_t105 = _t104 + 1;
                				_t40 = E0000000113F0633AC(_t105);
                				_t41 =  *_t105;
                				_a16 = _a16 + _t40 * 0x3c;
                				if (_t41 - dil < 0) goto 0x3f06dc01;
                				if (_t41 - 0x39 > 0) goto 0x3f06dc01;
                				_t106 = _t105 + 1;
                				_t43 =  *_t106;
                				if (_t43 - dil >= 0) goto 0x3f06dbee;
                				if (_t43 != 0x3a) goto 0x3f06dc28;
                				_t107 = _t106 + 1;
                				_t44 = E0000000113F0633AC(_t107);
                				_t66 = _a16 + _t44;
                				_a16 = _t66;
                				goto 0x3f06dc21;
                				if (_t44 - 0x39 > 0) goto 0x3f06dc28;
                				_t108 = _t107 + 1;
                				if ( *_t108 - dil >= 0) goto 0x3f06dc1a;
                				if (sil != 0x2d) goto 0x3f06dc33;
                				_a16 =  ~_t66;
                				_t92 =  *_t108;
                				_a24 = 0 | _t92 != 0x00000000;
                				_t97 =  *((intOrPtr*)(_t138 + 8));
                				if (_t92 == 0) goto 0x3f06dc5c;
                				if (E0000000113F067860(_t97, _t108, _t97, _t99 + 2, _t108, _t137) != 0) goto 0x3f06dc84;
                				goto 0x3f06dc5f;
                				 *_t97 = 0;
                				_t49 = E0000000113F06D508(_t48);
                				 *_t97 = _a16;
                				_t50 = E0000000113F06D4F8(_t49);
                				 *_t97 = _a24;
                				return _t50;
                			}





























                0x13f06da94
                0x13f06da94
                0x13f06daaa
                0x13f06daaf
                0x13f06dab7
                0x13f06dabb
                0x13f06dac5
                0x13f06dad6
                0x13f06dadc
                0x13f06dae3
                0x13f06dae6
                0x13f06daf4
                0x13f06dafc
                0x13f06dafe
                0x13f06db04
                0x13f06db08
                0x13f06db0e
                0x13f06db13
                0x13f06db21
                0x13f06db26
                0x13f06db2d
                0x13f06db34
                0x13f06db43
                0x13f06db49
                0x13f06db50
                0x13f06db60
                0x13f06db69
                0x13f06db69
                0x13f06db6d
                0x13f06db80
                0x13f06db86
                0x13f06db89
                0x13f06db8b
                0x13f06db92
                0x13f06db94
                0x13f06db9f
                0x13f06dba6
                0x13f06dbb1
                0x13f06dbb4
                0x13f06dbba
                0x13f06dbc3
                0x13f06dbc5
                0x13f06dbc8
                0x13f06dbcd
                0x13f06dbcf
                0x13f06dbd5
                0x13f06dbe0
                0x13f06dbe4
                0x13f06dbea
                0x13f06dbf3
                0x13f06dbf5
                0x13f06dbf8
                0x13f06dbff
                0x13f06dc03
                0x13f06dc05
                0x13f06dc0b
                0x13f06dc13
                0x13f06dc15
                0x13f06dc18
                0x13f06dc1c
                0x13f06dc1e
                0x13f06dc26
                0x13f06dc2c
                0x13f06dc30
                0x13f06dc35
                0x13f06dc3a
                0x13f06dc3d
                0x13f06dc41
                0x13f06dc58
                0x13f06dc5a
                0x13f06dc5c
                0x13f06dc62
                0x13f06dc67
                0x13f06dc6c
                0x13f06dc71
                0x13f06dc83

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
                • String ID: ?
                • API String ID: 435049134-1684325040
                • Opcode ID: c0e1776608c7f6bccce8305eeaea6ccc1f7e2adca1c6f3190874f5c411079407
                • Instruction ID: a9fb58ace4dfcad9577d1f6ff923818e482cd9d6fa4adebd5a21734e7789f11d
                • Opcode Fuzzy Hash: c0e1776608c7f6bccce8305eeaea6ccc1f7e2adca1c6f3190874f5c411079407
                • Instruction Fuzzy Hash: 4DD1D132A016808AFB689F2DD8403D93B93E7847A8FA4513DFA6957797DB38C643C740
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 49%
                			E0000000113F054280(void* __ecx, void* __edx, void* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, void* __r8, void* __r9, intOrPtr _a8, char _a16, long long _a24, long long _a32, char _a56, signed int _a8248, void* _a8264) {
                				void* __rsi;
                				void* _t17;
                				long _t21;
                				void* _t24;
                				void* _t60;
                				signed long long _t72;
                				signed long long _t73;
                				intOrPtr _t122;
                				void* _t124;
                				void* _t126;
                				void* _t132;
                				void* _t133;
                				void* _t135;
                
                				_t131 = __r9;
                				_t74 = __rbx;
                				_t50 = __ecx;
                				_a24 = __rbx;
                				_a32 = __rbp;
                				E0000000113F058610(__ecx, __rax, __rcx, _t132, _t133);
                				_t127 = _t126 - __rax;
                				_t72 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t73 = _t72 ^ _t126 - __rax;
                				_a8248 = _t73;
                				_t124 = __rdx;
                				_t135 = __rcx;
                				if (__rdx == 0) goto 0x3f05430b;
                				E0000000113F054490(_t73, "TMP");
                				E0000000113F053FB0(__edx, _t73, __rbx, _t124, __r8);
                				if (_t73 == 0) goto 0x3f0543df;
                				_t17 = E0000000113F05FD9C(_t50, _t73, L"TMP", _t73);
                				E0000000113F05A4F8(_t60, _t73, _t74, _t73);
                				if (_t17 == 0) goto 0x3f054310;
                				E0000000113F051DD0(_t73, "LOADER: Failed to set the TMP environment variable.\n", _t73, __r8, __r9);
                				goto 0x3f054468;
                				_t122 = _a8;
                				_t21 = GetTempPathW(??, ??);
                				0x3f062824();
                				r9d = _t21;
                				E0000000113F054E40(_t73,  &_a16,  &_a56, L"_MEI%d", _t131);
                				E0000000113F060FCC(_t131);
                				_t24 = E0000000113F055320(_t73, _t74, _t73); // executed
                				if (_t24 == 0) goto 0x3f0543e6;
                				E0000000113F05A4F8(_t60, _t73, _t74, _t73);
                				if (1 - 5 < 0) goto 0x3f054340;
                				if (_t124 == 0) goto 0x3f0543df;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t74, _t73, "TMP", _t122, L"_MEI%d");
                				if (_t122 == 0) goto 0x3f0543c9;
                				r8d = 0;
                				_t119 = _t73;
                				E0000000113F0554B0(_t73, _t74, _t73, _t122, _t122, L"_MEI%d");
                				E0000000113F05FD9C(0, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t122);
                				goto 0x3f054468;
                				SetEnvironmentVariableW(??, ??);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				goto 0x3f054468;
                				r8d = 0x1000;
                				E0000000113F0555C0(_t60, _t73, _t135, _t73, _t122, _t124, L"_MEI%d");
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				if (_t124 == 0) goto 0x3f054463;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t73, _t73, "TMP", _t122, L"_MEI%d");
                				if (_t122 == 0) goto 0x3f05444d;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t73, _t119, _t122, _t122, L"_MEI%d");
                				E0000000113F05FD9C(0, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				goto 0x3f05445e;
                				SetEnvironmentVariableW(??, ??);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				return E0000000113F058680(0, _t73, _a8248 ^ _t127);
                			}
















                0x13f054280
                0x13f054280
                0x13f054280
                0x13f054280
                0x13f054285
                0x13f054293
                0x13f054298
                0x13f05429b
                0x13f0542a2
                0x13f0542a5
                0x13f0542ad
                0x13f0542b0
                0x13f0542b6
                0x13f0542bf
                0x13f0542ca
                0x13f0542d5
                0x13f0542e5
                0x13f0542ef
                0x13f0542f6
                0x13f0542ff
                0x13f054306
                0x13f05430b
                0x13f05431a
                0x13f054320
                0x13f054325
                0x13f054339
                0x13f05434a
                0x13f054355
                0x13f05435c
                0x13f054365
                0x13f05436f
                0x13f054374
                0x13f054376
                0x13f054382
                0x13f05438a
                0x13f05438c
                0x13f054394
                0x13f054397
                0x13f0543a5
                0x13f0543ad
                0x13f0543b5
                0x13f0543bd
                0x13f0543c4
                0x13f0543d1
                0x13f0543da
                0x13f0543e1
                0x13f0543e6
                0x13f0543f2
                0x13f0543fa
                0x13f054402
                0x13f054404
                0x13f054410
                0x13f054418
                0x13f05441a
                0x13f054425
                0x13f054433
                0x13f05443b
                0x13f054443
                0x13f05444b
                0x13f054455
                0x13f05445e
                0x13f05448f

                APIs
                • GetTempPathW.KERNEL32 ref: 000000013F05431A
                  • Part of subcall function 000000013F054490: GetEnvironmentVariableW.KERNEL32(000000013F052A70), ref: 000000013F0544CA
                  • Part of subcall function 000000013F054490: ExpandEnvironmentStringsW.KERNEL32 ref: 000000013F0544E7
                  • Part of subcall function 000000013F05FD9C: _invalid_parameter_noinfo.LIBCMT ref: 000000013F05FDB5
                • SetEnvironmentVariableW.KERNEL32(?,00000000,?,000000013F05424D), ref: 000000013F0543D1
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                • API String ID: 3752271684-1116378104
                • Opcode ID: 8f6e4cf861d07ce3f6e96e335443e904636e1cf99be6eaf65090b71f3ec6653d
                • Instruction ID: 081fc1d446df283455334073b4abffd1fb9b0f31d0962c9c6831c79985b2ef89
                • Opcode Fuzzy Hash: 8f6e4cf861d07ce3f6e96e335443e904636e1cf99be6eaf65090b71f3ec6653d
                • Instruction Fuzzy Hash: 5D51C234B09650C4FE1CA76EA96D7E952535B85BC0F84143C7C0E4BB97DEA8C6478B10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 64%
                			E0000000113F0562F8(signed int __ebx, void* __edi, void* __ebp, signed int __rax, signed char* __rsi, signed long long __r8, void* __r11, signed long long __r12, void* __r13) {
                				signed int _t302;
                				signed int _t305;
                				unsigned int _t307;
                				unsigned int _t311;
                				signed int _t327;
                				signed int _t329;
                				signed int _t336;
                				signed char _t341;
                				signed int _t354;
                				signed char _t359;
                				unsigned int _t366;
                				void* _t367;
                				signed int _t376;
                				signed int _t390;
                				void* _t398;
                				signed int _t399;
                				void* _t400;
                				signed int _t401;
                				void* _t402;
                				signed int _t403;
                				void* _t404;
                				signed int _t406;
                				signed int _t407;
                				void* _t408;
                				signed int _t410;
                				signed int _t411;
                				void* _t412;
                				signed int _t414;
                				void* _t415;
                				signed int _t416;
                				signed int _t417;
                				void* _t418;
                				signed int _t420;
                				void* _t421;
                				signed int _t422;
                				signed int _t424;
                				signed int _t425;
                				signed int _t430;
                				signed char _t447;
                				signed char _t451;
                				signed char _t481;
                				signed char _t484;
                				signed char _t490;
                				signed char _t514;
                				signed char _t517;
                				signed char _t523;
                				void* _t525;
                				intOrPtr _t526;
                				void* _t530;
                				signed int _t541;
                				signed int _t548;
                				signed char _t553;
                				void* _t555;
                				void* _t559;
                				void* _t563;
                				signed char _t575;
                				signed char _t580;
                				intOrPtr _t582;
                				void* _t584;
                				void* _t585;
                				void* _t586;
                				void* _t587;
                				void* _t588;
                				intOrPtr _t589;
                				intOrPtr _t590;
                				void* _t591;
                				void* _t592;
                				void* _t593;
                				void* _t594;
                				void* _t595;
                				void* _t596;
                				void* _t597;
                				void* _t599;
                				signed int _t601;
                				signed int _t602;
                				unsigned int _t603;
                				unsigned int _t605;
                				unsigned int _t610;
                				unsigned int _t613;
                				unsigned int _t616;
                				signed int _t619;
                				unsigned int _t620;
                				unsigned int _t623;
                				signed int _t625;
                				unsigned int _t626;
                				signed int _t629;
                				unsigned int _t630;
                				signed int _t632;
                				unsigned int _t633;
                				void* _t652;
                				void* _t664;
                				long long _t738;
                				signed long long _t741;
                				signed long long _t742;
                				long long _t745;
                				signed long long _t749;
                				signed long long _t751;
                				signed long long _t754;
                				signed long long _t758;
                				signed long long _t759;
                				signed long long _t760;
                				signed long long _t762;
                				signed long long _t763;
                				signed long long _t764;
                				signed char* _t779;
                				signed char* _t780;
                				signed char* _t781;
                				signed char* _t782;
                				signed char* _t783;
                				signed char* _t785;
                				signed char* _t786;
                				signed char* _t787;
                				signed char* _t788;
                				signed char* _t789;
                				signed char* _t790;
                				signed char* _t791;
                				signed char* _t792;
                				void* _t795;
                				void* _t797;
                				signed long long _t799;
                				char* _t804;
                				char* _t805;
                				long long _t806;
                				intOrPtr _t807;
                				intOrPtr _t808;
                				intOrPtr _t809;
                				void* _t810;
                				signed long long _t811;
                				long long _t816;
                
                				_t811 = __r12;
                				_t810 = __r11;
                				_t799 = __r8;
                				if (__ebx - 0xe >= 0) goto 0x3f05631e;
                				if (__edi == 0) goto 0x3f05615f;
                				_t584 = __edi - 1;
                				_t601 = __ebp + (( *__rsi & 0x000000ff) << __ebx);
                				_t779 =  &(__rsi[1]);
                				_t398 = __ebx + 8;
                				if (_t398 - 0xe < 0) goto 0x3f056300;
                				_t399 = _t398 + 0xfffffff2;
                				_t602 = _t601 >> 5;
                				_t430 = (_t601 & 0x0000001f) + 0x101;
                				_t603 = _t602 >> 5;
                				 *(__r13 + 0x7c) = _t430;
                				_t548 = (_t602 & 0x0000001f) + 1;
                				 *(__r13 + 0x80) = _t548;
                				 *((intOrPtr*)(__r13 + 0x78)) = (_t603 & 0x0000000f) + 4;
                				if (_t430 - 0x11e > 0) goto 0x3f056480;
                				if (_t548 - 0x1e > 0) goto 0x3f056480;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f45;
                				if ( *(__r13 + 0x84) -  *((intOrPtr*)(__r13 + 0x78)) >= 0) goto 0x3f0563e8;
                				if (_t399 - 3 >= 0) goto 0x3f0563ae;
                				if (_t584 == 0) goto 0x3f05615f;
                				_t585 = _t584 - 1;
                				_t605 = (_t603 >> 4) + (( *_t779 & 0x000000ff) << _t399);
                				_t780 =  &(_t779[1]);
                				_t400 = _t399 + 8;
                				if (_t400 - 3 < 0) goto 0x3f056390;
                				_t401 = _t400 + 0xfffffffd;
                				 *(__r13 + 0x90 + __rax * 2) = _t605 & 7;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				_t302 =  *(__r13 + 0x84);
                				if (_t302 -  *((intOrPtr*)(__r13 + 0x78)) < 0) goto 0x3f056384;
                				if (_t302 - 0x13 >= 0) goto 0x3f05641a;
                				 *(__r13 + 0x90 + __rax * 2) = r15w;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				if ( *(__r13 + 0x84) - 0x13 < 0) goto 0x3f0563f0;
                				_t758 = __r13 + 0x70;
                				_t738 = __r13 + 0x550;
                				 *_t758 = 7;
                				 *((long long*)(__r13 + 0x60)) = _t738;
                				 *((long long*)(__r13 + 0x88)) = _t738;
                				 *((long long*)(_t797 + 0x28)) = __r13 + 0x310;
                				 *(_t797 + 0x20) = _t758;
                				_t37 = _t758 + 0x13; // 0x13
                				r8d = _t37;
                				_t305 = E0000000113F057AC0(0, __r13 + 0x90, _t795, __r13 + 0x88, __r12);
                				 *(_t797 + 0xb0) = _t305;
                				if (_t305 == 0) goto 0x3f056499;
                				 *(_t811 + 0x20) = "invalid code lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t741 = "too many length or distance symbols";
                				 *(_t811 + 0x20) = _t741;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f46;
                				r10d =  *(__r13 + 0x7c);
                				if ( *(__r13 + 0x84) -  *(__r13 + 0x80) + r10d >= 0) goto 0x3f0566c2;
                				r9d = 1;
                				_t807 =  *((intOrPtr*)(__r13 + 0x60));
                				r9d = r9d <<  *(__r13 + 0x70);
                				r9d = r9d - 1;
                				_t759 = _t758 & _t741;
                				_t307 =  *(_t807 + _t759 * 4);
                				r8d = _t307;
                				r8d = r8d >> 0x10;
                				 *(_t797 + 0x34) = _t307;
                				if ((_t307 >> 0x00000008 & 0x000000ff) - _t401 <= 0) goto 0x3f056543;
                				if (_t585 == 0) goto 0x3f05615f;
                				_t586 = _t585 - 1;
                				_t781 =  &(_t780[1]);
                				_t402 = _t401 + 8;
                				_t742 = _t741 & _t759;
                				_t311 =  *(_t807 + _t742 * 4);
                				_t553 = _t311 >> 8;
                				r8d = _t311;
                				r8d = r8d >> 0x10;
                				 *(_t797 + 0x34) = _t311;
                				if ((_t553 & 0x000000ff) - _t402 > 0) goto 0x3f056507;
                				_t652 = r8w - 0x10;
                				if (_t652 >= 0) goto 0x3f05657a;
                				_t403 = _t402 - (_t553 & 0x000000ff);
                				 *((short*)(__r13 + 0x90 + _t759 * 2)) = _t311 >> 0x10;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				r8d =  *(__r13 + 0x84);
                				goto 0x3f0566a7;
                				if (_t652 != 0) goto 0x3f0565d9;
                				_t555 = (_t553 & 0x000000ff) + 2;
                				if (_t403 - _t555 >= 0) goto 0x3f0565a3;
                				if (_t586 == 0) goto 0x3f05615f;
                				_t587 = _t586 - 1;
                				_t782 =  &(_t781[1]);
                				_t404 = _t403 + 8;
                				if (_t404 - _t555 < 0) goto 0x3f056586;
                				_t447 =  *(_t797 + 0x35) & 0x000000ff;
                				_t610 = ((_t605 >> 3) + (( *_t780 & 0x000000ff) << _t401) >> (_t553 & 0x000000ff)) + (( *_t781 & 0x000000ff) << _t403) >> _t447;
                				if ( *(__r13 + 0x84) == 0) goto 0x3f0566f2;
                				_t406 = _t404 - _t447 + 0xfffffffe;
                				r9d =  *(__r13 + 0x90 + _t742 * 2) & 0x0000ffff;
                				goto 0x3f056663;
                				if (r8w != 0x11) goto 0x3f056620;
                				_t559 = (_t610 & 0x00000003) + 6;
                				if (_t406 - _t559 >= 0) goto 0x3f056604;
                				if (_t587 == 0) goto 0x3f05615f;
                				_t588 = _t587 - 1;
                				_t783 =  &(_t782[1]);
                				_t407 = _t406 + 8;
                				if (_t407 - _t559 < 0) goto 0x3f0565e7;
                				_t613 = (_t610 >> 2) + (( *_t782 & 0x000000ff) << _t406) >> ( *(_t797 + 0x35) & 0x000000ff);
                				r9d = r15d;
                				goto 0x3f05665f;
                				_t563 = (_t613 & 0x00000007) + 0xa;
                				if (_t407 - _t563 >= 0) goto 0x3f056644;
                				if (_t588 == 0) goto 0x3f05615f;
                				_t589 = _t588 - 1;
                				_t408 = _t407 + 8;
                				if (_t408 - _t563 < 0) goto 0x3f056627;
                				_t451 =  *(_t797 + 0x35) & 0x000000ff;
                				_t616 = (_t613 >> 3) + (( *_t783 & 0x000000ff) << _t407) >> _t451;
                				r9d = r15w & 0xffffffff;
                				_t664 =  *(__r13 + 0x84) + (_t616 & 0x0000007f) + 0xb -  *(__r13 + 0x80) +  *(__r13 + 0x7c);
                				if (_t664 > 0) goto 0x3f0566f2;
                				 *(__r13 + 0x90 + _t742 * 2) = r9w;
                				r8d =  *(__r13 + 0x84);
                				r8d = __r8 + 1;
                				 *(__r13 + 0x84) = r8d;
                				if (_t664 != 0) goto 0x3f056680;
                				r10d =  *(__r13 + 0x7c);
                				if (r8d -  *(__r13 + 0x80) + r10d < 0) goto 0x3f0564d0;
                				if ( *((intOrPtr*)(__r13 + 8)) == 0x3f51) goto 0x3f055fb4;
                				if ( *((short*)(__r13 + 0x290)) != 0) goto 0x3f05670b;
                				 *(_t811 + 0x20) = "invalid code -- missing end-of-block";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(_t811 + 0x20) = "invalid bit length repeat";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t745 = __r13 + 0x550;
                				 *(__r13 + 0x70) = 9;
                				 *((long long*)(__r13 + 0x88)) = _t745;
                				_t816 = __r13 + 0x310;
                				 *((long long*)(__r13 + 0x60)) = _t745;
                				 *((long long*)(_t797 + 0x28)) = _t816;
                				 *(_t797 + 0x20) = __r13 + 0x70;
                				r8d = r10d;
                				_t327 = E0000000113F057AC0(1, __r13 + 0x90, _t795, __r13 + 0x88, _t811);
                				 *(_t797 + 0xb0) = _t327;
                				if (_t327 == 0) goto 0x3f056779;
                				 *(_t811 + 0x20) = "invalid literal/lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t748 =  *((intOrPtr*)(__r13 + 0x88));
                				_t760 = __r13 + 0x74;
                				r8d =  *(__r13 + 0x80);
                				 *((long long*)(__r13 + 0x68)) =  *((intOrPtr*)(__r13 + 0x88));
                				 *_t760 = 6;
                				 *((long long*)(_t797 + 0x28)) = _t816;
                				 *(_t797 + 0x20) = _t760;
                				_t329 = E0000000113F057AC0(2, 0x90 + _t748 * 2 + __r13, _t795, __r13 + 0x88, _t811);
                				 *(_t797 + 0xb0) = _t329;
                				r15d = _t329;
                				if (_t329 == 0) goto 0x3f0567e6;
                				_t749 = "invalid distances set";
                				 *(_t811 + 0x20) = _t749;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f47;
                				if ( *((intOrPtr*)(_t797 + 0xa8)) == 6) goto 0x3f056ee4;
                				r8d =  *(_t797 + 0xa0);
                				r15d = 0;
                				r10d =  *(_t797 + 0xb8);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (_t589 - 6 < 0) goto 0x3f056898;
                				if (r10d - 0x102 < 0) goto 0x3f056898;
                				 *((long long*)(_t811 + 0x10)) =  *((intOrPtr*)(_t797 + 0x40));
                				_t762 = _t811;
                				 *(_t811 + 0x18) = r10d;
                				 *_t811 =  &(_t783[1]);
                				 *((intOrPtr*)(_t811 + 8)) = _t589;
                				 *(__r13 + 0x48) = _t616 >> 7;
                				 *(__r13 + 0x4c) = _t408 + 0xfffffff9 - _t451;
                				E0000000113F058080(r8d, _t599, _t749, _t762, _t807, _t810);
                				r10d =  *(_t811 + 0x18);
                				_t785 =  *_t811;
                				_t590 =  *((intOrPtr*)(_t811 + 8));
                				_t410 =  *(__r13 + 0x4c);
                				 *((long long*)(_t797 + 0x40)) =  *((intOrPtr*)(_t811 + 0x10));
                				 *(_t797 + 0xb8) = r10d;
                				if ( *((intOrPtr*)(__r13 + 8)) != 0x3f3f) goto 0x3f055fc1;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fc1;
                				_t808 =  *((intOrPtr*)(__r13 + 0x60));
                				_t763 = _t762 & _t749;
                				 *(__r13 + 0x1be4) = r15d;
                				if (( *(_t808 + _t763 * 4) >> 0x00000008 & 0x000000ff) - _t410 <= 0) goto 0x3f0568f7;
                				if (_t590 == 0) goto 0x3f05615f;
                				_t591 = _t590 - 1;
                				_t619 =  *(__r13 + 0x48) + (( *_t785 & 0x000000ff) << _t410);
                				_t786 =  &(_t785[1]);
                				_t411 = _t410 + 8;
                				_t336 =  *(_t808 + (_t749 & _t763) * 4);
                				if ((_t336 >> 0x00000008 & 0x000000ff) - _t411 > 0) goto 0x3f0568c7;
                				if (_t336 == 0) goto 0x3f0569b3;
                				if ((_t336 & 0x000000f0) != 0) goto 0x3f0569b3;
                				 *(_t797 + 0x34) = _t336;
                				r14d =  *(_t797 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t336 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t336 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t619;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t336 >> 0x10);
                				r8d =  *(_t808 + _t799 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t411 <= 0) goto 0x3f0569a4;
                				r11d =  *(_t797 + 0x36) & 0x0000ffff;
                				if (_t591 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t620 = _t619 + (( *_t786 & 0x000000ff) << _t411);
                				_t592 = _t591 - 1;
                				r8d = r8d << (_t336 & 0x000000ff) + r14d;
                				_t787 =  &(_t786[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t620;
                				_t412 = _t411 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t341 =  *(_t808 + _t799 * 4);
                				r8d = _t341 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t412 > 0) goto 0x3f056958;
                				_t481 = r14d;
                				 *(__r13 + 0x1be4) = _t481;
                				_t484 = _t341 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t484;
                				_t414 = _t412 - r14d - _t484;
                				 *(__r13 + 0x50) = _t341 >> 0x10;
                				if (_t341 != 0) goto 0x3f0569e0;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4d;
                				goto 0x3f055fb4;
                				if ((_t341 & 0x00000020) == 0) goto 0x3f0569f4;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fac;
                				if ((_t341 & 0x00000040) == 0) goto 0x3f056a11;
                				_t751 = "invalid literal/length code";
                				 *(_t811 + 0x20) = _t751;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f49;
                				 *(__r13 + 0x58) = _t341 & 0xf;
                				_t575 =  *(__r13 + 0x58);
                				if (_t575 == 0) goto 0x3f056a69;
                				if (_t414 - _t575 >= 0) goto 0x3f056a4d;
                				if (_t592 == 0) goto 0x3f05615f;
                				_t593 = _t592 - 1;
                				_t623 = (_t620 >> _t481 >> _t484) + (( *_t787 & 0x000000ff) << _t414);
                				_t788 =  &(_t787[1]);
                				_t415 = _t414 + 8;
                				if (_t415 - _t575 < 0) goto 0x3f056a30;
                				_t490 = _t575;
                				_t416 = _t415 - _t575;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + ((0x00000001 << _t490) - 0x00000001 & _t623);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t575;
                				 *(__r13 + 0x1be8) =  *(__r13 + 0x50);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4a;
                				_t809 =  *((intOrPtr*)(__r13 + 0x68));
                				_t764 = _t763 & _t751;
                				if (( *(_t809 + _t764 * 4) >> 0x00000008 & 0x000000ff) - _t416 <= 0) goto 0x3f056ad4;
                				if (_t593 == 0) goto 0x3f05615f;
                				_t594 = _t593 - 1;
                				_t625 = (_t623 >> _t490) + (( *_t788 & 0x000000ff) << _t416);
                				_t789 =  &(_t788[1]);
                				_t417 = _t416 + 8;
                				_t354 =  *(_t809 + (_t751 & _t764) * 4);
                				if ((_t354 >> 0x00000008 & 0x000000ff) - _t417 > 0) goto 0x3f056aa4;
                				if ((_t354 & 0x000000f0) != 0) goto 0x3f056b8b;
                				 *(_t797 + 0x34) = _t354;
                				r14d =  *(_t797 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t354 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t354 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t625;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t354 >> 0x10);
                				r8d =  *(_t809 + _t799 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t417 <= 0) goto 0x3f056b7c;
                				r11d =  *(_t797 + 0x36) & 0x0000ffff;
                				if (_t594 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t626 = _t625 + (( *_t789 & 0x000000ff) << _t417);
                				_t595 = _t594 - 1;
                				r8d = r8d << (_t354 & 0x000000ff) + r14d;
                				_t790 =  &(_t789[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t626;
                				_t418 = _t417 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t359 =  *(_t809 + _t799 * 4);
                				r8d = _t359 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t418 > 0) goto 0x3f056b30;
                				_t514 = r14d;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t514;
                				r10d =  *(_t797 + 0xb8);
                				_t517 = _t359 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t517;
                				_t420 = _t418 - r14d - _t517;
                				if ((_t359 & 0x00000040) == 0) goto 0x3f056bc3;
                				 *(_t811 + 0x20) = "invalid distance code";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				r8d =  *(_t797 + 0xa0);
                				 *(__r13 + 0x54) = _t359 >> 0x10;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4b;
                				 *(__r13 + 0x58) = _t359 & 0xf;
                				_t580 =  *(__r13 + 0x58);
                				if (_t580 == 0) goto 0x3f056c2b;
                				if (_t420 - _t580 >= 0) goto 0x3f056c0f;
                				if (_t595 == 0) goto 0x3f05615f;
                				_t596 = _t595 - 1;
                				_t629 = (_t626 >> _t514 >> _t517) + (( *_t790 & 0x000000ff) << _t420);
                				_t791 =  &(_t790[1]);
                				_t421 = _t420 + 8;
                				if (_t421 - _t580 < 0) goto 0x3f056bf2;
                				_t523 = _t580;
                				_t422 = _t421 - _t580;
                				_t630 = _t629 >> _t523;
                				 *(__r13 + 0x54) =  *(__r13 + 0x54) + ((0x00000001 << _t523) - 0x00000001 & _t629);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t580;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4c;
                				if (r10d == 0) goto 0x3f05615f;
                				_t366 =  *(__r13 + 0x54);
                				_t525 = r8d - r10d;
                				if (_t366 - _t525 <= 0) goto 0x3f056c9b;
                				_t367 = _t366 - _t525;
                				if (_t367 -  *((intOrPtr*)(__r13 + 0x38)) <= 0) goto 0x3f056c75;
                				if ( *((intOrPtr*)(__r13 + 0x1be0)) == 0) goto 0x3f056c75;
                				_t754 = "invalid distance too far back";
                				 *(_t811 + 0x20) = _t754;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t526 =  *((intOrPtr*)(__r13 + 0x3c));
                				if (_t367 - _t526 <= 0) goto 0x3f056c83;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				r9d =  <=  ? _t367 - _t526 : r9d;
                				goto 0x3f056caa;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				_t530 =  <=  ? r9d : r10d;
                				_t804 =  *((intOrPtr*)(_t797 + 0x40));
                				r10d = r10d - _t530;
                				r8d = r8d - _t530;
                				 *(_t797 + 0xb8) = r10d;
                				 *(__r13 + 0x50) = r8d;
                				 *_t804 =  *( *((intOrPtr*)(_t797 + 0x40)) - _t754 - _t804 + _t804) & 0x000000ff;
                				_t805 = _t804 + 1;
                				if (r9d != r10d) goto 0x3f056cd0;
                				 *((long long*)(_t797 + 0x40)) = _t805;
                				if ( *(__r13 + 0x50) != _t530 + 0xffffffff) goto 0x3f055fc1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (r10d == 0) goto 0x3f05615f;
                				 *_t805 =  *(__r13 + 0x50) & 0x000000ff;
                				_t806 = _t805 + 1;
                				r10d = r10d - 1;
                				 *((long long*)(_t797 + 0x40)) = _t806;
                				 *(_t797 + 0xb8) = r10d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				goto 0x3f055fc1;
                				if ( *((intOrPtr*)(_t795 + 0x10)) == 0) goto 0x3f056e16;
                				if (_t422 - 0x20 >= 0) goto 0x3f056d5e;
                				if (_t596 == 0) goto 0x3f05615f;
                				_t597 = _t596 - 1;
                				_t631 = _t630 + (( *_t791 & 0x000000ff) << _t422);
                				_t792 =  &(_t791[1]);
                				if (_t422 + 8 - 0x20 < 0) goto 0x3f056d40;
                				r8d = r8d - r10d;
                				 *((intOrPtr*)(_t811 + 0x1c)) =  *((intOrPtr*)(_t811 + 0x1c)) + r8d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r8d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056dac;
                				if (r8d == 0) goto 0x3f056dac;
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056d92;
                				E0000000113F057780(_t806 - _t754);
                				goto 0x3f056d97;
                				_t376 = E0000000113F057490( *(__r13 + 0x20), _t754, _t806 - _t754, _t799, _t806);
                				r10d =  *(_t797 + 0xb8);
                				 *(__r13 + 0x20) = _t376;
                				 *(_t811 + 0x4c) = _t376;
                				 *(_t797 + 0xa0) = r10d;
                				r14d = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056e06;
                				if ( *((intOrPtr*)(__r13 + 0x18)) != 0) goto 0x3f056de7;
                				if (((_t630 + (( *_t791 & 0x000000ff) << _t422) & 0x0000ff00) + (_t630 + (( *_t791 & 0x000000ff) << _t422) << 0x10) << 8) + (_t631 >> 0x00000008 & 0x0000ff00) + (_t631 >> 0x18) ==  *(__r13 + 0x20)) goto 0x3f056e06;
                				 *(_t811 + 0x20) = "incorrect data check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t632 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				_t424 = r15d;
                				goto 0x3f056e30;
                				r14d =  *(_t797 + 0xa0);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				r14d =  *(_t797 + 0xa0);
                				if ( *(__r13 + 0x10) == 0) goto 0x3f056eab;
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056eab;
                				if (_t424 - 0x20 >= 0) goto 0x3f056e61;
                				if (_t597 == 0) goto 0x3f056167;
                				_t633 = _t632 + (( *_t792 & 0x000000ff) << _t424);
                				_t425 = _t424 + 8;
                				if (_t425 - 0x20 < 0) goto 0x3f056e43;
                				if (_t633 ==  *((intOrPtr*)(__r13 + 0x24))) goto 0x3f056ea5;
                				_t756 = "incorrect length check";
                				 *(_t811 + 0x20) = "incorrect length check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((long long*)(_t811 + 0x10)) = _t806;
                				 *(_t811 + 0x18) = r10d;
                				 *_t811 =  &(_t792[1]);
                				 *((intOrPtr*)(_t811 + 8)) = _t597 - 1;
                				 *(__r13 + 0x48) = _t633;
                				 *(__r13 + 0x4c) = _t425;
                				goto 0x3f056fca;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f50;
                				r15d = 1;
                				r14d =  *(_t797 + 0xa0);
                				r15d = 1;
                				r14d =  *(_t797 + 0xa0);
                				r15d = 0xfffffffd;
                				goto 0x3f05616f;
                				r14d =  *(_t797 + 0xa0);
                				goto 0x3f056176;
                				r14d = r14d -  *(_t811 + 0x18);
                				r10d =  *(_t797 + 0x38);
                				r10d = r10d -  *((intOrPtr*)(_t811 + 8));
                				 *((intOrPtr*)(_t811 + 0xc)) =  *((intOrPtr*)(_t811 + 0xc)) + r10d;
                				 *((intOrPtr*)(_t811 + 0x1c)) =  *((intOrPtr*)(_t811 + 0x1c)) + r14d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r14d;
                				 *(_t797 + 0x38) = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056f52;
                				if (r14d == 0) goto 0x3f056f52;
                				r8d = r14d;
                				_t541 =  *(__r13 + 0x20);
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056f3f;
                				E0000000113F057780( *((intOrPtr*)(_t811 + 0x10)) - _t756);
                				goto 0x3f056f44;
                				_t390 = E0000000113F057490(_t541, _t756,  *((intOrPtr*)(_t811 + 0x10)) - _t756, _t799, _t806);
                				r10d =  *(_t797 + 0x38);
                				 *(__r13 + 0x20) = _t390;
                				 *(_t811 + 0x4c) = _t390;
                				_t582 =  *((intOrPtr*)(__r13 + 8));
                				if (_t582 == 0x3f47) goto 0x3f056f6e;
                				if (_t582 == 0x3f42) goto 0x3f056f6e;
                				r9d = 0;
                				r8d = r9d;
                				goto 0x3f056f77;
                				r8d = 0x100;
                				r9d = 0;
                				asm("sbb ecx, ecx");
                				r9d =  ==  ? 0x80 : r9d;
                				 *((intOrPtr*)(_t811 + 0x48)) = (_t541 & 0x00000040) + r9d +  *(__r13 + 0x4c) + r8d;
                				if (r10d != 0) goto 0x3f056faa;
                				if (r14d == 0) goto 0x3f056fb4;
                				if ( *((intOrPtr*)(_t797 + 0xa8)) != 4) goto 0x3f056fc0;
                				r15d =  ==  ? 0xfffffffb : r15d;
                				goto 0x3f056fca;
                				return 0xfffffffe;
                			}




































































































































                0x13f0562f8
                0x13f0562f8
                0x13f0562f8
                0x13f0562fb
                0x13f056302
                0x13f05630f
                0x13f056311
                0x13f056313
                0x13f056316
                0x13f05631c
                0x13f056320
                0x13f056323
                0x13f05632b
                0x13f056331
                0x13f056339
                0x13f056346
                0x13f056348
                0x13f05634f
                0x13f056359
                0x13f056362
                0x13f056368
                0x13f05636f
                0x13f056382
                0x13f056387
                0x13f056392
                0x13f05639f
                0x13f0563a1
                0x13f0563a3
                0x13f0563a6
                0x13f0563ac
                0x13f0563bf
                0x13f0563cb
                0x13f0563d4
                0x13f0563db
                0x13f0563e6
                0x13f0563eb
                0x13f056400
                0x13f056409
                0x13f056418
                0x13f05641a
                0x13f05641e
                0x13f056425
                0x13f056432
                0x13f056436
                0x13f056447
                0x13f05644c
                0x13f056453
                0x13f056453
                0x13f056457
                0x13f05645c
                0x13f056465
                0x13f05646e
                0x13f056473
                0x13f05647b
                0x13f056480
                0x13f056487
                0x13f05648c
                0x13f056494
                0x13f056499
                0x13f0564a5
                0x13f0564b4
                0x13f0564c2
                0x13f0564d4
                0x13f0564da
                0x13f0564de
                0x13f0564e1
                0x13f0564e9
                0x13f0564ec
                0x13f0564f5
                0x13f0564fb
                0x13f0564ff
                0x13f056505
                0x13f056509
                0x13f056516
                0x13f05651a
                0x13f05651f
                0x13f056525
                0x13f056528
                0x13f05652e
                0x13f056531
                0x13f056537
                0x13f05653b
                0x13f056541
                0x13f056543
                0x13f056548
                0x13f056555
                0x13f05655e
                0x13f056567
                0x13f05656e
                0x13f056575
                0x13f05657d
                0x13f05657f
                0x13f056584
                0x13f056588
                0x13f056595
                0x13f056599
                0x13f05659c
                0x13f0565a1
                0x13f0565a3
                0x13f0565b1
                0x13f0565b5
                0x13f0565bd
                0x13f0565cb
                0x13f0565d4
                0x13f0565de
                0x13f0565e0
                0x13f0565e5
                0x13f0565e9
                0x13f0565f6
                0x13f0565fa
                0x13f0565fd
                0x13f056602
                0x13f05660e
                0x13f056610
                0x13f05661e
                0x13f056620
                0x13f056625
                0x13f056629
                0x13f056636
                0x13f05663d
                0x13f056642
                0x13f056644
                0x13f05664e
                0x13f056650
                0x13f056677
                0x13f056679
                0x13f056687
                0x13f056690
                0x13f056697
                0x13f05669b
                0x13f0566a5
                0x13f0566ae
                0x13f0566b8
                0x13f0566c8
                0x13f0566d7
                0x13f0566e0
                0x13f0566e5
                0x13f0566ed
                0x13f0566f9
                0x13f0566fe
                0x13f056706
                0x13f05670b
                0x13f056712
                0x13f05671a
                0x13f056721
                0x13f056728
                0x13f056737
                0x13f056743
                0x13f056748
                0x13f056750
                0x13f056755
                0x13f05675e
                0x13f056767
                0x13f05676c
                0x13f056774
                0x13f056779
                0x13f056780
                0x13f056784
                0x13f056792
                0x13f05679a
                0x13f0567a0
                0x13f0567a5
                0x13f0567ba
                0x13f0567bf
                0x13f0567c6
                0x13f0567cb
                0x13f0567cd
                0x13f0567d4
                0x13f0567d9
                0x13f0567e1
                0x13f0567ed
                0x13f0567f8
                0x13f0567fe
                0x13f056806
                0x13f056809
                0x13f056811
                0x13f05681c
                0x13f056825
                0x13f05682f
                0x13f056834
                0x13f056837
                0x13f05683c
                0x13f056840
                0x13f056845
                0x13f056849
                0x13f05684d
                0x13f05685f
                0x13f056864
                0x13f056868
                0x13f056871
                0x13f056875
                0x13f05687a
                0x13f056882
                0x13f056888
                0x13f056893
                0x13f0568a1
                0x13f0568ad
                0x13f0568b0
                0x13f0568c5
                0x13f0568c9
                0x13f0568d6
                0x13f0568d8
                0x13f0568da
                0x13f0568df
                0x13f0568e7
                0x13f0568f5
                0x13f0568f9
                0x13f056901
                0x13f056909
                0x13f05690d
                0x13f056913
                0x13f05691e
                0x13f05692b
                0x13f056931
                0x13f056934
                0x13f056937
                0x13f05693a
                0x13f056946
                0x13f05694a
                0x13f056950
                0x13f056952
                0x13f05695a
                0x13f056967
                0x13f05696d
                0x13f056975
                0x13f056977
                0x13f05697a
                0x13f05697d
                0x13f056983
                0x13f056986
                0x13f056989
                0x13f05698c
                0x13f05698f
                0x13f056998
                0x13f05699c
                0x13f0569a2
                0x13f0569a4
                0x13f0569ac
                0x13f0569b8
                0x13f0569bb
                0x13f0569c2
                0x13f0569cb
                0x13f0569d1
                0x13f0569d3
                0x13f0569db
                0x13f0569e2
                0x13f0569e4
                0x13f0569ef
                0x13f0569f6
                0x13f0569f8
                0x13f0569ff
                0x13f056a04
                0x13f056a0c
                0x13f056a17
                0x13f056a1f
                0x13f056a23
                0x13f056a29
                0x13f056a2d
                0x13f056a32
                0x13f056a3f
                0x13f056a41
                0x13f056a43
                0x13f056a46
                0x13f056a4b
                0x13f056a4d
                0x13f056a56
                0x13f056a5e
                0x13f056a62
                0x13f056a6d
                0x13f056a74
                0x13f056a85
                0x13f056a91
                0x13f056aa2
                0x13f056aa6
                0x13f056ab3
                0x13f056ab5
                0x13f056ab7
                0x13f056abc
                0x13f056ac4
                0x13f056ad2
                0x13f056ad6
                0x13f056ade
                0x13f056ae2
                0x13f056ae8
                0x13f056af3
                0x13f056b00
                0x13f056b06
                0x13f056b09
                0x13f056b0c
                0x13f056b0f
                0x13f056b1b
                0x13f056b1f
                0x13f056b25
                0x13f056b27
                0x13f056b32
                0x13f056b3f
                0x13f056b45
                0x13f056b4d
                0x13f056b4f
                0x13f056b52
                0x13f056b55
                0x13f056b5b
                0x13f056b5e
                0x13f056b61
                0x13f056b64
                0x13f056b67
                0x13f056b70
                0x13f056b74
                0x13f056b7a
                0x13f056b7c
                0x13f056b84
                0x13f056b8b
                0x13f056b98
                0x13f056b9b
                0x13f056ba2
                0x13f056ba8
                0x13f056bb1
                0x13f056bb6
                0x13f056bbe
                0x13f056bc3
                0x13f056bd0
                0x13f056bda
                0x13f056be2
                0x13f056be6
                0x13f056bec
                0x13f056bf0
                0x13f056bf4
                0x13f056c01
                0x13f056c03
                0x13f056c05
                0x13f056c08
                0x13f056c0d
                0x13f056c0f
                0x13f056c18
                0x13f056c1e
                0x13f056c20
                0x13f056c24
                0x13f056c2b
                0x13f056c36
                0x13f056c3c
                0x13f056c43
                0x13f056c48
                0x13f056c4a
                0x13f056c50
                0x13f056c5a
                0x13f056c5c
                0x13f056c63
                0x13f056c68
                0x13f056c70
                0x13f056c75
                0x13f056c7b
                0x13f056c83
                0x13f056c8b
                0x13f056c95
                0x13f056c99
                0x13f056ca0
                0x13f056ca7
                0x13f056cb0
                0x13f056cb4
                0x13f056cb9
                0x13f056cbc
                0x13f056cbf
                0x13f056cca
                0x13f056cd5
                0x13f056cd8
                0x13f056cde
                0x13f056ce0
                0x13f056ce9
                0x13f056cef
                0x13f056cff
                0x13f056d0a
                0x13f056d0d
                0x13f056d10
                0x13f056d13
                0x13f056d18
                0x13f056d20
                0x13f056d28
                0x13f056d32
                0x13f056d3b
                0x13f056d42
                0x13f056d4f
                0x13f056d51
                0x13f056d53
                0x13f056d5c
                0x13f056d5e
                0x13f056d61
                0x13f056d66
                0x13f056d70
                0x13f056d75
                0x13f056d89
                0x13f056d8b
                0x13f056d90
                0x13f056d92
                0x13f056d97
                0x13f056d9f
                0x13f056da3
                0x13f056dac
                0x13f056db4
                0x13f056db9
                0x13f056dc2
                0x13f056deb
                0x13f056df4
                0x13f056df9
                0x13f056e01
                0x13f056e06
                0x13f056e09
                0x13f056e11
                0x13f056e14
                0x13f056e16
                0x13f056e1e
                0x13f056e28
                0x13f056e35
                0x13f056e3c
                0x13f056e41
                0x13f056e45
                0x13f056e54
                0x13f056e59
                0x13f056e5f
                0x13f056e65
                0x13f056e67
                0x13f056e6e
                0x13f056e73
                0x13f056e7b
                0x13f056e80
                0x13f056e8a
                0x13f056e8f
                0x13f056e93
                0x13f056e98
                0x13f056e9c
                0x13f056ea0
                0x13f056eab
                0x13f056eb3
                0x13f056ebe
                0x13f056ec6
                0x13f056ed1
                0x13f056ed9
                0x13f056edf
                0x13f056ee4
                0x13f056eec
                0x13f056ef1
                0x13f056ef6
                0x13f056efb
                0x13f056f00
                0x13f056f05
                0x13f056f0a
                0x13f056f13
                0x13f056f18
                0x13f056f1d
                0x13f056f24
                0x13f056f27
                0x13f056f36
                0x13f056f38
                0x13f056f3d
                0x13f056f3f
                0x13f056f44
                0x13f056f49
                0x13f056f4d
                0x13f056f52
                0x13f056f5c
                0x13f056f64
                0x13f056f66
                0x13f056f69
                0x13f056f6c
                0x13f056f6e
                0x13f056f74
                0x13f056f82
                0x13f056f8d
                0x13f056f9b
                0x13f056fa3
                0x13f056fa8
                0x13f056fb2
                0x13f056fbc
                0x13f056fc3
                0x13f056fda

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                • API String ID: 0-2665694366
                • Opcode ID: eee67f51a6a82cb7828b23c924b7f44b4512b6861f71896c0feb9d36f8b86a20
                • Instruction ID: 86c3323ec7298bf3e16d8cf09f1cc3dbbe368d72bc281b73c9ca51ec4a1bd311
                • Opcode Fuzzy Hash: eee67f51a6a82cb7828b23c924b7f44b4512b6861f71896c0feb9d36f8b86a20
                • Instruction Fuzzy Hash: 5652D472B186A9C7D7988B18D49CBBE77AEE784344F11413DF68A83781DB79CA45CB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 73%
                			E0000000113F055AC4(signed int __ebx, void* __edi, void* __ebp, signed char* __rsi, signed long long __r8, void* __r9, void* __r11, signed long long __r12, void* __r13, void* __r14, long long __r15) {
                				signed int _t533;
                				signed int _t543;
                				signed int _t544;
                				intOrPtr _t555;
                				void* _t556;
                				signed int _t577;
                				signed int _t580;
                				unsigned int _t582;
                				unsigned int _t586;
                				signed int _t602;
                				signed int _t604;
                				signed int _t611;
                				signed char _t616;
                				signed int _t629;
                				signed char _t634;
                				unsigned int _t641;
                				void* _t642;
                				signed int _t651;
                				signed int _t665;
                				signed int _t674;
                				signed int _t676;
                				signed int _t678;
                				signed int _t680;
                				signed int _t682;
                				signed int _t684;
                				signed int _t685;
                				void* _t686;
                				signed int _t689;
                				signed int _t690;
                				signed int _t691;
                				signed int _t693;
                				void* _t694;
                				signed int _t695;
                				void* _t696;
                				signed int _t697;
                				void* _t698;
                				signed int _t699;
                				void* _t700;
                				signed int _t702;
                				signed int _t703;
                				void* _t704;
                				signed int _t706;
                				signed int _t707;
                				void* _t708;
                				signed int _t710;
                				void* _t711;
                				signed int _t712;
                				signed int _t713;
                				void* _t714;
                				signed int _t716;
                				void* _t717;
                				signed int _t718;
                				signed int _t720;
                				signed int _t721;
                				signed int _t725;
                				signed char _t737;
                				signed char _t755;
                				signed char _t758;
                				signed int _t760;
                				signed char _t761;
                				signed int _t765;
                				signed char _t782;
                				signed char _t786;
                				signed char _t816;
                				signed char _t819;
                				signed char _t825;
                				signed char _t849;
                				signed char _t852;
                				signed char _t858;
                				void* _t860;
                				intOrPtr _t861;
                				void* _t865;
                				signed int _t876;
                				signed int _t892;
                				signed char _t897;
                				void* _t899;
                				void* _t903;
                				void* _t907;
                				signed char _t919;
                				signed char _t924;
                				intOrPtr _t926;
                				void* _t928;
                				void* _t929;
                				void* _t930;
                				signed char _t931;
                				void* _t932;
                				void* _t933;
                				void* _t934;
                				void* _t935;
                				void* _t936;
                				intOrPtr _t937;
                				void* _t938;
                				void* _t939;
                				void* _t940;
                				void* _t941;
                				void* _t942;
                				void* _t943;
                				void* _t944;
                				intOrPtr _t945;
                				intOrPtr _t946;
                				void* _t947;
                				void* _t948;
                				void* _t949;
                				void* _t950;
                				void* _t951;
                				void* _t952;
                				void* _t953;
                				void* _t955;
                				unsigned int _t957;
                				signed int _t958;
                				unsigned int _t959;
                				signed int _t961;
                				unsigned int _t962;
                				signed char _t964;
                				signed int _t968;
                				signed int _t973;
                				unsigned int _t974;
                				unsigned int _t977;
                				unsigned int _t978;
                				signed int _t980;
                				signed int _t981;
                				signed int _t982;
                				signed int _t983;
                				unsigned int _t984;
                				unsigned int _t986;
                				unsigned int _t991;
                				unsigned int _t994;
                				unsigned int _t997;
                				signed int _t1000;
                				unsigned int _t1001;
                				unsigned int _t1004;
                				signed int _t1006;
                				unsigned int _t1007;
                				signed int _t1010;
                				unsigned int _t1011;
                				signed int _t1013;
                				unsigned int _t1014;
                				signed int* _t1021;
                				intOrPtr _t1042;
                				intOrPtr _t1071;
                				void* _t1087;
                				void* _t1122;
                				void* _t1134;
                				intOrPtr _t1209;
                				intOrPtr _t1211;
                				intOrPtr _t1212;
                				intOrPtr _t1213;
                				intOrPtr _t1214;
                				intOrPtr _t1215;
                				intOrPtr _t1216;
                				intOrPtr _t1218;
                				signed long long _t1223;
                				long long _t1224;
                				signed long long _t1227;
                				signed long long _t1228;
                				long long _t1231;
                				signed long long _t1235;
                				signed long long _t1237;
                				signed long long _t1240;
                				void* _t1243;
                				intOrPtr _t1245;
                				void* _t1246;
                				signed long long _t1250;
                				signed long long _t1251;
                				signed long long _t1252;
                				signed long long _t1254;
                				signed long long _t1255;
                				signed long long _t1256;
                				signed int* _t1257;
                				intOrPtr _t1262;
                				intOrPtr _t1265;
                				intOrPtr _t1267;
                				signed char* _t1268;
                				signed char* _t1285;
                				signed char* _t1286;
                				signed char* _t1287;
                				signed char* _t1288;
                				signed char* _t1289;
                				signed char* _t1290;
                				signed char* _t1291;
                				signed char* _t1292;
                				signed char* _t1293;
                				signed char* _t1294;
                				signed char* _t1295;
                				signed char* _t1296;
                				signed char* _t1297;
                				signed char* _t1298;
                				signed char* _t1299;
                				signed char* _t1300;
                				signed char* _t1301;
                				signed char* _t1303;
                				signed char* _t1304;
                				signed char* _t1305;
                				signed char* _t1306;
                				signed char* _t1307;
                				signed char* _t1308;
                				signed char* _t1309;
                				signed char* _t1310;
                				void* _t1313;
                				void* _t1315;
                				signed long long _t1317;
                				intOrPtr _t1319;
                				char* _t1326;
                				char* _t1327;
                				long long _t1328;
                				intOrPtr _t1329;
                				intOrPtr _t1330;
                				intOrPtr _t1331;
                				intOrPtr _t1332;
                				void* _t1333;
                				signed long long _t1334;
                				long long _t1341;
                
                				_t1334 = __r12;
                				_t1333 = __r11;
                				_t1317 = __r8;
                				if (__ebx - 0x10 >= 0) goto 0x3f055aee;
                				if (__edi == 0) goto 0x3f05615f;
                				_t928 = __edi - 1;
                				_t957 = __ebp + (( *__rsi & 0x000000ff) << __ebx);
                				_t1285 =  &(__rsi[1]);
                				if (__ebx + 8 - 0x10 < 0) goto 0x3f055ad0;
                				 *(__r13 + 0x18) = _t957;
                				if (bpl == 8) goto 0x3f055b11;
                				 *(__r12 + 0x20) = "unknown compression method";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				if ((_t957 & 0x0000e000) == 0) goto 0x3f055b32;
                				 *(__r12 + 0x20) = "unknown header flags set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				_t1257 =  *((intOrPtr*)(__r13 + 0x28));
                				_t725 = _t957 >> 8;
                				_t1021 = _t1257;
                				if (_t1021 == 0) goto 0x3f055b4d;
                				 *_t1257 = _t725 & 0x00000001;
                				asm("bt eax, 0x9");
                				if (_t1021 >= 0) goto 0x3f055b7b;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055b7b;
                				 *(_t1315 + 0x30) = bpl;
                				 *(_t1315 + 0x31) = _t725;
                				r8d = 2;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1315 + 0x30);
                				_t958 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f36;
                				_t674 = r15d;
                				if (_t674 - 0x20 >= 0) goto 0x3f055bae;
                				if (_t928 == 0) goto 0x3f05615f;
                				_t929 = _t928 - 1;
                				_t959 = _t958 + (( *_t1285 & 0x000000ff) << _t674);
                				_t1286 =  &(_t1285[1]);
                				if (_t674 + 8 - 0x20 < 0) goto 0x3f055b90;
                				_t1209 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1209 == 0) goto 0x3f055bba;
                				 *(_t1209 + 4) = _t959;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055c02;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055c02;
                				 *(_t1315 + 0x30) = bpl;
                				 *(_t1315 + 0x31) = _t959 >> 8;
                				r8d = 4;
                				 *((char*)(_t1315 + 0x32)) = _t959 >> 0x10;
                				 *(_t1315 + 0x33) = bpl;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1315 + 0x30);
                				_t961 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f37;
                				_t676 = r15d;
                				if (_t676 - 0x10 >= 0) goto 0x3f055c35;
                				if (_t929 == 0) goto 0x3f05615f;
                				_t930 = _t929 - 1;
                				_t962 = _t961 + (( *_t1286 & 0x000000ff) << _t676);
                				_t1287 =  &(_t1286[1]);
                				if (_t676 + 8 - 0x10 < 0) goto 0x3f055c17;
                				_t1245 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1245 == 0) goto 0x3f055c53;
                				 *(_t1245 + 8) = bpl & 0xffffffff;
                				 *( *((intOrPtr*)(__r13 + 0x28)) + 0xc) = _t962 >> 8;
                				goto 0x3f055c58;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055c8a;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055c8a;
                				 *(_t1315 + 0x30) = bpl;
                				 *(_t1315 + 0x31) = _t962 >> 8;
                				r8d = 2;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1315 + 0x30);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f38;
                				_t678 = r15d;
                				if (( *(__r13 + 0x18) & 0x00000400) == 0) goto 0x3f055d13;
                				if (_t678 - 0x10 >= 0) goto 0x3f055cc5;
                				if (_t930 == 0) goto 0x3f05615f;
                				_t931 = _t930 - 1;
                				_t964 = r15d + (( *_t1287 & 0x000000ff) << _t678);
                				_t1288 =  &(_t1287[1]);
                				if (_t678 + 8 - 0x10 < 0) goto 0x3f055ca7;
                				_t1211 =  *((intOrPtr*)(__r13 + 0x28));
                				 *(__r13 + 0x50) = _t964;
                				if (_t1211 == 0) goto 0x3f055cd5;
                				 *(_t1211 + 0x18) = _t964;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055d0b;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055d0b;
                				 *(_t1315 + 0x30) = bpl;
                				r8d = 2;
                				 *(_t1315 + 0x31) = bpl;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1315 + 0x30);
                				_t680 = r15d;
                				goto 0x3f055d20;
                				_t1212 =  *((intOrPtr*)(__r13 + 0x28));
                				_t1042 = _t1212;
                				if (_t1042 == 0) goto 0x3f055d20;
                				 *((long long*)(_t1212 + 0x10)) = __r15;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f39;
                				asm("bt eax, 0xa");
                				if (_t1042 >= 0) goto 0x3f055dc6;
                				_t737 =  *(__r13 + 0x50);
                				r14d = _t931;
                				r14d =  <=  ? _t737 : r14d;
                				if (r14d == 0) goto 0x3f055dbe;
                				_t1262 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1262 == 0) goto 0x3f055d8d;
                				_t1329 =  *((intOrPtr*)(_t1262 + 0x10));
                				if (_t1329 == 0) goto 0x3f055d8d;
                				r8d =  *(_t1262 + 0x1c);
                				r9d =  *(_t1262 + 0x18);
                				r9d = r9d - _t737;
                				_t519 =  >  ? r8d - r9d : r14d;
                				_t1246 = _t1245 + _t1329;
                				r8d =  >  ? r8d - r9d : r14d;
                				E0000000113F0593C0( >  ? r8d - r9d : r14d, _t1246, _t1288, __r8);
                				asm("bt eax, 0x9");
                				if (__r14 + __r9 - r8d >= 0) goto 0x3f055dad;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055dad;
                				r8d = r14d;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1288);
                				_t932 = _t931 - r14d;
                				_t1289 =  &(_t1288[_t1212]);
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) - r14d;
                				if ( *(__r13 + 0x50) != 0) goto 0x3f05615f;
                				 *(__r13 + 0x50) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3a;
                				if (( *(__r13 + 0x18) & 0x00000800) == 0) goto 0x3f055e63;
                				if (_t932 == 0) goto 0x3f05615f;
                				r14d = r15d;
                				r14d = r14d + 1;
                				r15d =  *(_t1212 + _t1289) & 0x000000ff;
                				_t1213 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1213 == 0) goto 0x3f055e1e;
                				_t1265 =  *((intOrPtr*)(_t1213 + 0x20));
                				if (_t1265 == 0) goto 0x3f055e1e;
                				if ( *(__r13 + 0x50) -  *((intOrPtr*)(_t1213 + 0x28)) >= 0) goto 0x3f055e1e;
                				 *((intOrPtr*)(_t1246 + _t1265)) = r15b;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + 1;
                				if (r15b == 0) goto 0x3f055e28;
                				if (r14d - _t932 < 0) goto 0x3f055df0;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055e4c;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055e4c;
                				r8d = r14d;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1289);
                				_t933 = _t932 - r14d;
                				_t1290 =  &(_t1289[_t1213]);
                				if (r15b != 0) goto 0x3f05615f;
                				r15d = 0;
                				goto 0x3f055e70;
                				_t1214 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1214 == 0) goto 0x3f055e70;
                				 *((long long*)(_t1214 + 0x20)) = __r15;
                				 *(__r13 + 0x50) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3b;
                				if (( *(__r13 + 0x18) & 0x00001000) == 0) goto 0x3f055f04;
                				if (_t933 == 0) goto 0x3f05615f;
                				r14d = r15d;
                				r14d = r14d + 1;
                				r15d =  *(_t1214 + _t1290) & 0x000000ff;
                				_t1215 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1215 == 0) goto 0x3f055ebf;
                				_t1267 =  *((intOrPtr*)(_t1215 + 0x30));
                				if (_t1267 == 0) goto 0x3f055ebf;
                				if ( *(__r13 + 0x50) -  *((intOrPtr*)(_t1215 + 0x38)) >= 0) goto 0x3f055ebf;
                				 *((intOrPtr*)(_t1246 + _t1267)) = r15b;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + 1;
                				if (r15b == 0) goto 0x3f055ec9;
                				if (r14d - _t933 < 0) goto 0x3f055e91;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055eed;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055eed;
                				r8d = r14d;
                				_t1268 = _t1290;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1268);
                				_t934 = _t933 - r14d;
                				_t1291 =  &(_t1290[_t1215]);
                				if (r15b != 0) goto 0x3f05615f;
                				r15d = 0;
                				goto 0x3f055f11;
                				_t1216 =  *((intOrPtr*)(__r13 + 0x28));
                				_t1071 = _t1216;
                				if (_t1071 == 0) goto 0x3f055f11;
                				 *((long long*)(_t1216 + 0x30)) = __r15;
                				r10d =  *(_t1315 + 0xb8);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3c;
                				asm("bt edx, 0x9");
                				if (_t1071 >= 0) goto 0x3f055f7a;
                				if (_t680 - 0x10 >= 0) goto 0x3f055f4e;
                				if (_t934 == 0) goto 0x3f05615f;
                				_t935 = _t934 - 1;
                				_t1292 =  &(_t1291[1]);
                				if (_t680 + 8 - 0x10 < 0) goto 0x3f055f30;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055f74;
                				if (r15d + (( *_t1291 & 0x000000ff) << _t680) == ( *(__r13 + 0x20) & 0x0000ffff)) goto 0x3f055f74;
                				 *(__r12 + 0x20) = "header crc mismatch";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t968 = r15d;
                				_t682 = r15d;
                				_t1218 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1218 == 0) goto 0x3f055f97;
                				 *(_t1218 + 0x3c) =  *(__r13 + 0x18) >> 0x00000009 & 0x00000001;
                				_t1219 =  *((intOrPtr*)(__r13 + 0x28));
                				 *( *((intOrPtr*)(__r13 + 0x28)) + 0x40) = 1;
                				r8d = 0;
                				_t533 = E0000000113F057780(_t1268);
                				 *(__r13 + 0x20) = _t533;
                				 *(__r12 + 0x4c) = _t533;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3f;
                				r10d =  *(_t1315 + 0xb8);
                				_t1319 =  *((intOrPtr*)(_t1315 + 0x40));
                				_t152 = _t1268 - 0x3f34; // 0x14
                				if (_t152 - 0x1e > 0) goto 0x3f056fc5;
                				r8d =  *(_t1315 + 0xa0);
                				r15d = 0;
                				r14d =  *(_t1315 + 0xa8);
                				if (_t682 - 0x20 >= 0) goto 0x3f05600f;
                				if (_t935 == 0) goto 0x3f05615f;
                				_t936 = _t935 - 1;
                				_t969 = _t968 + (( *_t1292 & 0x000000ff) << _t682);
                				_t1293 =  &(_t1292[1]);
                				if (_t682 + 8 - 0x20 < 0) goto 0x3f055ff1;
                				_t684 = r15d;
                				_t543 = (_t968 + (( *_t1292 & 0x000000ff) << _t682) >> 0x00000008 & 0x0000ff00) + ((_t968 + (( *_t1292 & 0x000000ff) << _t682) & 0x0000ff00) + (_t969 << 0x10) << 8) + (_t969 >> 0x18);
                				 *(__r13 + 0x20) = _t543;
                				 *(__r12 + 0x4c) = _t543;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3e;
                				if ( *((intOrPtr*)(__r13 + 0x14)) == 0) goto 0x3f056e80;
                				r8d = 0;
                				_t544 = E0000000113F057490(0, _t1219, _t1268, __r8, _t1319);
                				r10d =  *(_t1315 + 0xb8);
                				 *(__r13 + 0x20) = _t544;
                				 *(__r12 + 0x4c) = _t544;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3f;
                				if (__r14 - 5 - 1 <= 0) goto 0x3f05615f;
                				if ( *(__r13 + 0xc) == 0) goto 0x3f0560a3;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4e;
                				_t755 = _t684 & 0x00000007;
                				_t685 = _t684 - _t755;
                				goto 0x3f055fbc;
                				if (_t685 - 3 >= 0) goto 0x3f0560c6;
                				if (_t936 == 0) goto 0x3f05615f;
                				_t937 = _t936 - 1;
                				_t973 = (r15d >> _t755) + (( *_t1293 & 0x000000ff) << _t685);
                				_t1294 =  &(_t1293[1]);
                				_t686 = _t685 + 8;
                				_t1087 = _t686 - 3;
                				if (_t1087 < 0) goto 0x3f0560a8;
                				_t974 = _t973 >> 1;
                				 *(__r13 + 0xc) = _t973 & 0x00000001;
                				if (_t1087 == 0) goto 0x3f0561fd;
                				if (_t1087 == 0) goto 0x3f056121;
                				if (_t1087 == 0) goto 0x3f05610e;
                				if ((_t974 & 0x00000003) != 1) goto 0x3f056205;
                				 *(__r12 + 0x20) = "invalid block type";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f44;
                				goto 0x3f055fbc;
                				 *(__r13 + 0x70) = 9;
                				 *((long long*)(__r13 + 0x60)) = 0x3f074040;
                				 *((long long*)(__r13 + 0x68)) = 0x3f074840;
                				 *((intOrPtr*)(__r13 + 0x74)) = 5;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f47;
                				if (r14d != 6) goto 0x3f056205;
                				_t977 = _t974 >> 2 >> 2 >> 2;
                				_t689 = _t686 + 0x2fffffff7;
                				r14d =  *(_t1315 + 0xa0);
                				r15d =  *(_t1315 + 0xb0);
                				 *((long long*)(__r12 + 0x10)) =  *((intOrPtr*)(_t1315 + 0x40));
                				 *(__r12 + 0x18) =  *(_t1315 + 0xb8);
                				 *__r12 = _t1294;
                				 *((intOrPtr*)(__r12 + 8)) = _t937;
                				 *(__r13 + 0x48) = _t977;
                				 *(__r13 + 0x4c) = _t689;
                				if ( *((intOrPtr*)(__r13 + 0x34)) != 0) goto 0x3f0561ce;
                				if (r14d ==  *(__r12 + 0x18)) goto 0x3f056ef1;
                				_t555 =  *((intOrPtr*)(__r13 + 8));
                				if (_t555 - 0x3f51 >= 0) goto 0x3f056ef1;
                				if (_t555 - 0x3f4e < 0) goto 0x3f0561ce;
                				if ( *(_t1315 + 0xa8) == 4) goto 0x3f056ef1;
                				r8d = r14d;
                				r8d = r8d -  *(__r12 + 0x18);
                				_t556 = E0000000113F057380(0x3f074840, _t1243, __r12,  *((intOrPtr*)(__r12 + 0x10)), _t1313); // executed
                				if (_t556 == 0) goto 0x3f056ef1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f52;
                				goto 0x3f056fca;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f41;
                				_t978 = _t977 >> 2;
                				_t690 = _t689 + 0xfffffffd;
                				_t758 = _t690 & 0x00000007;
                				_t691 = _t690 - _t758;
                				if (_t691 - 0x20 >= 0) goto 0x3f05623e;
                				if (_t937 == 0) goto 0x3f05615f;
                				_t938 = _t937 - 1;
                				_t980 = (_t978 >> _t758) + (( *_t1294 & 0x000000ff) << _t691);
                				_t1295 =  &(_t1294[1]);
                				if (_t691 + 8 - 0x20 < 0) goto 0x3f056220;
                				_t760 = _t980 & 0x0000ffff;
                				if (_t760 ==  !_t980 >> 0x10) goto 0x3f056265;
                				_t1223 = "invalid stored block lengths";
                				 *(__r12 + 0x20) = _t1223;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x50) = _t760;
                				_t981 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f42;
                				_t693 = r15d;
                				if (r14d == 6) goto 0x3f05615f;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f43;
                				_t761 =  *(__r13 + 0x50);
                				if (_t761 == 0) goto 0x3f0562eb;
                				r14d = r10d;
                				_t564 =  <=  ? _t761 : _t938;
                				r14d =  <=  ?  <=  ? _t761 : _t938 : r14d;
                				if (r14d == 0) goto 0x3f05615f;
                				r8d = r14d;
                				E0000000113F0593C0( <=  ? _t761 : _t938, _t1319, _t1295, __r8);
                				r10d =  *(_t1315 + 0xb8);
                				_t939 = _t938 - r14d;
                				r10d = r10d - r14d;
                				 *(_t1315 + 0xb8) = r10d;
                				_t1296 =  &(_t1295[_t1223]);
                				 *((long long*)(_t1315 + 0x40)) =  *((intOrPtr*)(_t1315 + 0x40)) + _t1223;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) - r14d;
                				goto 0x3f055fc1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3f;
                				if (_t693 - 0xe >= 0) goto 0x3f05631e;
                				if (_t939 == 0) goto 0x3f05615f;
                				_t940 = _t939 - 1;
                				_t982 = _t981 + (( *_t1296 & 0x000000ff) << _t693);
                				_t1297 =  &(_t1296[1]);
                				_t694 = _t693 + 8;
                				if (_t694 - 0xe < 0) goto 0x3f056300;
                				_t695 = _t694 + 0xfffffff2;
                				_t983 = _t982 >> 5;
                				_t765 = (_t982 & 0x0000001f) + 0x101;
                				_t984 = _t983 >> 5;
                				 *(__r13 + 0x7c) = _t765;
                				_t892 = (_t983 & 0x0000001f) + 1;
                				 *(__r13 + 0x80) = _t892;
                				 *((intOrPtr*)(__r13 + 0x78)) = (_t984 & 0x0000000f) + 4;
                				if (_t765 - 0x11e > 0) goto 0x3f056480;
                				if (_t892 - 0x1e > 0) goto 0x3f056480;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f45;
                				if ( *(__r13 + 0x84) -  *((intOrPtr*)(__r13 + 0x78)) >= 0) goto 0x3f0563e8;
                				if (_t695 - 3 >= 0) goto 0x3f0563ae;
                				if (_t940 == 0) goto 0x3f05615f;
                				_t941 = _t940 - 1;
                				_t986 = (_t984 >> 4) + (( *_t1297 & 0x000000ff) << _t695);
                				_t1298 =  &(_t1297[1]);
                				_t696 = _t695 + 8;
                				if (_t696 - 3 < 0) goto 0x3f056390;
                				_t697 = _t696 + 0xfffffffd;
                				 *(__r13 + 0x90 + _t1223 * 2) = _t986 & 7;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				_t577 =  *(__r13 + 0x84);
                				if (_t577 -  *((intOrPtr*)(__r13 + 0x78)) < 0) goto 0x3f056384;
                				if (_t577 - 0x13 >= 0) goto 0x3f05641a;
                				 *(__r13 + 0x90 + _t1223 * 2) = r15w;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				if ( *(__r13 + 0x84) - 0x13 < 0) goto 0x3f0563f0;
                				_t1250 = __r13 + 0x70;
                				_t1224 = __r13 + 0x550;
                				 *_t1250 = 7;
                				 *((long long*)(__r13 + 0x60)) = _t1224;
                				 *((long long*)(__r13 + 0x88)) = _t1224;
                				 *((long long*)(_t1315 + 0x28)) = __r13 + 0x310;
                				 *(_t1315 + 0x20) = _t1250;
                				_t241 = _t1250 + 0x13; // 0x13
                				r8d = _t241;
                				_t580 = E0000000113F057AC0(0, __r13 + 0x90, _t1313, __r13 + 0x88, __r12);
                				 *(_t1315 + 0xb0) = _t580;
                				if (_t580 == 0) goto 0x3f056499;
                				 *(_t1334 + 0x20) = "invalid code lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1227 = "too many length or distance symbols";
                				 *(_t1334 + 0x20) = _t1227;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f46;
                				r10d =  *(__r13 + 0x7c);
                				if ( *(__r13 + 0x84) -  *(__r13 + 0x80) + r10d >= 0) goto 0x3f0566c2;
                				r9d = 1;
                				_t1330 =  *((intOrPtr*)(__r13 + 0x60));
                				r9d = r9d <<  *(__r13 + 0x70);
                				r9d = r9d - 1;
                				_t1251 = _t1250 & _t1227;
                				_t582 =  *(_t1330 + _t1251 * 4);
                				r8d = _t582;
                				r8d = r8d >> 0x10;
                				 *(_t1315 + 0x34) = _t582;
                				if ((_t582 >> 0x00000008 & 0x000000ff) - _t697 <= 0) goto 0x3f056543;
                				if (_t941 == 0) goto 0x3f05615f;
                				_t942 = _t941 - 1;
                				_t1299 =  &(_t1298[1]);
                				_t698 = _t697 + 8;
                				_t1228 = _t1227 & _t1251;
                				_t586 =  *(_t1330 + _t1228 * 4);
                				_t897 = _t586 >> 8;
                				r8d = _t586;
                				r8d = r8d >> 0x10;
                				 *(_t1315 + 0x34) = _t586;
                				if ((_t897 & 0x000000ff) - _t698 > 0) goto 0x3f056507;
                				_t1122 = r8w - 0x10;
                				if (_t1122 >= 0) goto 0x3f05657a;
                				_t699 = _t698 - (_t897 & 0x000000ff);
                				 *((short*)(__r13 + 0x90 + _t1251 * 2)) = _t586 >> 0x10;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				r8d =  *(__r13 + 0x84);
                				goto 0x3f0566a7;
                				if (_t1122 != 0) goto 0x3f0565d9;
                				_t899 = (_t897 & 0x000000ff) + 2;
                				if (_t699 - _t899 >= 0) goto 0x3f0565a3;
                				if (_t942 == 0) goto 0x3f05615f;
                				_t943 = _t942 - 1;
                				_t1300 =  &(_t1299[1]);
                				_t700 = _t699 + 8;
                				if (_t700 - _t899 < 0) goto 0x3f056586;
                				_t782 =  *(_t1315 + 0x35) & 0x000000ff;
                				_t991 = ((_t986 >> 3) + (( *_t1298 & 0x000000ff) << _t697) >> (_t897 & 0x000000ff)) + (( *_t1299 & 0x000000ff) << _t699) >> _t782;
                				if ( *(__r13 + 0x84) == 0) goto 0x3f0566f2;
                				_t702 = _t700 - _t782 + 0xfffffffe;
                				r9d =  *(__r13 + 0x90 + _t1228 * 2) & 0x0000ffff;
                				goto 0x3f056663;
                				if (r8w != 0x11) goto 0x3f056620;
                				_t903 = (_t991 & 0x00000003) + 6;
                				if (_t702 - _t903 >= 0) goto 0x3f056604;
                				if (_t943 == 0) goto 0x3f05615f;
                				_t944 = _t943 - 1;
                				_t1301 =  &(_t1300[1]);
                				_t703 = _t702 + 8;
                				if (_t703 - _t903 < 0) goto 0x3f0565e7;
                				_t994 = (_t991 >> 2) + (( *_t1300 & 0x000000ff) << _t702) >> ( *(_t1315 + 0x35) & 0x000000ff);
                				r9d = r15d;
                				goto 0x3f05665f;
                				_t907 = (_t994 & 0x00000007) + 0xa;
                				if (_t703 - _t907 >= 0) goto 0x3f056644;
                				if (_t944 == 0) goto 0x3f05615f;
                				_t945 = _t944 - 1;
                				_t704 = _t703 + 8;
                				if (_t704 - _t907 < 0) goto 0x3f056627;
                				_t786 =  *(_t1315 + 0x35) & 0x000000ff;
                				_t997 = (_t994 >> 3) + (( *_t1301 & 0x000000ff) << _t703) >> _t786;
                				r9d = r15w & 0xffffffff;
                				_t1134 =  *(__r13 + 0x84) + (_t997 & 0x0000007f) + 0xb -  *(__r13 + 0x80) +  *(__r13 + 0x7c);
                				if (_t1134 > 0) goto 0x3f0566f2;
                				 *(__r13 + 0x90 + _t1228 * 2) = r9w;
                				r8d =  *(__r13 + 0x84);
                				r8d = __r8 + 1;
                				 *(__r13 + 0x84) = r8d;
                				if (_t1134 != 0) goto 0x3f056680;
                				r10d =  *(__r13 + 0x7c);
                				if (r8d -  *(__r13 + 0x80) + r10d < 0) goto 0x3f0564d0;
                				if ( *((intOrPtr*)(__r13 + 8)) == 0x3f51) goto 0x3f055fb4;
                				if ( *((short*)(__r13 + 0x290)) != 0) goto 0x3f05670b;
                				 *(_t1334 + 0x20) = "invalid code -- missing end-of-block";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(_t1334 + 0x20) = "invalid bit length repeat";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1231 = __r13 + 0x550;
                				 *(__r13 + 0x70) = 9;
                				 *((long long*)(__r13 + 0x88)) = _t1231;
                				_t1341 = __r13 + 0x310;
                				 *((long long*)(__r13 + 0x60)) = _t1231;
                				 *((long long*)(_t1315 + 0x28)) = _t1341;
                				 *(_t1315 + 0x20) = __r13 + 0x70;
                				r8d = r10d;
                				_t602 = E0000000113F057AC0(1, __r13 + 0x90, _t1313, __r13 + 0x88, _t1334);
                				 *(_t1315 + 0xb0) = _t602;
                				if (_t602 == 0) goto 0x3f056779;
                				 *(_t1334 + 0x20) = "invalid literal/lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1234 =  *((intOrPtr*)(__r13 + 0x88));
                				_t1252 = __r13 + 0x74;
                				r8d =  *(__r13 + 0x80);
                				 *((long long*)(__r13 + 0x68)) =  *((intOrPtr*)(__r13 + 0x88));
                				 *_t1252 = 6;
                				 *((long long*)(_t1315 + 0x28)) = _t1341;
                				 *(_t1315 + 0x20) = _t1252;
                				_t604 = E0000000113F057AC0(2, 0x90 + _t1234 * 2 + __r13, _t1313, __r13 + 0x88, _t1334);
                				 *(_t1315 + 0xb0) = _t604;
                				r15d = _t604;
                				if (_t604 == 0) goto 0x3f0567e6;
                				_t1235 = "invalid distances set";
                				 *(_t1334 + 0x20) = _t1235;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f47;
                				if ( *(_t1315 + 0xa8) == 6) goto 0x3f056ee4;
                				r8d =  *(_t1315 + 0xa0);
                				r15d = 0;
                				r10d =  *(_t1315 + 0xb8);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (_t945 - 6 < 0) goto 0x3f056898;
                				if (r10d - 0x102 < 0) goto 0x3f056898;
                				 *((long long*)(_t1334 + 0x10)) =  *((intOrPtr*)(_t1315 + 0x40));
                				_t1254 = _t1334;
                				 *(_t1334 + 0x18) = r10d;
                				 *_t1334 =  &(_t1301[1]);
                				 *((intOrPtr*)(_t1334 + 8)) = _t945;
                				 *(__r13 + 0x48) = _t997 >> 7;
                				 *(__r13 + 0x4c) = _t704 + 0xfffffff9 - _t786;
                				E0000000113F058080(r8d, _t955, _t1235, _t1254, _t1330, _t1333);
                				r10d =  *(_t1334 + 0x18);
                				_t1303 =  *_t1334;
                				_t946 =  *((intOrPtr*)(_t1334 + 8));
                				_t706 =  *(__r13 + 0x4c);
                				 *((long long*)(_t1315 + 0x40)) =  *((intOrPtr*)(_t1334 + 0x10));
                				 *(_t1315 + 0xb8) = r10d;
                				if ( *((intOrPtr*)(__r13 + 8)) != 0x3f3f) goto 0x3f055fc1;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fc1;
                				_t1331 =  *((intOrPtr*)(__r13 + 0x60));
                				_t1255 = _t1254 & _t1235;
                				 *(__r13 + 0x1be4) = r15d;
                				if (( *(_t1331 + _t1255 * 4) >> 0x00000008 & 0x000000ff) - _t706 <= 0) goto 0x3f0568f7;
                				if (_t946 == 0) goto 0x3f05615f;
                				_t947 = _t946 - 1;
                				_t1000 =  *(__r13 + 0x48) + (( *_t1303 & 0x000000ff) << _t706);
                				_t1304 =  &(_t1303[1]);
                				_t707 = _t706 + 8;
                				_t611 =  *(_t1331 + (_t1235 & _t1255) * 4);
                				if ((_t611 >> 0x00000008 & 0x000000ff) - _t707 > 0) goto 0x3f0568c7;
                				if (_t611 == 0) goto 0x3f0569b3;
                				if ((_t611 & 0x000000f0) != 0) goto 0x3f0569b3;
                				 *(_t1315 + 0x34) = _t611;
                				r14d =  *(_t1315 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t611 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t611 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t1000;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t611 >> 0x10);
                				r8d =  *(_t1331 + _t1317 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t707 <= 0) goto 0x3f0569a4;
                				r11d =  *(_t1315 + 0x36) & 0x0000ffff;
                				if (_t947 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t1001 = _t1000 + (( *_t1304 & 0x000000ff) << _t707);
                				_t948 = _t947 - 1;
                				r8d = r8d << (_t611 & 0x000000ff) + r14d;
                				_t1305 =  &(_t1304[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t1001;
                				_t708 = _t707 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t616 =  *(_t1331 + _t1317 * 4);
                				r8d = _t616 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t708 > 0) goto 0x3f056958;
                				_t816 = r14d;
                				 *(__r13 + 0x1be4) = _t816;
                				_t819 = _t616 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t819;
                				_t710 = _t708 - r14d - _t819;
                				 *(__r13 + 0x50) = _t616 >> 0x10;
                				if (_t616 != 0) goto 0x3f0569e0;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4d;
                				goto 0x3f055fb4;
                				if ((_t616 & 0x00000020) == 0) goto 0x3f0569f4;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fac;
                				if ((_t616 & 0x00000040) == 0) goto 0x3f056a11;
                				_t1237 = "invalid literal/length code";
                				 *(_t1334 + 0x20) = _t1237;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f49;
                				 *(__r13 + 0x58) = _t616 & 0xf;
                				_t919 =  *(__r13 + 0x58);
                				if (_t919 == 0) goto 0x3f056a69;
                				if (_t710 - _t919 >= 0) goto 0x3f056a4d;
                				if (_t948 == 0) goto 0x3f05615f;
                				_t949 = _t948 - 1;
                				_t1004 = (_t1001 >> _t816 >> _t819) + (( *_t1305 & 0x000000ff) << _t710);
                				_t1306 =  &(_t1305[1]);
                				_t711 = _t710 + 8;
                				if (_t711 - _t919 < 0) goto 0x3f056a30;
                				_t825 = _t919;
                				_t712 = _t711 - _t919;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + ((0x00000001 << _t825) - 0x00000001 & _t1004);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t919;
                				 *(__r13 + 0x1be8) =  *(__r13 + 0x50);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4a;
                				_t1332 =  *((intOrPtr*)(__r13 + 0x68));
                				_t1256 = _t1255 & _t1237;
                				if (( *(_t1332 + _t1256 * 4) >> 0x00000008 & 0x000000ff) - _t712 <= 0) goto 0x3f056ad4;
                				if (_t949 == 0) goto 0x3f05615f;
                				_t950 = _t949 - 1;
                				_t1006 = (_t1004 >> _t825) + (( *_t1306 & 0x000000ff) << _t712);
                				_t1307 =  &(_t1306[1]);
                				_t713 = _t712 + 8;
                				_t629 =  *(_t1332 + (_t1237 & _t1256) * 4);
                				if ((_t629 >> 0x00000008 & 0x000000ff) - _t713 > 0) goto 0x3f056aa4;
                				if ((_t629 & 0x000000f0) != 0) goto 0x3f056b8b;
                				 *(_t1315 + 0x34) = _t629;
                				r14d =  *(_t1315 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t629 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t629 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t1006;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t629 >> 0x10);
                				r8d =  *(_t1332 + _t1317 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t713 <= 0) goto 0x3f056b7c;
                				r11d =  *(_t1315 + 0x36) & 0x0000ffff;
                				if (_t950 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t1007 = _t1006 + (( *_t1307 & 0x000000ff) << _t713);
                				_t951 = _t950 - 1;
                				r8d = r8d << (_t629 & 0x000000ff) + r14d;
                				_t1308 =  &(_t1307[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t1007;
                				_t714 = _t713 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t634 =  *(_t1332 + _t1317 * 4);
                				r8d = _t634 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t714 > 0) goto 0x3f056b30;
                				_t849 = r14d;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t849;
                				r10d =  *(_t1315 + 0xb8);
                				_t852 = _t634 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t852;
                				_t716 = _t714 - r14d - _t852;
                				if ((_t634 & 0x00000040) == 0) goto 0x3f056bc3;
                				 *(_t1334 + 0x20) = "invalid distance code";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				r8d =  *(_t1315 + 0xa0);
                				 *(__r13 + 0x54) = _t634 >> 0x10;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4b;
                				 *(__r13 + 0x58) = _t634 & 0xf;
                				_t924 =  *(__r13 + 0x58);
                				if (_t924 == 0) goto 0x3f056c2b;
                				if (_t716 - _t924 >= 0) goto 0x3f056c0f;
                				if (_t951 == 0) goto 0x3f05615f;
                				_t952 = _t951 - 1;
                				_t1010 = (_t1007 >> _t849 >> _t852) + (( *_t1308 & 0x000000ff) << _t716);
                				_t1309 =  &(_t1308[1]);
                				_t717 = _t716 + 8;
                				if (_t717 - _t924 < 0) goto 0x3f056bf2;
                				_t858 = _t924;
                				_t718 = _t717 - _t924;
                				_t1011 = _t1010 >> _t858;
                				 *(__r13 + 0x54) =  *(__r13 + 0x54) + ((0x00000001 << _t858) - 0x00000001 & _t1010);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t924;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4c;
                				if (r10d == 0) goto 0x3f05615f;
                				_t641 =  *(__r13 + 0x54);
                				_t860 = r8d - r10d;
                				if (_t641 - _t860 <= 0) goto 0x3f056c9b;
                				_t642 = _t641 - _t860;
                				if (_t642 -  *((intOrPtr*)(__r13 + 0x38)) <= 0) goto 0x3f056c75;
                				if ( *((intOrPtr*)(__r13 + 0x1be0)) == 0) goto 0x3f056c75;
                				_t1240 = "invalid distance too far back";
                				 *(_t1334 + 0x20) = _t1240;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t861 =  *((intOrPtr*)(__r13 + 0x3c));
                				if (_t642 - _t861 <= 0) goto 0x3f056c83;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				r9d =  <=  ? _t642 - _t861 : r9d;
                				goto 0x3f056caa;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				_t865 =  <=  ? r9d : r10d;
                				_t1326 =  *((intOrPtr*)(_t1315 + 0x40));
                				r10d = r10d - _t865;
                				r8d = r8d - _t865;
                				 *(_t1315 + 0xb8) = r10d;
                				 *(__r13 + 0x50) = r8d;
                				 *_t1326 =  *( *((intOrPtr*)(_t1315 + 0x40)) - _t1240 - _t1326 + _t1326) & 0x000000ff;
                				_t1327 = _t1326 + 1;
                				if (r9d != r10d) goto 0x3f056cd0;
                				 *((long long*)(_t1315 + 0x40)) = _t1327;
                				if ( *(__r13 + 0x50) != _t865 + 0xffffffff) goto 0x3f055fc1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (r10d == 0) goto 0x3f05615f;
                				 *_t1327 =  *(__r13 + 0x50) & 0x000000ff;
                				_t1328 = _t1327 + 1;
                				r10d = r10d - 1;
                				 *((long long*)(_t1315 + 0x40)) = _t1328;
                				 *(_t1315 + 0xb8) = r10d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				goto 0x3f055fc1;
                				if ( *((intOrPtr*)(_t1313 + 0x10)) == 0) goto 0x3f056e16;
                				if (_t718 - 0x20 >= 0) goto 0x3f056d5e;
                				if (_t952 == 0) goto 0x3f05615f;
                				_t953 = _t952 - 1;
                				_t1012 = _t1011 + (( *_t1309 & 0x000000ff) << _t718);
                				_t1310 =  &(_t1309[1]);
                				if (_t718 + 8 - 0x20 < 0) goto 0x3f056d40;
                				r8d = r8d - r10d;
                				 *((intOrPtr*)(_t1334 + 0x1c)) =  *((intOrPtr*)(_t1334 + 0x1c)) + r8d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r8d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056dac;
                				if (r8d == 0) goto 0x3f056dac;
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056d92;
                				E0000000113F057780(_t1328 - _t1240);
                				goto 0x3f056d97;
                				_t651 = E0000000113F057490( *(__r13 + 0x20), _t1240, _t1328 - _t1240, _t1317, _t1328);
                				r10d =  *(_t1315 + 0xb8);
                				 *(__r13 + 0x20) = _t651;
                				 *(_t1334 + 0x4c) = _t651;
                				 *(_t1315 + 0xa0) = r10d;
                				r14d = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056e06;
                				if ( *(__r13 + 0x18) != 0) goto 0x3f056de7;
                				if (((_t1011 + (( *_t1309 & 0x000000ff) << _t718) & 0x0000ff00) + (_t1011 + (( *_t1309 & 0x000000ff) << _t718) << 0x10) << 8) + (_t1012 >> 0x00000008 & 0x0000ff00) + (_t1012 >> 0x18) ==  *(__r13 + 0x20)) goto 0x3f056e06;
                				 *(_t1334 + 0x20) = "incorrect data check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t1013 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				_t720 = r15d;
                				goto 0x3f056e30;
                				r14d =  *(_t1315 + 0xa0);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				r14d =  *(_t1315 + 0xa0);
                				if ( *(__r13 + 0x10) == 0) goto 0x3f056eab;
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056eab;
                				if (_t720 - 0x20 >= 0) goto 0x3f056e61;
                				if (_t953 == 0) goto 0x3f056167;
                				_t1014 = _t1013 + (( *_t1310 & 0x000000ff) << _t720);
                				_t721 = _t720 + 8;
                				if (_t721 - 0x20 < 0) goto 0x3f056e43;
                				if (_t1014 ==  *((intOrPtr*)(__r13 + 0x24))) goto 0x3f056ea5;
                				_t1242 = "incorrect length check";
                				 *(_t1334 + 0x20) = "incorrect length check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((long long*)(_t1334 + 0x10)) = _t1328;
                				 *(_t1334 + 0x18) = r10d;
                				 *_t1334 =  &(_t1310[1]);
                				 *((intOrPtr*)(_t1334 + 8)) = _t953 - 1;
                				 *(__r13 + 0x48) = _t1014;
                				 *(__r13 + 0x4c) = _t721;
                				goto 0x3f056fca;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f50;
                				r15d = 1;
                				r14d =  *(_t1315 + 0xa0);
                				r15d = 1;
                				r14d =  *(_t1315 + 0xa0);
                				r15d = 0xfffffffd;
                				goto 0x3f05616f;
                				r14d =  *(_t1315 + 0xa0);
                				goto 0x3f056176;
                				r14d = r14d -  *(_t1334 + 0x18);
                				r10d =  *(_t1315 + 0x38);
                				r10d = r10d -  *((intOrPtr*)(_t1334 + 8));
                				 *((intOrPtr*)(_t1334 + 0xc)) =  *((intOrPtr*)(_t1334 + 0xc)) + r10d;
                				 *((intOrPtr*)(_t1334 + 0x1c)) =  *((intOrPtr*)(_t1334 + 0x1c)) + r14d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r14d;
                				 *(_t1315 + 0x38) = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056f52;
                				if (r14d == 0) goto 0x3f056f52;
                				r8d = r14d;
                				_t876 =  *(__r13 + 0x20);
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056f3f;
                				E0000000113F057780( *((intOrPtr*)(_t1334 + 0x10)) - _t1242);
                				goto 0x3f056f44;
                				_t665 = E0000000113F057490(_t876, _t1242,  *((intOrPtr*)(_t1334 + 0x10)) - _t1242, _t1317, _t1328);
                				r10d =  *(_t1315 + 0x38);
                				 *(__r13 + 0x20) = _t665;
                				 *(_t1334 + 0x4c) = _t665;
                				_t926 =  *((intOrPtr*)(__r13 + 8));
                				if (_t926 == 0x3f47) goto 0x3f056f6e;
                				if (_t926 == 0x3f42) goto 0x3f056f6e;
                				r9d = 0;
                				r8d = r9d;
                				goto 0x3f056f77;
                				r8d = 0x100;
                				r9d = 0;
                				asm("sbb ecx, ecx");
                				r9d =  ==  ? 0x80 : r9d;
                				 *((intOrPtr*)(_t1334 + 0x48)) = (_t876 & 0x00000040) + r9d +  *(__r13 + 0x4c) + r8d;
                				if (r10d != 0) goto 0x3f056faa;
                				if (r14d == 0) goto 0x3f056fb4;
                				if ( *(_t1315 + 0xa8) != 4) goto 0x3f056fc0;
                				r15d =  ==  ? 0xfffffffb : r15d;
                				goto 0x3f056fca;
                				return 0xfffffffe;
                			}























































































































































































































                0x13f055ac4
                0x13f055ac4
                0x13f055ac4
                0x13f055ac7
                0x13f055ad2
                0x13f055adf
                0x13f055ae1
                0x13f055ae3
                0x13f055aec
                0x13f055aee
                0x13f055af6
                0x13f055aff
                0x13f055b04
                0x13f055b0c
                0x13f055b17
                0x13f055b20
                0x13f055b25
                0x13f055b2d
                0x13f055b32
                0x13f055b38
                0x13f055b3d
                0x13f055b40
                0x13f055b47
                0x13f055b4d
                0x13f055b51
                0x13f055b58
                0x13f055b5a
                0x13f055b64
                0x13f055b68
                0x13f055b77
                0x13f055b7b
                0x13f055b7e
                0x13f055b86
                0x13f055b8e
                0x13f055b92
                0x13f055b9f
                0x13f055ba1
                0x13f055ba3
                0x13f055bac
                0x13f055bae
                0x13f055bb5
                0x13f055bb7
                0x13f055bc2
                0x13f055bc9
                0x13f055bcd
                0x13f055bda
                0x13f055bde
                0x13f055bec
                0x13f055bf0
                0x13f055bfe
                0x13f055c02
                0x13f055c05
                0x13f055c0d
                0x13f055c15
                0x13f055c19
                0x13f055c26
                0x13f055c28
                0x13f055c2a
                0x13f055c33
                0x13f055c35
                0x13f055c3c
                0x13f055c42
                0x13f055c4e
                0x13f055c51
                0x13f055c60
                0x13f055c67
                0x13f055c69
                0x13f055c73
                0x13f055c77
                0x13f055c86
                0x13f055c8d
                0x13f055c95
                0x13f055ca0
                0x13f055ca5
                0x13f055ca9
                0x13f055cb6
                0x13f055cb8
                0x13f055cba
                0x13f055cc3
                0x13f055cc5
                0x13f055cc9
                0x13f055cd0
                0x13f055cd2
                0x13f055cdd
                0x13f055ce4
                0x13f055ce6
                0x13f055cf3
                0x13f055cf9
                0x13f055d07
                0x13f055d0e
                0x13f055d11
                0x13f055d13
                0x13f055d17
                0x13f055d1a
                0x13f055d1c
                0x13f055d20
                0x13f055d2c
                0x13f055d30
                0x13f055d36
                0x13f055d3a
                0x13f055d3f
                0x13f055d46
                0x13f055d48
                0x13f055d4f
                0x13f055d51
                0x13f055d58
                0x13f055d5a
                0x13f055d61
                0x13f055d68
                0x13f055d78
                0x13f055d7b
                0x13f055d7e
                0x13f055d84
                0x13f055d8d
                0x13f055d91
                0x13f055d98
                0x13f055d9e
                0x13f055da9
                0x13f055db0
                0x13f055db3
                0x13f055db6
                0x13f055dc0
                0x13f055dc6
                0x13f055dca
                0x13f055dda
                0x13f055de2
                0x13f055de8
                0x13f055df3
                0x13f055df6
                0x13f055dfb
                0x13f055e02
                0x13f055e04
                0x13f055e0b
                0x13f055e14
                0x13f055e16
                0x13f055e1a
                0x13f055e21
                0x13f055e26
                0x13f055e30
                0x13f055e37
                0x13f055e3d
                0x13f055e48
                0x13f055e4f
                0x13f055e52
                0x13f055e58
                0x13f055e5e
                0x13f055e61
                0x13f055e63
                0x13f055e6a
                0x13f055e6c
                0x13f055e70
                0x13f055e74
                0x13f055e84
                0x13f055e88
                0x13f055e8e
                0x13f055e94
                0x13f055e97
                0x13f055e9c
                0x13f055ea3
                0x13f055ea5
                0x13f055eac
                0x13f055eb5
                0x13f055eb7
                0x13f055ebb
                0x13f055ec2
                0x13f055ec7
                0x13f055ed1
                0x13f055ed8
                0x13f055ede
                0x13f055ee1
                0x13f055ee9
                0x13f055ef0
                0x13f055ef3
                0x13f055ef9
                0x13f055eff
                0x13f055f02
                0x13f055f04
                0x13f055f08
                0x13f055f0b
                0x13f055f0d
                0x13f055f11
                0x13f055f19
                0x13f055f25
                0x13f055f29
                0x13f055f2e
                0x13f055f32
                0x13f055f3f
                0x13f055f43
                0x13f055f4c
                0x13f055f53
                0x13f055f5c
                0x13f055f65
                0x13f055f6a
                0x13f055f72
                0x13f055f74
                0x13f055f77
                0x13f055f7a
                0x13f055f81
                0x13f055f89
                0x13f055f8c
                0x13f055f90
                0x13f055f97
                0x13f055f9e
                0x13f055fa3
                0x13f055fa7
                0x13f055fac
                0x13f055fb4
                0x13f055fbc
                0x13f055fc5
                0x13f055fce
                0x13f055fd4
                0x13f055fdc
                0x13f055fdf
                0x13f055fef
                0x13f055ff3
                0x13f056000
                0x13f056002
                0x13f056004
                0x13f05600d
                0x13f05601e
                0x13f056033
                0x13f056038
                0x13f05603c
                0x13f056041
                0x13f05604e
                0x13f056054
                0x13f05605b
                0x13f056060
                0x13f056068
                0x13f05606c
                0x13f056071
                0x13f056080
                0x13f05608b
                0x13f05608f
                0x13f056097
                0x13f05609c
                0x13f05609e
                0x13f0560a6
                0x13f0560aa
                0x13f0560b7
                0x13f0560b9
                0x13f0560bb
                0x13f0560be
                0x13f0560c1
                0x13f0560c4
                0x13f0560c8
                0x13f0560cd
                0x13f0560d6
                0x13f0560df
                0x13f0560e4
                0x13f0560e9
                0x13f0560f9
                0x13f056101
                0x13f056109
                0x13f056114
                0x13f05611c
                0x13f056121
                0x13f056130
                0x13f05613b
                0x13f05613f
                0x13f056147
                0x13f056153
                0x13f056159
                0x13f05615c
                0x13f05615f
                0x13f056167
                0x13f056182
                0x13f056187
                0x13f05618c
                0x13f056190
                0x13f05619a
                0x13f05619e
                0x13f0561a2
                0x13f0561a9
                0x13f0561af
                0x13f0561b8
                0x13f0561c3
                0x13f0561c8
                0x13f0561d3
                0x13f0561d6
                0x13f0561de
                0x13f0561e5
                0x13f0561eb
                0x13f0561f8
                0x13f0561fd
                0x13f056205
                0x13f056208
                0x13f056212
                0x13f056217
                0x13f05621c
                0x13f056222
                0x13f05622f
                0x13f056231
                0x13f056233
                0x13f05623c
                0x13f056240
                0x13f05624a
                0x13f05624c
                0x13f056253
                0x13f056258
                0x13f056260
                0x13f056265
                0x13f056269
                0x13f05626c
                0x13f056274
                0x13f05627b
                0x13f056281
                0x13f056289
                0x13f05628f
                0x13f056295
                0x13f056298
                0x13f05629e
                0x13f0562a5
                0x13f0562ab
                0x13f0562b4
                0x13f0562b9
                0x13f0562c1
                0x13f0562c9
                0x13f0562d2
                0x13f0562da
                0x13f0562dd
                0x13f0562e2
                0x13f0562e6
                0x13f0562eb
                0x13f0562fb
                0x13f056302
                0x13f05630f
                0x13f056311
                0x13f056313
                0x13f056316
                0x13f05631c
                0x13f056320
                0x13f056323
                0x13f05632b
                0x13f056331
                0x13f056339
                0x13f056346
                0x13f056348
                0x13f05634f
                0x13f056359
                0x13f056362
                0x13f056368
                0x13f05636f
                0x13f056382
                0x13f056387
                0x13f056392
                0x13f05639f
                0x13f0563a1
                0x13f0563a3
                0x13f0563a6
                0x13f0563ac
                0x13f0563bf
                0x13f0563cb
                0x13f0563d4
                0x13f0563db
                0x13f0563e6
                0x13f0563eb
                0x13f056400
                0x13f056409
                0x13f056418
                0x13f05641a
                0x13f05641e
                0x13f056425
                0x13f056432
                0x13f056436
                0x13f056447
                0x13f05644c
                0x13f056453
                0x13f056453
                0x13f056457
                0x13f05645c
                0x13f056465
                0x13f05646e
                0x13f056473
                0x13f05647b
                0x13f056480
                0x13f056487
                0x13f05648c
                0x13f056494
                0x13f056499
                0x13f0564a5
                0x13f0564b4
                0x13f0564c2
                0x13f0564d4
                0x13f0564da
                0x13f0564de
                0x13f0564e1
                0x13f0564e9
                0x13f0564ec
                0x13f0564f5
                0x13f0564fb
                0x13f0564ff
                0x13f056505
                0x13f056509
                0x13f056516
                0x13f05651a
                0x13f05651f
                0x13f056525
                0x13f056528
                0x13f05652e
                0x13f056531
                0x13f056537
                0x13f05653b
                0x13f056541
                0x13f056543
                0x13f056548
                0x13f056555
                0x13f05655e
                0x13f056567
                0x13f05656e
                0x13f056575
                0x13f05657d
                0x13f05657f
                0x13f056584
                0x13f056588
                0x13f056595
                0x13f056599
                0x13f05659c
                0x13f0565a1
                0x13f0565a3
                0x13f0565b1
                0x13f0565b5
                0x13f0565bd
                0x13f0565cb
                0x13f0565d4
                0x13f0565de
                0x13f0565e0
                0x13f0565e5
                0x13f0565e9
                0x13f0565f6
                0x13f0565fa
                0x13f0565fd
                0x13f056602
                0x13f05660e
                0x13f056610
                0x13f05661e
                0x13f056620
                0x13f056625
                0x13f056629
                0x13f056636
                0x13f05663d
                0x13f056642
                0x13f056644
                0x13f05664e
                0x13f056650
                0x13f056677
                0x13f056679
                0x13f056687
                0x13f056690
                0x13f056697
                0x13f05669b
                0x13f0566a5
                0x13f0566ae
                0x13f0566b8
                0x13f0566c8
                0x13f0566d7
                0x13f0566e0
                0x13f0566e5
                0x13f0566ed
                0x13f0566f9
                0x13f0566fe
                0x13f056706
                0x13f05670b
                0x13f056712
                0x13f05671a
                0x13f056721
                0x13f056728
                0x13f056737
                0x13f056743
                0x13f056748
                0x13f056750
                0x13f056755
                0x13f05675e
                0x13f056767
                0x13f05676c
                0x13f056774
                0x13f056779
                0x13f056780
                0x13f056784
                0x13f056792
                0x13f05679a
                0x13f0567a0
                0x13f0567a5
                0x13f0567ba
                0x13f0567bf
                0x13f0567c6
                0x13f0567cb
                0x13f0567cd
                0x13f0567d4
                0x13f0567d9
                0x13f0567e1
                0x13f0567ed
                0x13f0567f8
                0x13f0567fe
                0x13f056806
                0x13f056809
                0x13f056811
                0x13f05681c
                0x13f056825
                0x13f05682f
                0x13f056834
                0x13f056837
                0x13f05683c
                0x13f056840
                0x13f056845
                0x13f056849
                0x13f05684d
                0x13f05685f
                0x13f056864
                0x13f056868
                0x13f056871
                0x13f056875
                0x13f05687a
                0x13f056882
                0x13f056888
                0x13f056893
                0x13f0568a1
                0x13f0568ad
                0x13f0568b0
                0x13f0568c5
                0x13f0568c9
                0x13f0568d6
                0x13f0568d8
                0x13f0568da
                0x13f0568df
                0x13f0568e7
                0x13f0568f5
                0x13f0568f9
                0x13f056901
                0x13f056909
                0x13f05690d
                0x13f056913
                0x13f05691e
                0x13f05692b
                0x13f056931
                0x13f056934
                0x13f056937
                0x13f05693a
                0x13f056946
                0x13f05694a
                0x13f056950
                0x13f056952
                0x13f05695a
                0x13f056967
                0x13f05696d
                0x13f056975
                0x13f056977
                0x13f05697a
                0x13f05697d
                0x13f056983
                0x13f056986
                0x13f056989
                0x13f05698c
                0x13f05698f
                0x13f056998
                0x13f05699c
                0x13f0569a2
                0x13f0569a4
                0x13f0569ac
                0x13f0569b8
                0x13f0569bb
                0x13f0569c2
                0x13f0569cb
                0x13f0569d1
                0x13f0569d3
                0x13f0569db
                0x13f0569e2
                0x13f0569e4
                0x13f0569ef
                0x13f0569f6
                0x13f0569f8
                0x13f0569ff
                0x13f056a04
                0x13f056a0c
                0x13f056a17
                0x13f056a1f
                0x13f056a23
                0x13f056a29
                0x13f056a2d
                0x13f056a32
                0x13f056a3f
                0x13f056a41
                0x13f056a43
                0x13f056a46
                0x13f056a4b
                0x13f056a4d
                0x13f056a56
                0x13f056a5e
                0x13f056a62
                0x13f056a6d
                0x13f056a74
                0x13f056a85
                0x13f056a91
                0x13f056aa2
                0x13f056aa6
                0x13f056ab3
                0x13f056ab5
                0x13f056ab7
                0x13f056abc
                0x13f056ac4
                0x13f056ad2
                0x13f056ad6
                0x13f056ade
                0x13f056ae2
                0x13f056ae8
                0x13f056af3
                0x13f056b00
                0x13f056b06
                0x13f056b09
                0x13f056b0c
                0x13f056b0f
                0x13f056b1b
                0x13f056b1f
                0x13f056b25
                0x13f056b27
                0x13f056b32
                0x13f056b3f
                0x13f056b45
                0x13f056b4d
                0x13f056b4f
                0x13f056b52
                0x13f056b55
                0x13f056b5b
                0x13f056b5e
                0x13f056b61
                0x13f056b64
                0x13f056b67
                0x13f056b70
                0x13f056b74
                0x13f056b7a
                0x13f056b7c
                0x13f056b84
                0x13f056b8b
                0x13f056b98
                0x13f056b9b
                0x13f056ba2
                0x13f056ba8
                0x13f056bb1
                0x13f056bb6
                0x13f056bbe
                0x13f056bc3
                0x13f056bd0
                0x13f056bda
                0x13f056be2
                0x13f056be6
                0x13f056bec
                0x13f056bf0
                0x13f056bf4
                0x13f056c01
                0x13f056c03
                0x13f056c05
                0x13f056c08
                0x13f056c0d
                0x13f056c0f
                0x13f056c18
                0x13f056c1e
                0x13f056c20
                0x13f056c24
                0x13f056c2b
                0x13f056c36
                0x13f056c3c
                0x13f056c43
                0x13f056c48
                0x13f056c4a
                0x13f056c50
                0x13f056c5a
                0x13f056c5c
                0x13f056c63
                0x13f056c68
                0x13f056c70
                0x13f056c75
                0x13f056c7b
                0x13f056c83
                0x13f056c8b
                0x13f056c95
                0x13f056c99
                0x13f056ca0
                0x13f056ca7
                0x13f056cb0
                0x13f056cb4
                0x13f056cb9
                0x13f056cbc
                0x13f056cbf
                0x13f056cca
                0x13f056cd5
                0x13f056cd8
                0x13f056cde
                0x13f056ce0
                0x13f056ce9
                0x13f056cef
                0x13f056cff
                0x13f056d0a
                0x13f056d0d
                0x13f056d10
                0x13f056d13
                0x13f056d18
                0x13f056d20
                0x13f056d28
                0x13f056d32
                0x13f056d3b
                0x13f056d42
                0x13f056d4f
                0x13f056d51
                0x13f056d53
                0x13f056d5c
                0x13f056d5e
                0x13f056d61
                0x13f056d66
                0x13f056d70
                0x13f056d75
                0x13f056d89
                0x13f056d8b
                0x13f056d90
                0x13f056d92
                0x13f056d97
                0x13f056d9f
                0x13f056da3
                0x13f056dac
                0x13f056db4
                0x13f056db9
                0x13f056dc2
                0x13f056deb
                0x13f056df4
                0x13f056df9
                0x13f056e01
                0x13f056e06
                0x13f056e09
                0x13f056e11
                0x13f056e14
                0x13f056e16
                0x13f056e1e
                0x13f056e28
                0x13f056e35
                0x13f056e3c
                0x13f056e41
                0x13f056e45
                0x13f056e54
                0x13f056e59
                0x13f056e5f
                0x13f056e65
                0x13f056e67
                0x13f056e6e
                0x13f056e73
                0x13f056e7b
                0x13f056e80
                0x13f056e8a
                0x13f056e8f
                0x13f056e93
                0x13f056e98
                0x13f056e9c
                0x13f056ea0
                0x13f056eab
                0x13f056eb3
                0x13f056ebe
                0x13f056ec6
                0x13f056ed1
                0x13f056ed9
                0x13f056edf
                0x13f056ee4
                0x13f056eec
                0x13f056ef1
                0x13f056ef6
                0x13f056efb
                0x13f056f00
                0x13f056f05
                0x13f056f0a
                0x13f056f13
                0x13f056f18
                0x13f056f1d
                0x13f056f24
                0x13f056f27
                0x13f056f36
                0x13f056f38
                0x13f056f3d
                0x13f056f3f
                0x13f056f44
                0x13f056f49
                0x13f056f4d
                0x13f056f52
                0x13f056f5c
                0x13f056f64
                0x13f056f66
                0x13f056f69
                0x13f056f6c
                0x13f056f6e
                0x13f056f74
                0x13f056f82
                0x13f056f8d
                0x13f056f9b
                0x13f056fa3
                0x13f056fa8
                0x13f056fb2
                0x13f056fbc
                0x13f056fc3
                0x13f056fda

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: $header crc mismatch$unknown compression method$unknown header flags set
                • API String ID: 0-4074041902
                • Opcode ID: 52b0a8fa233058bd1e6ad72214276e7b81d4b27619e98fe0d40f7e9e6b87b9f1
                • Instruction ID: 7bbc0bee5c0889df0d50aa6fb25d540a8d7d409fa22af9d56598bc444476e9f7
                • Opcode Fuzzy Hash: 52b0a8fa233058bd1e6ad72214276e7b81d4b27619e98fe0d40f7e9e6b87b9f1
                • Instruction Fuzzy Hash: 94F194726183D8CBE7A99B0CC08CB6E7AABFB44744F05452CFA4907792D7B4CA42CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 76%
                			E0000000113F05592D(signed int __ebx, void* __edi, void* __ebp, signed char* __rsi, signed long long __r8, void* __r9, void* __r11, signed long long __r12, void* __r13, void* __r14, long long __r15) {
                				signed int _t550;
                				signed int _t588;
                				signed int _t598;
                				signed int _t599;
                				signed int _t610;
                				void* _t611;
                				signed int _t632;
                				signed int _t635;
                				unsigned int _t637;
                				unsigned int _t641;
                				signed int _t657;
                				signed int _t659;
                				signed int _t666;
                				signed char _t671;
                				signed int _t684;
                				signed char _t689;
                				unsigned int _t696;
                				void* _t697;
                				signed int _t706;
                				signed int _t720;
                				signed int _t731;
                				signed int _t733;
                				signed int _t735;
                				signed int _t737;
                				signed int _t739;
                				signed int _t741;
                				signed int _t743;
                				signed int _t744;
                				void* _t745;
                				signed int _t748;
                				signed int _t749;
                				signed int _t750;
                				signed int _t752;
                				void* _t753;
                				signed int _t754;
                				void* _t755;
                				signed int _t756;
                				void* _t757;
                				signed int _t758;
                				void* _t759;
                				signed int _t761;
                				signed int _t762;
                				void* _t763;
                				signed int _t765;
                				signed int _t766;
                				void* _t767;
                				signed int _t769;
                				void* _t770;
                				signed int _t771;
                				signed int _t772;
                				void* _t773;
                				signed int _t775;
                				void* _t776;
                				signed int _t777;
                				signed int _t779;
                				signed int _t780;
                				signed char _t790;
                				signed int _t794;
                				signed char _t806;
                				signed char _t824;
                				signed char _t827;
                				signed int _t829;
                				signed char _t830;
                				signed int _t834;
                				signed char _t851;
                				signed char _t855;
                				signed char _t885;
                				signed char _t888;
                				signed char _t894;
                				signed char _t918;
                				signed char _t921;
                				signed char _t927;
                				void* _t929;
                				intOrPtr _t930;
                				void* _t934;
                				signed int _t945;
                				signed char _t950;
                				signed int _t966;
                				signed char _t971;
                				void* _t973;
                				void* _t977;
                				void* _t981;
                				signed char _t993;
                				signed char _t998;
                				signed int _t1000;
                				void* _t1002;
                				void* _t1003;
                				void* _t1004;
                				void* _t1005;
                				signed char _t1006;
                				void* _t1007;
                				void* _t1008;
                				void* _t1009;
                				void* _t1010;
                				void* _t1011;
                				intOrPtr _t1012;
                				void* _t1013;
                				void* _t1014;
                				void* _t1015;
                				void* _t1016;
                				void* _t1017;
                				void* _t1018;
                				void* _t1019;
                				intOrPtr _t1020;
                				intOrPtr _t1021;
                				void* _t1022;
                				void* _t1023;
                				void* _t1024;
                				void* _t1025;
                				void* _t1026;
                				void* _t1027;
                				void* _t1028;
                				void* _t1030;
                				unsigned int _t1033;
                				unsigned int _t1034;
                				signed int _t1039;
                				unsigned int _t1040;
                				signed int _t1041;
                				unsigned int _t1042;
                				signed int _t1044;
                				unsigned int _t1045;
                				signed char _t1047;
                				signed int _t1051;
                				signed int _t1056;
                				unsigned int _t1057;
                				unsigned int _t1060;
                				unsigned int _t1061;
                				signed int _t1063;
                				signed int _t1064;
                				signed int _t1065;
                				signed int _t1066;
                				unsigned int _t1067;
                				unsigned int _t1069;
                				unsigned int _t1074;
                				unsigned int _t1077;
                				unsigned int _t1080;
                				signed int _t1083;
                				unsigned int _t1084;
                				unsigned int _t1087;
                				signed int _t1089;
                				unsigned int _t1090;
                				signed int _t1093;
                				unsigned int _t1094;
                				signed int _t1096;
                				unsigned int _t1097;
                				signed int* _t1118;
                				intOrPtr _t1139;
                				intOrPtr _t1168;
                				void* _t1184;
                				void* _t1219;
                				void* _t1231;
                				intOrPtr _t1304;
                				intOrPtr _t1310;
                				intOrPtr _t1312;
                				intOrPtr _t1313;
                				intOrPtr _t1314;
                				intOrPtr _t1315;
                				intOrPtr _t1316;
                				intOrPtr _t1317;
                				intOrPtr _t1319;
                				signed long long _t1324;
                				signed int _t1325;
                				signed long long _t1328;
                				signed long long _t1329;
                				signed int _t1332;
                				signed long long _t1336;
                				signed long long _t1338;
                				signed long long _t1341;
                				void* _t1344;
                				intOrPtr _t1346;
                				void* _t1347;
                				signed long long _t1351;
                				signed long long _t1352;
                				signed long long _t1353;
                				signed long long _t1355;
                				signed long long _t1356;
                				signed long long _t1357;
                				void* _t1358;
                				signed int* _t1360;
                				intOrPtr _t1365;
                				intOrPtr _t1368;
                				intOrPtr _t1370;
                				signed char* _t1371;
                				signed char* _t1388;
                				signed char* _t1389;
                				signed char* _t1390;
                				signed char* _t1391;
                				signed char* _t1392;
                				signed char* _t1393;
                				signed char* _t1394;
                				signed char* _t1395;
                				signed char* _t1396;
                				signed char* _t1397;
                				signed char* _t1398;
                				signed char* _t1399;
                				signed char* _t1400;
                				signed char* _t1401;
                				signed char* _t1402;
                				signed char* _t1403;
                				signed char* _t1404;
                				signed char* _t1405;
                				signed char* _t1407;
                				signed char* _t1408;
                				signed char* _t1409;
                				signed char* _t1410;
                				signed char* _t1411;
                				signed char* _t1412;
                				signed char* _t1413;
                				signed char* _t1414;
                				void* _t1417;
                				void* _t1419;
                				signed long long _t1421;
                				intOrPtr _t1423;
                				char* _t1430;
                				char* _t1431;
                				long long _t1432;
                				intOrPtr _t1433;
                				signed int _t1434;
                				signed int _t1435;
                				intOrPtr _t1436;
                				void* _t1437;
                				signed long long _t1438;
                				long long _t1445;
                
                				_t1438 = __r12;
                				_t1437 = __r11;
                				_t1421 = __r8;
                				_t950 =  *(__r13 + 0x10);
                				if (_t950 != 0) goto 0x3f055942;
                				 *(__r13 + 8) = 0x3f40;
                				goto 0x3f055fc1;
                				if (__ebx - 0x10 >= 0) goto 0x3f055965;
                				if (__edi == 0) goto 0x3f05615f;
                				_t1002 = __edi - 1;
                				_t1388 =  &(__rsi[1]);
                				if (__ebx + 8 - 0x10 < 0) goto 0x3f055947;
                				if ((_t950 & 0x00000002) == 0) goto 0x3f0559c3;
                				if (__ebp + (( *__rsi & 0x000000ff) << __ebx) != 0x8b1f) goto 0x3f0559c3;
                				if ( *(__r13 + 0x30) != 0) goto 0x3f055981;
                				 *(__r13 + 0x30) = 0xf;
                				r8d = 0;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1358);
                				 *(_t1419 + 0x30) = 0x8b1f;
                				r8d = 2;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1419 + 0x30);
                				_t1033 = r15d;
                				 *(__r13 + 8) = 0x3f35;
                				goto 0x3f055fb4;
                				_t1304 =  *((intOrPtr*)(__r13 + 0x28));
                				 *(__r13 + 0x18) = r15d;
                				if (_t1304 == 0) goto 0x3f0559db;
                				 *(_t1304 + 0x40) = 0xffffffff;
                				if (( *(__r13 + 0x10) & 0x00000001) == 0) goto 0x3f055aab;
                				if (((bpl & 0xffffffff) << 8) + (_t1033 >> 8) != ((((bpl & 0xffffffff) << 8) + (_t1033 >> 8) - (0x8421085 * (((bpl & 0xffffffff) << 8) + (_t1033 >> 8)) >> 0x20) >> 1) + (0x8421085 * (((bpl & 0xffffffff) << 8) + (_t1033 >> 8)) >> 0x20) >> 4) * 0x1f) goto 0x3f055aab;
                				if ((_t1033 & 0x0000000f) == 8) goto 0x3f055a30;
                				 *(__r12 + 0x20) = "unknown compression method";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				_t1034 = _t1033 >> 4;
                				_t790 = (_t1034 & 0x0000000f) + 8;
                				if ( *(__r13 + 0x30) != 0) goto 0x3f055a4c;
                				 *(__r13 + 0x30) = _t790;
                				if (_t790 - 0xf > 0) goto 0x3f055a92;
                				if (_t790 - _t790 > 0) goto 0x3f055a92;
                				r8d = 0;
                				 *(__r13 + 0x1c) = 1 << _t790;
                				_t550 = E0000000113F057490(0, "unknown compression method", _t1419 + 0x30, __r8, __r9);
                				_t731 = r15d;
                				 *(__r13 + 0x20) = _t550;
                				 *(__r12 + 0x4c) = _t550;
                				 *(__r13 + 8) =  !(_t1034 >> 8) & 0x00000002 | 0x00003f3d;
                				_t1039 = r15d;
                				goto 0x3f055fb4;
                				 *(__r12 + 0x20) = "invalid window size";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r12 + 0x20) = "incorrect header check";
                				 *(__r13 + 8) = 0x3f51;
                				if (_t731 - 0x10 >= 0) goto 0x3f055aee;
                				if (_t1002 == 0) goto 0x3f05615f;
                				_t1003 = _t1002 - 1;
                				_t1040 = _t1039 + (( *_t1388 & 0x000000ff) << _t731);
                				_t1389 =  &(_t1388[1]);
                				if (_t731 + 8 - 0x10 < 0) goto 0x3f055ad0;
                				 *(__r13 + 0x18) = _t1040;
                				if (bpl == 8) goto 0x3f055b11;
                				 *(__r12 + 0x20) = "unknown compression method";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				if ((_t1040 & 0x0000e000) == 0) goto 0x3f055b32;
                				 *(__r12 + 0x20) = "unknown header flags set";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				_t1360 =  *((intOrPtr*)(__r13 + 0x28));
                				_t794 = _t1040 >> 8;
                				_t1118 = _t1360;
                				if (_t1118 == 0) goto 0x3f055b4d;
                				 *_t1360 = _t794 & 0x00000001;
                				asm("bt eax, 0x9");
                				if (_t1118 >= 0) goto 0x3f055b7b;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055b7b;
                				 *(_t1419 + 0x30) = bpl;
                				 *(_t1419 + 0x31) = _t794;
                				r8d = 2;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1419 + 0x30);
                				_t1041 = r15d;
                				 *(__r13 + 8) = 0x3f36;
                				_t733 = r15d;
                				if (_t733 - 0x20 >= 0) goto 0x3f055bae;
                				if (_t1003 == 0) goto 0x3f05615f;
                				_t1004 = _t1003 - 1;
                				_t1042 = _t1041 + (( *_t1389 & 0x000000ff) << _t733);
                				_t1390 =  &(_t1389[1]);
                				if (_t733 + 8 - 0x20 < 0) goto 0x3f055b90;
                				_t1310 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1310 == 0) goto 0x3f055bba;
                				 *(_t1310 + 4) = _t1042;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055c02;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055c02;
                				 *(_t1419 + 0x30) = bpl;
                				 *(_t1419 + 0x31) = _t1042 >> 8;
                				r8d = 4;
                				 *((char*)(_t1419 + 0x32)) = _t1042 >> 0x10;
                				 *(_t1419 + 0x33) = bpl;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1419 + 0x30);
                				_t1044 = r15d;
                				 *(__r13 + 8) = 0x3f37;
                				_t735 = r15d;
                				if (_t735 - 0x10 >= 0) goto 0x3f055c35;
                				if (_t1004 == 0) goto 0x3f05615f;
                				_t1005 = _t1004 - 1;
                				_t1045 = _t1044 + (( *_t1390 & 0x000000ff) << _t735);
                				_t1391 =  &(_t1390[1]);
                				if (_t735 + 8 - 0x10 < 0) goto 0x3f055c17;
                				_t1346 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1346 == 0) goto 0x3f055c53;
                				 *(_t1346 + 8) = bpl & 0xffffffff;
                				 *( *((intOrPtr*)(__r13 + 0x28)) + 0xc) = _t1045 >> 8;
                				goto 0x3f055c58;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055c8a;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055c8a;
                				 *(_t1419 + 0x30) = bpl;
                				 *(_t1419 + 0x31) = _t1045 >> 8;
                				r8d = 2;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1419 + 0x30);
                				 *(__r13 + 8) = 0x3f38;
                				_t737 = r15d;
                				if (( *(__r13 + 0x18) & 0x00000400) == 0) goto 0x3f055d13;
                				if (_t737 - 0x10 >= 0) goto 0x3f055cc5;
                				if (_t1005 == 0) goto 0x3f05615f;
                				_t1006 = _t1005 - 1;
                				_t1047 = r15d + (( *_t1391 & 0x000000ff) << _t737);
                				_t1392 =  &(_t1391[1]);
                				if (_t737 + 8 - 0x10 < 0) goto 0x3f055ca7;
                				_t1312 =  *((intOrPtr*)(__r13 + 0x28));
                				 *(__r13 + 0x50) = _t1047;
                				if (_t1312 == 0) goto 0x3f055cd5;
                				 *(_t1312 + 0x18) = _t1047;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055d0b;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055d0b;
                				 *(_t1419 + 0x30) = bpl;
                				r8d = 2;
                				 *(_t1419 + 0x31) = bpl;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1419 + 0x30);
                				_t739 = r15d;
                				goto 0x3f055d20;
                				_t1313 =  *((intOrPtr*)(__r13 + 0x28));
                				_t1139 = _t1313;
                				if (_t1139 == 0) goto 0x3f055d20;
                				 *((long long*)(_t1313 + 0x10)) = __r15;
                				 *(__r13 + 8) = 0x3f39;
                				asm("bt eax, 0xa");
                				if (_t1139 >= 0) goto 0x3f055dc6;
                				_t806 =  *(__r13 + 0x50);
                				r14d = _t1006;
                				r14d =  <=  ? _t806 : r14d;
                				if (r14d == 0) goto 0x3f055dbe;
                				_t1365 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1365 == 0) goto 0x3f055d8d;
                				_t1433 =  *((intOrPtr*)(_t1365 + 0x10));
                				if (_t1433 == 0) goto 0x3f055d8d;
                				r8d =  *(_t1365 + 0x1c);
                				r9d =  *(_t1365 + 0x18);
                				r9d = r9d - _t806;
                				_t574 =  >  ? r8d - r9d : r14d;
                				_t1347 = _t1346 + _t1433;
                				r8d =  >  ? r8d - r9d : r14d;
                				E0000000113F0593C0( >  ? r8d - r9d : r14d, _t1347, _t1392, __r8);
                				asm("bt eax, 0x9");
                				if (__r14 + __r9 - r8d >= 0) goto 0x3f055dad;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055dad;
                				r8d = r14d;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1392);
                				_t1007 = _t1006 - r14d;
                				_t1393 =  &(_t1392[_t1313]);
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) - r14d;
                				if ( *(__r13 + 0x50) != 0) goto 0x3f05615f;
                				 *(__r13 + 0x50) = r15d;
                				 *(__r13 + 8) = 0x3f3a;
                				if (( *(__r13 + 0x18) & 0x00000800) == 0) goto 0x3f055e63;
                				if (_t1007 == 0) goto 0x3f05615f;
                				r14d = r15d;
                				r14d = r14d + 1;
                				r15d =  *(_t1313 + _t1393) & 0x000000ff;
                				_t1314 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1314 == 0) goto 0x3f055e1e;
                				_t1368 =  *((intOrPtr*)(_t1314 + 0x20));
                				if (_t1368 == 0) goto 0x3f055e1e;
                				if ( *(__r13 + 0x50) -  *((intOrPtr*)(_t1314 + 0x28)) >= 0) goto 0x3f055e1e;
                				 *((intOrPtr*)(_t1347 + _t1368)) = r15b;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + 1;
                				if (r15b == 0) goto 0x3f055e28;
                				if (r14d - _t1007 < 0) goto 0x3f055df0;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055e4c;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055e4c;
                				r8d = r14d;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1393);
                				_t1008 = _t1007 - r14d;
                				_t1394 =  &(_t1393[_t1314]);
                				if (r15b != 0) goto 0x3f05615f;
                				r15d = 0;
                				goto 0x3f055e70;
                				_t1315 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1315 == 0) goto 0x3f055e70;
                				 *((long long*)(_t1315 + 0x20)) = __r15;
                				 *(__r13 + 0x50) = r15d;
                				 *(__r13 + 8) = 0x3f3b;
                				if (( *(__r13 + 0x18) & 0x00001000) == 0) goto 0x3f055f04;
                				if (_t1008 == 0) goto 0x3f05615f;
                				r14d = r15d;
                				r14d = r14d + 1;
                				r15d =  *(_t1315 + _t1394) & 0x000000ff;
                				_t1316 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1316 == 0) goto 0x3f055ebf;
                				_t1370 =  *((intOrPtr*)(_t1316 + 0x30));
                				if (_t1370 == 0) goto 0x3f055ebf;
                				if ( *(__r13 + 0x50) -  *((intOrPtr*)(_t1316 + 0x38)) >= 0) goto 0x3f055ebf;
                				 *((intOrPtr*)(_t1347 + _t1370)) = r15b;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + 1;
                				if (r15b == 0) goto 0x3f055ec9;
                				if (r14d - _t1008 < 0) goto 0x3f055e91;
                				if (( *(__r13 + 0x18) & 0x00000200) == 0) goto 0x3f055eed;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055eed;
                				r8d = r14d;
                				_t1371 = _t1394;
                				 *(__r13 + 0x20) = E0000000113F057780(_t1371);
                				_t1009 = _t1008 - r14d;
                				_t1395 =  &(_t1394[_t1316]);
                				if (r15b != 0) goto 0x3f05615f;
                				r15d = 0;
                				goto 0x3f055f11;
                				_t1317 =  *((intOrPtr*)(__r13 + 0x28));
                				_t1168 = _t1317;
                				if (_t1168 == 0) goto 0x3f055f11;
                				 *((long long*)(_t1317 + 0x30)) = __r15;
                				r10d =  *(_t1419 + 0xb8);
                				 *(__r13 + 8) = 0x3f3c;
                				asm("bt edx, 0x9");
                				if (_t1168 >= 0) goto 0x3f055f7a;
                				if (_t739 - 0x10 >= 0) goto 0x3f055f4e;
                				if (_t1009 == 0) goto 0x3f05615f;
                				_t1010 = _t1009 - 1;
                				_t1396 =  &(_t1395[1]);
                				if (_t739 + 8 - 0x10 < 0) goto 0x3f055f30;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f055f74;
                				if (r15d + (( *_t1395 & 0x000000ff) << _t739) == ( *(__r13 + 0x20) & 0x0000ffff)) goto 0x3f055f74;
                				 *(__r12 + 0x20) = "header crc mismatch";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				_t1051 = r15d;
                				_t741 = r15d;
                				_t1319 =  *((intOrPtr*)(__r13 + 0x28));
                				if (_t1319 == 0) goto 0x3f055f97;
                				 *(_t1319 + 0x3c) =  *(__r13 + 0x18) >> 0x00000009 & 0x00000001;
                				_t1320 =  *((intOrPtr*)(__r13 + 0x28));
                				 *( *((intOrPtr*)(__r13 + 0x28)) + 0x40) = 1;
                				r8d = 0;
                				_t588 = E0000000113F057780(_t1371);
                				 *(__r13 + 0x20) = _t588;
                				 *(__r12 + 0x4c) = _t588;
                				 *(__r13 + 8) = 0x3f3f;
                				r10d =  *(_t1419 + 0xb8);
                				_t1423 =  *((intOrPtr*)(_t1419 + 0x40));
                				_t186 = _t1371 - 0x3f34; // 0x14
                				if (_t186 - 0x1e > 0) goto 0x3f056fc5;
                				r8d =  *(_t1419 + 0xa0);
                				r15d = 0;
                				r14d =  *(_t1419 + 0xa8);
                				if (_t741 - 0x20 >= 0) goto 0x3f05600f;
                				if (_t1010 == 0) goto 0x3f05615f;
                				_t1011 = _t1010 - 1;
                				_t1397 =  &(_t1396[1]);
                				if (_t741 + 8 - 0x20 < 0) goto 0x3f055ff1;
                				_t743 = r15d;
                				_t598 = (_t1051 + (( *_t1396 & 0x000000ff) << _t741) >> 0x00000008 & 0x0000ff00) + ((_t1051 + (( *_t1396 & 0x000000ff) << _t741) & 0x0000ff00) + (_t1051 + (( *_t1396 & 0x000000ff) << _t741) << 0x10) << 8) + (_t1051 + (( *_t1396 & 0x000000ff) << _t741) >> 0x18);
                				 *(__r13 + 0x20) = _t598;
                				 *(__r12 + 0x4c) = _t598;
                				 *(__r13 + 8) = 0x3f3e;
                				if ( *((intOrPtr*)(__r13 + 0x14)) == 0) goto 0x3f056e80;
                				r8d = 0;
                				_t599 = E0000000113F057490(0, _t1320, _t1371, __r8, _t1423);
                				r10d =  *(_t1419 + 0xb8);
                				 *(__r13 + 0x20) = _t599;
                				 *(__r12 + 0x4c) = _t599;
                				 *(__r13 + 8) = 0x3f3f;
                				if (__r14 - 5 - 1 <= 0) goto 0x3f05615f;
                				if ( *(__r13 + 0xc) == 0) goto 0x3f0560a3;
                				 *(__r13 + 8) = 0x3f4e;
                				_t824 = _t743 & 0x00000007;
                				_t744 = _t743 - _t824;
                				goto 0x3f055fbc;
                				if (_t744 - 3 >= 0) goto 0x3f0560c6;
                				if (_t1011 == 0) goto 0x3f05615f;
                				_t1012 = _t1011 - 1;
                				_t1056 = (r15d >> _t824) + (( *_t1397 & 0x000000ff) << _t744);
                				_t1398 =  &(_t1397[1]);
                				_t745 = _t744 + 8;
                				_t1184 = _t745 - 3;
                				if (_t1184 < 0) goto 0x3f0560a8;
                				_t1057 = _t1056 >> 1;
                				 *(__r13 + 0xc) = _t1056 & 0x00000001;
                				if (_t1184 == 0) goto 0x3f0561fd;
                				if (_t1184 == 0) goto 0x3f056121;
                				if (_t1184 == 0) goto 0x3f05610e;
                				if ((_t1057 & 0x00000003) != 1) goto 0x3f056205;
                				 *(__r12 + 0x20) = "invalid block type";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				 *(__r13 + 8) = 0x3f44;
                				goto 0x3f055fbc;
                				 *(__r13 + 0x70) = 9;
                				 *(__r13 + 0x60) = 0x3f074040;
                				 *((long long*)(__r13 + 0x68)) = 0x3f074840;
                				 *((intOrPtr*)(__r13 + 0x74)) = 5;
                				 *(__r13 + 8) = 0x3f47;
                				if (r14d != 6) goto 0x3f056205;
                				_t1060 = _t1057 >> 2 >> 2 >> 2;
                				_t748 = _t745 + 0x2fffffff7;
                				r14d =  *(_t1419 + 0xa0);
                				r15d =  *(_t1419 + 0xb0);
                				 *((long long*)(__r12 + 0x10)) =  *((intOrPtr*)(_t1419 + 0x40));
                				 *(__r12 + 0x18) =  *(_t1419 + 0xb8);
                				 *__r12 = _t1398;
                				 *((intOrPtr*)(__r12 + 8)) = _t1012;
                				 *(__r13 + 0x48) = _t1060;
                				 *(__r13 + 0x4c) = _t748;
                				if ( *((intOrPtr*)(__r13 + 0x34)) != 0) goto 0x3f0561ce;
                				if (r14d ==  *(__r12 + 0x18)) goto 0x3f056ef1;
                				_t610 =  *(__r13 + 8);
                				if (_t610 - 0x3f51 >= 0) goto 0x3f056ef1;
                				if (_t610 - 0x3f4e < 0) goto 0x3f0561ce;
                				if ( *(_t1419 + 0xa8) == 4) goto 0x3f056ef1;
                				r8d = r14d;
                				r8d = r8d -  *(__r12 + 0x18);
                				_t611 = E0000000113F057380(0x3f074840, _t1344, __r12,  *((intOrPtr*)(__r12 + 0x10)), _t1417); // executed
                				if (_t611 == 0) goto 0x3f056ef1;
                				 *(__r13 + 8) = 0x3f52;
                				goto 0x3f056fca;
                				 *(__r13 + 8) = 0x3f41;
                				_t1061 = _t1060 >> 2;
                				_t749 = _t748 + 0xfffffffd;
                				_t827 = _t749 & 0x00000007;
                				_t750 = _t749 - _t827;
                				if (_t750 - 0x20 >= 0) goto 0x3f05623e;
                				if (_t1012 == 0) goto 0x3f05615f;
                				_t1013 = _t1012 - 1;
                				_t1063 = (_t1061 >> _t827) + (( *_t1398 & 0x000000ff) << _t750);
                				_t1399 =  &(_t1398[1]);
                				if (_t750 + 8 - 0x20 < 0) goto 0x3f056220;
                				_t829 = _t1063 & 0x0000ffff;
                				if (_t829 ==  !_t1063 >> 0x10) goto 0x3f056265;
                				_t1324 = "invalid stored block lengths";
                				 *(__r12 + 0x20) = _t1324;
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x50) = _t829;
                				_t1064 = r15d;
                				 *(__r13 + 8) = 0x3f42;
                				_t752 = r15d;
                				if (r14d == 6) goto 0x3f05615f;
                				 *(__r13 + 8) = 0x3f43;
                				_t830 =  *(__r13 + 0x50);
                				if (_t830 == 0) goto 0x3f0562eb;
                				r14d = r10d;
                				_t619 =  <=  ? _t830 : _t1013;
                				r14d =  <=  ?  <=  ? _t830 : _t1013 : r14d;
                				if (r14d == 0) goto 0x3f05615f;
                				r8d = r14d;
                				E0000000113F0593C0( <=  ? _t830 : _t1013, _t1423, _t1399, __r8);
                				r10d =  *(_t1419 + 0xb8);
                				_t1014 = _t1013 - r14d;
                				r10d = r10d - r14d;
                				 *(_t1419 + 0xb8) = r10d;
                				_t1400 =  &(_t1399[_t1324]);
                				 *((long long*)(_t1419 + 0x40)) =  *((intOrPtr*)(_t1419 + 0x40)) + _t1324;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) - r14d;
                				goto 0x3f055fc1;
                				 *(__r13 + 8) = 0x3f3f;
                				if (_t752 - 0xe >= 0) goto 0x3f05631e;
                				if (_t1014 == 0) goto 0x3f05615f;
                				_t1015 = _t1014 - 1;
                				_t1065 = _t1064 + (( *_t1400 & 0x000000ff) << _t752);
                				_t1401 =  &(_t1400[1]);
                				_t753 = _t752 + 8;
                				if (_t753 - 0xe < 0) goto 0x3f056300;
                				_t754 = _t753 + 0xfffffff2;
                				_t1066 = _t1065 >> 5;
                				_t834 = (_t1065 & 0x0000001f) + 0x101;
                				_t1067 = _t1066 >> 5;
                				 *(__r13 + 0x7c) = _t834;
                				_t966 = (_t1066 & 0x0000001f) + 1;
                				 *(__r13 + 0x80) = _t966;
                				 *((intOrPtr*)(__r13 + 0x78)) = (_t1067 & 0x0000000f) + 4;
                				if (_t834 - 0x11e > 0) goto 0x3f056480;
                				if (_t966 - 0x1e > 0) goto 0x3f056480;
                				 *(__r13 + 0x84) = r15d;
                				 *(__r13 + 8) = 0x3f45;
                				if ( *(__r13 + 0x84) -  *((intOrPtr*)(__r13 + 0x78)) >= 0) goto 0x3f0563e8;
                				if (_t754 - 3 >= 0) goto 0x3f0563ae;
                				if (_t1015 == 0) goto 0x3f05615f;
                				_t1016 = _t1015 - 1;
                				_t1069 = (_t1067 >> 4) + (( *_t1401 & 0x000000ff) << _t754);
                				_t1402 =  &(_t1401[1]);
                				_t755 = _t754 + 8;
                				if (_t755 - 3 < 0) goto 0x3f056390;
                				_t756 = _t755 + 0xfffffffd;
                				 *(__r13 + 0x90 + _t1324 * 2) = _t1069 & 7;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				_t632 =  *(__r13 + 0x84);
                				if (_t632 -  *((intOrPtr*)(__r13 + 0x78)) < 0) goto 0x3f056384;
                				if (_t632 - 0x13 >= 0) goto 0x3f05641a;
                				 *(__r13 + 0x90 + _t1324 * 2) = r15w;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				if ( *(__r13 + 0x84) - 0x13 < 0) goto 0x3f0563f0;
                				_t1351 = __r13 + 0x70;
                				_t1325 = __r13 + 0x550;
                				 *_t1351 = 7;
                				 *(__r13 + 0x60) = _t1325;
                				 *(__r13 + 0x88) = _t1325;
                				 *((long long*)(_t1419 + 0x28)) = __r13 + 0x310;
                				 *(_t1419 + 0x20) = _t1351;
                				_t275 = _t1351 + 0x13; // 0x13
                				r8d = _t275;
                				_t635 = E0000000113F057AC0(0, __r13 + 0x90, _t1417, __r13 + 0x88, __r12);
                				 *(_t1419 + 0xb0) = _t635;
                				if (_t635 == 0) goto 0x3f056499;
                				 *(_t1438 + 0x20) = "invalid code lengths set";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1328 = "too many length or distance symbols";
                				 *(_t1438 + 0x20) = _t1328;
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x84) = r15d;
                				 *(__r13 + 8) = 0x3f46;
                				r10d =  *(__r13 + 0x7c);
                				if ( *(__r13 + 0x84) -  *(__r13 + 0x80) + r10d >= 0) goto 0x3f0566c2;
                				r9d = 1;
                				_t1434 =  *(__r13 + 0x60);
                				r9d = r9d <<  *(__r13 + 0x70);
                				r9d = r9d - 1;
                				_t1352 = _t1351 & _t1328;
                				_t637 =  *(_t1434 + _t1352 * 4);
                				r8d = _t637;
                				r8d = r8d >> 0x10;
                				 *(_t1419 + 0x34) = _t637;
                				if ((_t637 >> 0x00000008 & 0x000000ff) - _t756 <= 0) goto 0x3f056543;
                				if (_t1016 == 0) goto 0x3f05615f;
                				_t1017 = _t1016 - 1;
                				_t1403 =  &(_t1402[1]);
                				_t757 = _t756 + 8;
                				_t1329 = _t1328 & _t1352;
                				_t641 =  *(_t1434 + _t1329 * 4);
                				_t971 = _t641 >> 8;
                				r8d = _t641;
                				r8d = r8d >> 0x10;
                				 *(_t1419 + 0x34) = _t641;
                				if ((_t971 & 0x000000ff) - _t757 > 0) goto 0x3f056507;
                				_t1219 = r8w - 0x10;
                				if (_t1219 >= 0) goto 0x3f05657a;
                				_t758 = _t757 - (_t971 & 0x000000ff);
                				 *((short*)(__r13 + 0x90 + _t1352 * 2)) = _t641 >> 0x10;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				r8d =  *(__r13 + 0x84);
                				goto 0x3f0566a7;
                				if (_t1219 != 0) goto 0x3f0565d9;
                				_t973 = (_t971 & 0x000000ff) + 2;
                				if (_t758 - _t973 >= 0) goto 0x3f0565a3;
                				if (_t1017 == 0) goto 0x3f05615f;
                				_t1018 = _t1017 - 1;
                				_t1404 =  &(_t1403[1]);
                				_t759 = _t758 + 8;
                				if (_t759 - _t973 < 0) goto 0x3f056586;
                				_t851 =  *(_t1419 + 0x35) & 0x000000ff;
                				_t1074 = ((_t1069 >> 3) + (( *_t1402 & 0x000000ff) << _t756) >> (_t971 & 0x000000ff)) + (( *_t1403 & 0x000000ff) << _t758) >> _t851;
                				if ( *(__r13 + 0x84) == 0) goto 0x3f0566f2;
                				_t761 = _t759 - _t851 + 0xfffffffe;
                				r9d =  *(__r13 + 0x90 + _t1329 * 2) & 0x0000ffff;
                				goto 0x3f056663;
                				if (r8w != 0x11) goto 0x3f056620;
                				_t977 = (_t1074 & 0x00000003) + 6;
                				if (_t761 - _t977 >= 0) goto 0x3f056604;
                				if (_t1018 == 0) goto 0x3f05615f;
                				_t1019 = _t1018 - 1;
                				_t1405 =  &(_t1404[1]);
                				_t762 = _t761 + 8;
                				if (_t762 - _t977 < 0) goto 0x3f0565e7;
                				_t1077 = (_t1074 >> 2) + (( *_t1404 & 0x000000ff) << _t761) >> ( *(_t1419 + 0x35) & 0x000000ff);
                				r9d = r15d;
                				goto 0x3f05665f;
                				_t981 = (_t1077 & 0x00000007) + 0xa;
                				if (_t762 - _t981 >= 0) goto 0x3f056644;
                				if (_t1019 == 0) goto 0x3f05615f;
                				_t1020 = _t1019 - 1;
                				_t763 = _t762 + 8;
                				if (_t763 - _t981 < 0) goto 0x3f056627;
                				_t855 =  *(_t1419 + 0x35) & 0x000000ff;
                				_t1080 = (_t1077 >> 3) + (( *_t1405 & 0x000000ff) << _t762) >> _t855;
                				r9d = r15w & 0xffffffff;
                				_t1231 =  *(__r13 + 0x84) + (_t1080 & 0x0000007f) + 0xb -  *(__r13 + 0x80) +  *(__r13 + 0x7c);
                				if (_t1231 > 0) goto 0x3f0566f2;
                				 *(__r13 + 0x90 + _t1329 * 2) = r9w;
                				r8d =  *(__r13 + 0x84);
                				r8d = __r8 + 1;
                				 *(__r13 + 0x84) = r8d;
                				if (_t1231 != 0) goto 0x3f056680;
                				r10d =  *(__r13 + 0x7c);
                				if (r8d -  *(__r13 + 0x80) + r10d < 0) goto 0x3f0564d0;
                				if ( *(__r13 + 8) == 0x3f51) goto 0x3f055fb4;
                				if ( *((short*)(__r13 + 0x290)) != 0) goto 0x3f05670b;
                				 *(_t1438 + 0x20) = "invalid code -- missing end-of-block";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(_t1438 + 0x20) = "invalid bit length repeat";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1332 = __r13 + 0x550;
                				 *(__r13 + 0x70) = 9;
                				 *(__r13 + 0x88) = _t1332;
                				_t1445 = __r13 + 0x310;
                				 *(__r13 + 0x60) = _t1332;
                				 *((long long*)(_t1419 + 0x28)) = _t1445;
                				 *(_t1419 + 0x20) = __r13 + 0x70;
                				r8d = r10d;
                				_t657 = E0000000113F057AC0(1, __r13 + 0x90, _t1417, __r13 + 0x88, _t1438);
                				 *(_t1419 + 0xb0) = _t657;
                				if (_t657 == 0) goto 0x3f056779;
                				 *(_t1438 + 0x20) = "invalid literal/lengths set";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				_t1353 = __r13 + 0x74;
                				r8d =  *(__r13 + 0x80);
                				 *((long long*)(__r13 + 0x68)) =  *(__r13 + 0x88);
                				 *_t1353 = 6;
                				 *((long long*)(_t1419 + 0x28)) = _t1445;
                				 *(_t1419 + 0x20) = _t1353;
                				_t659 = E0000000113F057AC0(2, 0x90 +  *(__r13 + 0x88) * 2 + __r13, _t1417, __r13 + 0x88, _t1438);
                				 *(_t1419 + 0xb0) = _t659;
                				r15d = _t659;
                				if (_t659 == 0) goto 0x3f0567e6;
                				_t1336 = "invalid distances set";
                				 *(_t1438 + 0x20) = _t1336;
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(__r13 + 8) = 0x3f47;
                				if ( *(_t1419 + 0xa8) == 6) goto 0x3f056ee4;
                				r8d =  *(_t1419 + 0xa0);
                				r15d = 0;
                				r10d =  *(_t1419 + 0xb8);
                				 *(__r13 + 8) = 0x3f48;
                				if (_t1020 - 6 < 0) goto 0x3f056898;
                				if (r10d - 0x102 < 0) goto 0x3f056898;
                				 *((long long*)(_t1438 + 0x10)) =  *((intOrPtr*)(_t1419 + 0x40));
                				_t1355 = _t1438;
                				 *(_t1438 + 0x18) = r10d;
                				 *_t1438 =  &(_t1405[1]);
                				 *((intOrPtr*)(_t1438 + 8)) = _t1020;
                				 *(__r13 + 0x48) = _t1080 >> 7;
                				 *(__r13 + 0x4c) = _t763 + 0xfffffff9 - _t855;
                				E0000000113F058080(r8d, _t1030, _t1336, _t1355, _t1434, _t1437);
                				r10d =  *(_t1438 + 0x18);
                				_t1407 =  *_t1438;
                				_t1021 =  *((intOrPtr*)(_t1438 + 8));
                				_t765 =  *(__r13 + 0x4c);
                				 *((long long*)(_t1419 + 0x40)) =  *((intOrPtr*)(_t1438 + 0x10));
                				 *(_t1419 + 0xb8) = r10d;
                				if ( *(__r13 + 8) != 0x3f3f) goto 0x3f055fc1;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fc1;
                				_t1435 =  *(__r13 + 0x60);
                				_t1356 = _t1355 & _t1336;
                				 *(__r13 + 0x1be4) = r15d;
                				if (( *(_t1435 + _t1356 * 4) >> 0x00000008 & 0x000000ff) - _t765 <= 0) goto 0x3f0568f7;
                				if (_t1021 == 0) goto 0x3f05615f;
                				_t1022 = _t1021 - 1;
                				_t1083 =  *(__r13 + 0x48) + (( *_t1407 & 0x000000ff) << _t765);
                				_t1408 =  &(_t1407[1]);
                				_t766 = _t765 + 8;
                				_t666 =  *(_t1435 + (_t1336 & _t1356) * 4);
                				if ((_t666 >> 0x00000008 & 0x000000ff) - _t766 > 0) goto 0x3f0568c7;
                				if (_t666 == 0) goto 0x3f0569b3;
                				if ((_t666 & 0x000000f0) != 0) goto 0x3f0569b3;
                				 *(_t1419 + 0x34) = _t666;
                				r14d =  *(_t1419 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t666 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t666 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t1083;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t666 >> 0x10);
                				r8d =  *(_t1435 + _t1421 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t766 <= 0) goto 0x3f0569a4;
                				r11d =  *(_t1419 + 0x36) & 0x0000ffff;
                				if (_t1022 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t1084 = _t1083 + (( *_t1408 & 0x000000ff) << _t766);
                				_t1023 = _t1022 - 1;
                				r8d = r8d << (_t666 & 0x000000ff) + r14d;
                				_t1409 =  &(_t1408[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t1084;
                				_t767 = _t766 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t671 =  *(_t1435 + _t1421 * 4);
                				r8d = _t671 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t767 > 0) goto 0x3f056958;
                				_t885 = r14d;
                				 *(__r13 + 0x1be4) = _t885;
                				_t888 = _t671 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t888;
                				_t769 = _t767 - r14d - _t888;
                				 *(__r13 + 0x50) = _t671 >> 0x10;
                				if (_t671 != 0) goto 0x3f0569e0;
                				 *(__r13 + 8) = 0x3f4d;
                				goto 0x3f055fb4;
                				if ((_t671 & 0x00000020) == 0) goto 0x3f0569f4;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fac;
                				if ((_t671 & 0x00000040) == 0) goto 0x3f056a11;
                				_t1338 = "invalid literal/length code";
                				 *(_t1438 + 0x20) = _t1338;
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(__r13 + 8) = 0x3f49;
                				 *(__r13 + 0x58) = _t671 & 0xf;
                				_t993 =  *(__r13 + 0x58);
                				if (_t993 == 0) goto 0x3f056a69;
                				if (_t769 - _t993 >= 0) goto 0x3f056a4d;
                				if (_t1023 == 0) goto 0x3f05615f;
                				_t1024 = _t1023 - 1;
                				_t1087 = (_t1084 >> _t885 >> _t888) + (( *_t1409 & 0x000000ff) << _t769);
                				_t1410 =  &(_t1409[1]);
                				_t770 = _t769 + 8;
                				if (_t770 - _t993 < 0) goto 0x3f056a30;
                				_t894 = _t993;
                				_t771 = _t770 - _t993;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + ((0x00000001 << _t894) - 0x00000001 & _t1087);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t993;
                				 *(__r13 + 0x1be8) =  *(__r13 + 0x50);
                				 *(__r13 + 8) = 0x3f4a;
                				_t1436 =  *((intOrPtr*)(__r13 + 0x68));
                				_t1357 = _t1356 & _t1338;
                				if (( *(_t1436 + _t1357 * 4) >> 0x00000008 & 0x000000ff) - _t771 <= 0) goto 0x3f056ad4;
                				if (_t1024 == 0) goto 0x3f05615f;
                				_t1025 = _t1024 - 1;
                				_t1089 = (_t1087 >> _t894) + (( *_t1410 & 0x000000ff) << _t771);
                				_t1411 =  &(_t1410[1]);
                				_t772 = _t771 + 8;
                				_t684 =  *(_t1436 + (_t1338 & _t1357) * 4);
                				if ((_t684 >> 0x00000008 & 0x000000ff) - _t772 > 0) goto 0x3f056aa4;
                				if ((_t684 & 0x000000f0) != 0) goto 0x3f056b8b;
                				 *(_t1419 + 0x34) = _t684;
                				r14d =  *(_t1419 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t684 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t684 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t1089;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t684 >> 0x10);
                				r8d =  *(_t1436 + _t1421 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t772 <= 0) goto 0x3f056b7c;
                				r11d =  *(_t1419 + 0x36) & 0x0000ffff;
                				if (_t1025 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t1090 = _t1089 + (( *_t1411 & 0x000000ff) << _t772);
                				_t1026 = _t1025 - 1;
                				r8d = r8d << (_t684 & 0x000000ff) + r14d;
                				_t1412 =  &(_t1411[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t1090;
                				_t773 = _t772 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t689 =  *(_t1436 + _t1421 * 4);
                				r8d = _t689 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t773 > 0) goto 0x3f056b30;
                				_t918 = r14d;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t918;
                				r10d =  *(_t1419 + 0xb8);
                				_t921 = _t689 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t921;
                				_t775 = _t773 - r14d - _t921;
                				if ((_t689 & 0x00000040) == 0) goto 0x3f056bc3;
                				 *(_t1438 + 0x20) = "invalid distance code";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				r8d =  *(_t1419 + 0xa0);
                				 *(__r13 + 0x54) = _t689 >> 0x10;
                				 *(__r13 + 8) = 0x3f4b;
                				 *(__r13 + 0x58) = _t689 & 0xf;
                				_t998 =  *(__r13 + 0x58);
                				if (_t998 == 0) goto 0x3f056c2b;
                				if (_t775 - _t998 >= 0) goto 0x3f056c0f;
                				if (_t1026 == 0) goto 0x3f05615f;
                				_t1027 = _t1026 - 1;
                				_t1093 = (_t1090 >> _t918 >> _t921) + (( *_t1412 & 0x000000ff) << _t775);
                				_t1413 =  &(_t1412[1]);
                				_t776 = _t775 + 8;
                				if (_t776 - _t998 < 0) goto 0x3f056bf2;
                				_t927 = _t998;
                				_t777 = _t776 - _t998;
                				_t1094 = _t1093 >> _t927;
                				 *(__r13 + 0x54) =  *(__r13 + 0x54) + ((0x00000001 << _t927) - 0x00000001 & _t1093);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t998;
                				 *(__r13 + 8) = 0x3f4c;
                				if (r10d == 0) goto 0x3f05615f;
                				_t696 =  *(__r13 + 0x54);
                				_t929 = r8d - r10d;
                				if (_t696 - _t929 <= 0) goto 0x3f056c9b;
                				_t697 = _t696 - _t929;
                				if (_t697 -  *((intOrPtr*)(__r13 + 0x38)) <= 0) goto 0x3f056c75;
                				if ( *((intOrPtr*)(__r13 + 0x1be0)) == 0) goto 0x3f056c75;
                				_t1341 = "invalid distance too far back";
                				 *(_t1438 + 0x20) = _t1341;
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				_t930 =  *((intOrPtr*)(__r13 + 0x3c));
                				if (_t697 - _t930 <= 0) goto 0x3f056c83;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				r9d =  <=  ? _t697 - _t930 : r9d;
                				goto 0x3f056caa;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				_t934 =  <=  ? r9d : r10d;
                				_t1430 =  *((intOrPtr*)(_t1419 + 0x40));
                				r10d = r10d - _t934;
                				r8d = r8d - _t934;
                				 *(_t1419 + 0xb8) = r10d;
                				 *(__r13 + 0x50) = r8d;
                				 *_t1430 =  *( *((intOrPtr*)(_t1419 + 0x40)) - _t1341 - _t1430 + _t1430) & 0x000000ff;
                				_t1431 = _t1430 + 1;
                				if (r9d != r10d) goto 0x3f056cd0;
                				 *((long long*)(_t1419 + 0x40)) = _t1431;
                				if ( *(__r13 + 0x50) != _t934 + 0xffffffff) goto 0x3f055fc1;
                				 *(__r13 + 8) = 0x3f48;
                				if (r10d == 0) goto 0x3f05615f;
                				 *_t1431 =  *(__r13 + 0x50) & 0x000000ff;
                				_t1432 = _t1431 + 1;
                				r10d = r10d - 1;
                				 *((long long*)(_t1419 + 0x40)) = _t1432;
                				 *(_t1419 + 0xb8) = r10d;
                				 *(__r13 + 8) = 0x3f48;
                				goto 0x3f055fc1;
                				if ( *((intOrPtr*)(_t1417 + 0x10)) == 0) goto 0x3f056e16;
                				if (_t777 - 0x20 >= 0) goto 0x3f056d5e;
                				if (_t1027 == 0) goto 0x3f05615f;
                				_t1028 = _t1027 - 1;
                				_t1414 =  &(_t1413[1]);
                				if (_t777 + 8 - 0x20 < 0) goto 0x3f056d40;
                				r8d = r8d - r10d;
                				 *((intOrPtr*)(_t1438 + 0x1c)) =  *((intOrPtr*)(_t1438 + 0x1c)) + r8d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r8d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056dac;
                				if (r8d == 0) goto 0x3f056dac;
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056d92;
                				E0000000113F057780(_t1432 - _t1341);
                				goto 0x3f056d97;
                				_t706 = E0000000113F057490( *(__r13 + 0x20), _t1341, _t1432 - _t1341, _t1421, _t1432);
                				r10d =  *(_t1419 + 0xb8);
                				 *(__r13 + 0x20) = _t706;
                				 *(_t1438 + 0x4c) = _t706;
                				 *(_t1419 + 0xa0) = r10d;
                				r14d = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056e06;
                				if ( *(__r13 + 0x18) != 0) goto 0x3f056de7;
                				if (((_t1094 + (( *_t1413 & 0x000000ff) << _t777) & 0x0000ff00) + (_t1094 + (( *_t1413 & 0x000000ff) << _t777) << 0x10) << 8) + (_t1094 + (( *_t1413 & 0x000000ff) << _t777) >> 0x00000008 & 0x0000ff00) + (_t1094 + (( *_t1413 & 0x000000ff) << _t777) >> 0x18) ==  *(__r13 + 0x20)) goto 0x3f056e06;
                				 *(_t1438 + 0x20) = "incorrect data check";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				_t1096 = r15d;
                				 *(__r13 + 8) = 0x3f4f;
                				_t779 = r15d;
                				goto 0x3f056e30;
                				r14d =  *(_t1419 + 0xa0);
                				 *(__r13 + 8) = 0x3f4f;
                				r14d =  *(_t1419 + 0xa0);
                				if ( *(__r13 + 0x10) == 0) goto 0x3f056eab;
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056eab;
                				if (_t779 - 0x20 >= 0) goto 0x3f056e61;
                				if (_t1028 == 0) goto 0x3f056167;
                				_t1097 = _t1096 + (( *_t1414 & 0x000000ff) << _t779);
                				_t780 = _t779 + 8;
                				if (_t780 - 0x20 < 0) goto 0x3f056e43;
                				if (_t1097 ==  *((intOrPtr*)(__r13 + 0x24))) goto 0x3f056ea5;
                				 *(_t1438 + 0x20) = "incorrect length check";
                				 *(__r13 + 8) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((long long*)(_t1438 + 0x10)) = _t1432;
                				 *(_t1438 + 0x18) = r10d;
                				 *_t1438 =  &(_t1414[1]);
                				 *((intOrPtr*)(_t1438 + 8)) = _t1028 - 1;
                				 *(__r13 + 0x48) = _t1097;
                				 *(__r13 + 0x4c) = _t780;
                				goto 0x3f056fca;
                				 *(__r13 + 8) = 0x3f50;
                				r15d = 1;
                				r14d =  *(_t1419 + 0xa0);
                				r15d = 1;
                				r14d =  *(_t1419 + 0xa0);
                				r15d = 0xfffffffd;
                				goto 0x3f05616f;
                				r14d =  *(_t1419 + 0xa0);
                				goto 0x3f056176;
                				r14d = r14d -  *(_t1438 + 0x18);
                				r10d =  *(_t1419 + 0x38);
                				r10d = r10d -  *((intOrPtr*)(_t1438 + 8));
                				 *((intOrPtr*)(_t1438 + 0xc)) =  *((intOrPtr*)(_t1438 + 0xc)) + r10d;
                				 *((intOrPtr*)(_t1438 + 0x1c)) =  *((intOrPtr*)(_t1438 + 0x1c)) + r14d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r14d;
                				 *(_t1419 + 0x38) = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056f52;
                				if (r14d == 0) goto 0x3f056f52;
                				r8d = r14d;
                				_t945 =  *(__r13 + 0x20);
                				if ( *(__r13 + 0x18) == 0) goto 0x3f056f3f;
                				E0000000113F057780( *((intOrPtr*)(_t1438 + 0x10)) - "incorrect length check");
                				goto 0x3f056f44;
                				_t720 = E0000000113F057490(_t945, "incorrect length check",  *((intOrPtr*)(_t1438 + 0x10)) - "incorrect length check", _t1421, _t1432);
                				r10d =  *(_t1419 + 0x38);
                				 *(__r13 + 0x20) = _t720;
                				 *(_t1438 + 0x4c) = _t720;
                				_t1000 =  *(__r13 + 8);
                				if (_t1000 == 0x3f47) goto 0x3f056f6e;
                				if (_t1000 == 0x3f42) goto 0x3f056f6e;
                				r9d = 0;
                				r8d = r9d;
                				goto 0x3f056f77;
                				r8d = 0x100;
                				r9d = 0;
                				asm("sbb ecx, ecx");
                				r9d =  ==  ? 0x80 : r9d;
                				 *((intOrPtr*)(_t1438 + 0x48)) = (_t945 & 0x00000040) + r9d +  *(__r13 + 0x4c) + r8d;
                				if (r10d != 0) goto 0x3f056faa;
                				if (r14d == 0) goto 0x3f056fb4;
                				if ( *(_t1419 + 0xa8) != 4) goto 0x3f056fc0;
                				r15d =  ==  ? 0xfffffffb : r15d;
                				goto 0x3f056fca;
                				return 0xfffffffe;
                			}


































































































































































































































                0x13f05592d
                0x13f05592d
                0x13f05592d
                0x13f05592d
                0x13f055933
                0x13f055935
                0x13f05593d
                0x13f055945
                0x13f055949
                0x13f055956
                0x13f05595a
                0x13f055963
                0x13f055968
                0x13f055970
                0x13f055977
                0x13f055979
                0x13f055981
                0x13f05598d
                0x13f055996
                0x13f05599d
                0x13f0559ac
                0x13f0559b0
                0x13f0559b6
                0x13f0559be
                0x13f0559c3
                0x13f0559c7
                0x13f0559ce
                0x13f0559d0
                0x13f0559de
                0x13f055a09
                0x13f055a15
                0x13f055a1e
                0x13f055a23
                0x13f055a2b
                0x13f055a37
                0x13f055a3f
                0x13f055a44
                0x13f055a46
                0x13f055a4f
                0x13f055a53
                0x13f055a5a
                0x13f055a63
                0x13f055a67
                0x13f055a6f
                0x13f055a74
                0x13f055a7b
                0x13f055a86
                0x13f055a8a
                0x13f055a8d
                0x13f055a99
                0x13f055a9e
                0x13f055aa6
                0x13f055ab2
                0x13f055ab7
                0x13f055ac7
                0x13f055ad2
                0x13f055adf
                0x13f055ae1
                0x13f055ae3
                0x13f055aec
                0x13f055aee
                0x13f055af6
                0x13f055aff
                0x13f055b04
                0x13f055b0c
                0x13f055b17
                0x13f055b20
                0x13f055b25
                0x13f055b2d
                0x13f055b32
                0x13f055b38
                0x13f055b3d
                0x13f055b40
                0x13f055b47
                0x13f055b4d
                0x13f055b51
                0x13f055b58
                0x13f055b5a
                0x13f055b64
                0x13f055b68
                0x13f055b77
                0x13f055b7b
                0x13f055b7e
                0x13f055b86
                0x13f055b8e
                0x13f055b92
                0x13f055b9f
                0x13f055ba1
                0x13f055ba3
                0x13f055bac
                0x13f055bae
                0x13f055bb5
                0x13f055bb7
                0x13f055bc2
                0x13f055bc9
                0x13f055bcd
                0x13f055bda
                0x13f055bde
                0x13f055bec
                0x13f055bf0
                0x13f055bfe
                0x13f055c02
                0x13f055c05
                0x13f055c0d
                0x13f055c15
                0x13f055c19
                0x13f055c26
                0x13f055c28
                0x13f055c2a
                0x13f055c33
                0x13f055c35
                0x13f055c3c
                0x13f055c42
                0x13f055c4e
                0x13f055c51
                0x13f055c60
                0x13f055c67
                0x13f055c69
                0x13f055c73
                0x13f055c77
                0x13f055c86
                0x13f055c8d
                0x13f055c95
                0x13f055ca0
                0x13f055ca5
                0x13f055ca9
                0x13f055cb6
                0x13f055cb8
                0x13f055cba
                0x13f055cc3
                0x13f055cc5
                0x13f055cc9
                0x13f055cd0
                0x13f055cd2
                0x13f055cdd
                0x13f055ce4
                0x13f055ce6
                0x13f055cf3
                0x13f055cf9
                0x13f055d07
                0x13f055d0e
                0x13f055d11
                0x13f055d13
                0x13f055d17
                0x13f055d1a
                0x13f055d1c
                0x13f055d20
                0x13f055d2c
                0x13f055d30
                0x13f055d36
                0x13f055d3a
                0x13f055d3f
                0x13f055d46
                0x13f055d48
                0x13f055d4f
                0x13f055d51
                0x13f055d58
                0x13f055d5a
                0x13f055d61
                0x13f055d68
                0x13f055d78
                0x13f055d7b
                0x13f055d7e
                0x13f055d84
                0x13f055d8d
                0x13f055d91
                0x13f055d98
                0x13f055d9e
                0x13f055da9
                0x13f055db0
                0x13f055db3
                0x13f055db6
                0x13f055dc0
                0x13f055dc6
                0x13f055dca
                0x13f055dda
                0x13f055de2
                0x13f055de8
                0x13f055df3
                0x13f055df6
                0x13f055dfb
                0x13f055e02
                0x13f055e04
                0x13f055e0b
                0x13f055e14
                0x13f055e16
                0x13f055e1a
                0x13f055e21
                0x13f055e26
                0x13f055e30
                0x13f055e37
                0x13f055e3d
                0x13f055e48
                0x13f055e4f
                0x13f055e52
                0x13f055e58
                0x13f055e5e
                0x13f055e61
                0x13f055e63
                0x13f055e6a
                0x13f055e6c
                0x13f055e70
                0x13f055e74
                0x13f055e84
                0x13f055e88
                0x13f055e8e
                0x13f055e94
                0x13f055e97
                0x13f055e9c
                0x13f055ea3
                0x13f055ea5
                0x13f055eac
                0x13f055eb5
                0x13f055eb7
                0x13f055ebb
                0x13f055ec2
                0x13f055ec7
                0x13f055ed1
                0x13f055ed8
                0x13f055ede
                0x13f055ee1
                0x13f055ee9
                0x13f055ef0
                0x13f055ef3
                0x13f055ef9
                0x13f055eff
                0x13f055f02
                0x13f055f04
                0x13f055f08
                0x13f055f0b
                0x13f055f0d
                0x13f055f11
                0x13f055f19
                0x13f055f25
                0x13f055f29
                0x13f055f2e
                0x13f055f32
                0x13f055f3f
                0x13f055f43
                0x13f055f4c
                0x13f055f53
                0x13f055f5c
                0x13f055f65
                0x13f055f6a
                0x13f055f72
                0x13f055f74
                0x13f055f77
                0x13f055f7a
                0x13f055f81
                0x13f055f89
                0x13f055f8c
                0x13f055f90
                0x13f055f97
                0x13f055f9e
                0x13f055fa3
                0x13f055fa7
                0x13f055fac
                0x13f055fb4
                0x13f055fbc
                0x13f055fc5
                0x13f055fce
                0x13f055fd4
                0x13f055fdc
                0x13f055fdf
                0x13f055fef
                0x13f055ff3
                0x13f056000
                0x13f056004
                0x13f05600d
                0x13f05601e
                0x13f056033
                0x13f056038
                0x13f05603c
                0x13f056041
                0x13f05604e
                0x13f056054
                0x13f05605b
                0x13f056060
                0x13f056068
                0x13f05606c
                0x13f056071
                0x13f056080
                0x13f05608b
                0x13f05608f
                0x13f056097
                0x13f05609c
                0x13f05609e
                0x13f0560a6
                0x13f0560aa
                0x13f0560b7
                0x13f0560b9
                0x13f0560bb
                0x13f0560be
                0x13f0560c1
                0x13f0560c4
                0x13f0560c8
                0x13f0560cd
                0x13f0560d6
                0x13f0560df
                0x13f0560e4
                0x13f0560e9
                0x13f0560f9
                0x13f056101
                0x13f056109
                0x13f056114
                0x13f05611c
                0x13f056121
                0x13f056130
                0x13f05613b
                0x13f05613f
                0x13f056147
                0x13f056153
                0x13f056159
                0x13f05615c
                0x13f05615f
                0x13f056167
                0x13f056182
                0x13f056187
                0x13f05618c
                0x13f056190
                0x13f05619a
                0x13f05619e
                0x13f0561a2
                0x13f0561a9
                0x13f0561af
                0x13f0561b8
                0x13f0561c3
                0x13f0561c8
                0x13f0561d3
                0x13f0561d6
                0x13f0561de
                0x13f0561e5
                0x13f0561eb
                0x13f0561f8
                0x13f0561fd
                0x13f056205
                0x13f056208
                0x13f056212
                0x13f056217
                0x13f05621c
                0x13f056222
                0x13f05622f
                0x13f056231
                0x13f056233
                0x13f05623c
                0x13f056240
                0x13f05624a
                0x13f05624c
                0x13f056253
                0x13f056258
                0x13f056260
                0x13f056265
                0x13f056269
                0x13f05626c
                0x13f056274
                0x13f05627b
                0x13f056281
                0x13f056289
                0x13f05628f
                0x13f056295
                0x13f056298
                0x13f05629e
                0x13f0562a5
                0x13f0562ab
                0x13f0562b4
                0x13f0562b9
                0x13f0562c1
                0x13f0562c9
                0x13f0562d2
                0x13f0562da
                0x13f0562dd
                0x13f0562e2
                0x13f0562e6
                0x13f0562eb
                0x13f0562fb
                0x13f056302
                0x13f05630f
                0x13f056311
                0x13f056313
                0x13f056316
                0x13f05631c
                0x13f056320
                0x13f056323
                0x13f05632b
                0x13f056331
                0x13f056339
                0x13f056346
                0x13f056348
                0x13f05634f
                0x13f056359
                0x13f056362
                0x13f056368
                0x13f05636f
                0x13f056382
                0x13f056387
                0x13f056392
                0x13f05639f
                0x13f0563a1
                0x13f0563a3
                0x13f0563a6
                0x13f0563ac
                0x13f0563bf
                0x13f0563cb
                0x13f0563d4
                0x13f0563db
                0x13f0563e6
                0x13f0563eb
                0x13f056400
                0x13f056409
                0x13f056418
                0x13f05641a
                0x13f05641e
                0x13f056425
                0x13f056432
                0x13f056436
                0x13f056447
                0x13f05644c
                0x13f056453
                0x13f056453
                0x13f056457
                0x13f05645c
                0x13f056465
                0x13f05646e
                0x13f056473
                0x13f05647b
                0x13f056480
                0x13f056487
                0x13f05648c
                0x13f056494
                0x13f056499
                0x13f0564a5
                0x13f0564b4
                0x13f0564c2
                0x13f0564d4
                0x13f0564da
                0x13f0564de
                0x13f0564e1
                0x13f0564e9
                0x13f0564ec
                0x13f0564f5
                0x13f0564fb
                0x13f0564ff
                0x13f056505
                0x13f056509
                0x13f056516
                0x13f05651a
                0x13f05651f
                0x13f056525
                0x13f056528
                0x13f05652e
                0x13f056531
                0x13f056537
                0x13f05653b
                0x13f056541
                0x13f056543
                0x13f056548
                0x13f056555
                0x13f05655e
                0x13f056567
                0x13f05656e
                0x13f056575
                0x13f05657d
                0x13f05657f
                0x13f056584
                0x13f056588
                0x13f056595
                0x13f056599
                0x13f05659c
                0x13f0565a1
                0x13f0565a3
                0x13f0565b1
                0x13f0565b5
                0x13f0565bd
                0x13f0565cb
                0x13f0565d4
                0x13f0565de
                0x13f0565e0
                0x13f0565e5
                0x13f0565e9
                0x13f0565f6
                0x13f0565fa
                0x13f0565fd
                0x13f056602
                0x13f05660e
                0x13f056610
                0x13f05661e
                0x13f056620
                0x13f056625
                0x13f056629
                0x13f056636
                0x13f05663d
                0x13f056642
                0x13f056644
                0x13f05664e
                0x13f056650
                0x13f056677
                0x13f056679
                0x13f056687
                0x13f056690
                0x13f056697
                0x13f05669b
                0x13f0566a5
                0x13f0566ae
                0x13f0566b8
                0x13f0566c8
                0x13f0566d7
                0x13f0566e0
                0x13f0566e5
                0x13f0566ed
                0x13f0566f9
                0x13f0566fe
                0x13f056706
                0x13f05670b
                0x13f056712
                0x13f05671a
                0x13f056721
                0x13f056728
                0x13f056737
                0x13f056743
                0x13f056748
                0x13f056750
                0x13f056755
                0x13f05675e
                0x13f056767
                0x13f05676c
                0x13f056774
                0x13f056780
                0x13f056784
                0x13f056792
                0x13f05679a
                0x13f0567a0
                0x13f0567a5
                0x13f0567ba
                0x13f0567bf
                0x13f0567c6
                0x13f0567cb
                0x13f0567cd
                0x13f0567d4
                0x13f0567d9
                0x13f0567e1
                0x13f0567ed
                0x13f0567f8
                0x13f0567fe
                0x13f056806
                0x13f056809
                0x13f056811
                0x13f05681c
                0x13f056825
                0x13f05682f
                0x13f056834
                0x13f056837
                0x13f05683c
                0x13f056840
                0x13f056845
                0x13f056849
                0x13f05684d
                0x13f05685f
                0x13f056864
                0x13f056868
                0x13f056871
                0x13f056875
                0x13f05687a
                0x13f056882
                0x13f056888
                0x13f056893
                0x13f0568a1
                0x13f0568ad
                0x13f0568b0
                0x13f0568c5
                0x13f0568c9
                0x13f0568d6
                0x13f0568d8
                0x13f0568da
                0x13f0568df
                0x13f0568e7
                0x13f0568f5
                0x13f0568f9
                0x13f056901
                0x13f056909
                0x13f05690d
                0x13f056913
                0x13f05691e
                0x13f05692b
                0x13f056931
                0x13f056934
                0x13f056937
                0x13f05693a
                0x13f056946
                0x13f05694a
                0x13f056950
                0x13f056952
                0x13f05695a
                0x13f056967
                0x13f05696d
                0x13f056975
                0x13f056977
                0x13f05697a
                0x13f05697d
                0x13f056983
                0x13f056986
                0x13f056989
                0x13f05698c
                0x13f05698f
                0x13f056998
                0x13f05699c
                0x13f0569a2
                0x13f0569a4
                0x13f0569ac
                0x13f0569b8
                0x13f0569bb
                0x13f0569c2
                0x13f0569cb
                0x13f0569d1
                0x13f0569d3
                0x13f0569db
                0x13f0569e2
                0x13f0569e4
                0x13f0569ef
                0x13f0569f6
                0x13f0569f8
                0x13f0569ff
                0x13f056a04
                0x13f056a0c
                0x13f056a17
                0x13f056a1f
                0x13f056a23
                0x13f056a29
                0x13f056a2d
                0x13f056a32
                0x13f056a3f
                0x13f056a41
                0x13f056a43
                0x13f056a46
                0x13f056a4b
                0x13f056a4d
                0x13f056a56
                0x13f056a5e
                0x13f056a62
                0x13f056a6d
                0x13f056a74
                0x13f056a85
                0x13f056a91
                0x13f056aa2
                0x13f056aa6
                0x13f056ab3
                0x13f056ab5
                0x13f056ab7
                0x13f056abc
                0x13f056ac4
                0x13f056ad2
                0x13f056ad6
                0x13f056ade
                0x13f056ae2
                0x13f056ae8
                0x13f056af3
                0x13f056b00
                0x13f056b06
                0x13f056b09
                0x13f056b0c
                0x13f056b0f
                0x13f056b1b
                0x13f056b1f
                0x13f056b25
                0x13f056b27
                0x13f056b32
                0x13f056b3f
                0x13f056b45
                0x13f056b4d
                0x13f056b4f
                0x13f056b52
                0x13f056b55
                0x13f056b5b
                0x13f056b5e
                0x13f056b61
                0x13f056b64
                0x13f056b67
                0x13f056b70
                0x13f056b74
                0x13f056b7a
                0x13f056b7c
                0x13f056b84
                0x13f056b8b
                0x13f056b98
                0x13f056b9b
                0x13f056ba2
                0x13f056ba8
                0x13f056bb1
                0x13f056bb6
                0x13f056bbe
                0x13f056bc3
                0x13f056bd0
                0x13f056bda
                0x13f056be2
                0x13f056be6
                0x13f056bec
                0x13f056bf0
                0x13f056bf4
                0x13f056c01
                0x13f056c03
                0x13f056c05
                0x13f056c08
                0x13f056c0d
                0x13f056c0f
                0x13f056c18
                0x13f056c1e
                0x13f056c20
                0x13f056c24
                0x13f056c2b
                0x13f056c36
                0x13f056c3c
                0x13f056c43
                0x13f056c48
                0x13f056c4a
                0x13f056c50
                0x13f056c5a
                0x13f056c5c
                0x13f056c63
                0x13f056c68
                0x13f056c70
                0x13f056c75
                0x13f056c7b
                0x13f056c83
                0x13f056c8b
                0x13f056c95
                0x13f056c99
                0x13f056ca0
                0x13f056ca7
                0x13f056cb0
                0x13f056cb4
                0x13f056cb9
                0x13f056cbc
                0x13f056cbf
                0x13f056cca
                0x13f056cd5
                0x13f056cd8
                0x13f056cde
                0x13f056ce0
                0x13f056ce9
                0x13f056cef
                0x13f056cff
                0x13f056d0a
                0x13f056d0d
                0x13f056d10
                0x13f056d13
                0x13f056d18
                0x13f056d20
                0x13f056d28
                0x13f056d32
                0x13f056d3b
                0x13f056d42
                0x13f056d4f
                0x13f056d53
                0x13f056d5c
                0x13f056d5e
                0x13f056d61
                0x13f056d66
                0x13f056d70
                0x13f056d75
                0x13f056d89
                0x13f056d8b
                0x13f056d90
                0x13f056d92
                0x13f056d97
                0x13f056d9f
                0x13f056da3
                0x13f056dac
                0x13f056db4
                0x13f056db9
                0x13f056dc2
                0x13f056deb
                0x13f056df4
                0x13f056df9
                0x13f056e01
                0x13f056e06
                0x13f056e09
                0x13f056e11
                0x13f056e14
                0x13f056e16
                0x13f056e1e
                0x13f056e28
                0x13f056e35
                0x13f056e3c
                0x13f056e41
                0x13f056e45
                0x13f056e54
                0x13f056e59
                0x13f056e5f
                0x13f056e65
                0x13f056e6e
                0x13f056e73
                0x13f056e7b
                0x13f056e80
                0x13f056e8a
                0x13f056e8f
                0x13f056e93
                0x13f056e98
                0x13f056e9c
                0x13f056ea0
                0x13f056eab
                0x13f056eb3
                0x13f056ebe
                0x13f056ec6
                0x13f056ed1
                0x13f056ed9
                0x13f056edf
                0x13f056ee4
                0x13f056eec
                0x13f056ef1
                0x13f056ef6
                0x13f056efb
                0x13f056f00
                0x13f056f05
                0x13f056f0a
                0x13f056f13
                0x13f056f18
                0x13f056f1d
                0x13f056f24
                0x13f056f27
                0x13f056f36
                0x13f056f38
                0x13f056f3d
                0x13f056f3f
                0x13f056f44
                0x13f056f49
                0x13f056f4d
                0x13f056f52
                0x13f056f5c
                0x13f056f64
                0x13f056f66
                0x13f056f69
                0x13f056f6c
                0x13f056f6e
                0x13f056f74
                0x13f056f82
                0x13f056f8d
                0x13f056f9b
                0x13f056fa3
                0x13f056fa8
                0x13f056fb2
                0x13f056fbc
                0x13f056fc3
                0x13f056fda

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: incorrect header check$invalid window size$unknown compression method
                • API String ID: 0-1186847913
                • Opcode ID: 0ab20c3767355d00d4fe6ff182fda0534a6c21a6ae395ff8ae181bae14ef9686
                • Instruction ID: 78b8a227007dabf7f562549a07904e19643b9556a73a2655d2fa38a68008ba61
                • Opcode Fuzzy Hash: 0ab20c3767355d00d4fe6ff182fda0534a6c21a6ae395ff8ae181bae14ef9686
                • Instruction Fuzzy Hash: 1D918472B18389CBE7A88B5CD48CBAE7BAAF744354F11413DFA4946792D774CA46CB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 69%
                			E0000000113F055FEC(signed int __ebx, void* __edi, void* __ebp, signed char* __rsi, signed long long __r8, void* __r9, void* __r11, signed long long __r12, void* __r13, void* __r14) {
                				signed int _t350;
                				signed int _t351;
                				intOrPtr _t362;
                				void* _t363;
                				signed int _t384;
                				signed int _t387;
                				unsigned int _t389;
                				unsigned int _t393;
                				signed int _t409;
                				signed int _t411;
                				signed int _t418;
                				signed char _t423;
                				signed int _t436;
                				signed char _t441;
                				unsigned int _t448;
                				void* _t449;
                				signed int _t458;
                				signed int _t472;
                				signed int _t481;
                				signed int _t482;
                				void* _t483;
                				signed int _t486;
                				signed int _t487;
                				signed int _t488;
                				signed int _t490;
                				void* _t491;
                				signed int _t492;
                				void* _t493;
                				signed int _t494;
                				void* _t495;
                				signed int _t496;
                				void* _t497;
                				signed int _t499;
                				signed int _t500;
                				void* _t501;
                				signed int _t503;
                				signed int _t504;
                				void* _t505;
                				signed int _t507;
                				void* _t508;
                				signed int _t509;
                				signed int _t510;
                				void* _t511;
                				signed int _t513;
                				void* _t514;
                				signed int _t515;
                				signed int _t517;
                				signed int _t518;
                				signed char _t527;
                				signed char _t530;
                				signed int _t532;
                				signed char _t533;
                				signed int _t537;
                				signed char _t554;
                				signed char _t558;
                				signed char _t588;
                				signed char _t591;
                				signed char _t597;
                				signed char _t621;
                				signed char _t624;
                				signed char _t630;
                				void* _t632;
                				intOrPtr _t633;
                				void* _t637;
                				signed int _t648;
                				signed int _t657;
                				signed char _t662;
                				void* _t664;
                				void* _t668;
                				void* _t672;
                				signed char _t684;
                				signed char _t689;
                				intOrPtr _t691;
                				void* _t693;
                				intOrPtr _t694;
                				void* _t695;
                				void* _t696;
                				void* _t697;
                				void* _t698;
                				void* _t699;
                				void* _t700;
                				void* _t701;
                				intOrPtr _t702;
                				intOrPtr _t703;
                				void* _t704;
                				void* _t705;
                				void* _t706;
                				void* _t707;
                				void* _t708;
                				void* _t709;
                				void* _t710;
                				void* _t712;
                				signed int _t718;
                				unsigned int _t719;
                				unsigned int _t722;
                				unsigned int _t723;
                				signed int _t725;
                				signed int _t726;
                				signed int _t727;
                				signed int _t728;
                				unsigned int _t729;
                				unsigned int _t731;
                				unsigned int _t736;
                				unsigned int _t739;
                				unsigned int _t742;
                				signed int _t745;
                				unsigned int _t746;
                				unsigned int _t749;
                				signed int _t751;
                				unsigned int _t752;
                				signed int _t755;
                				unsigned int _t756;
                				signed int _t758;
                				unsigned int _t759;
                				void* _t769;
                				void* _t804;
                				void* _t816;
                				void* _t890;
                				signed long long _t894;
                				long long _t895;
                				signed long long _t898;
                				signed long long _t899;
                				long long _t902;
                				signed long long _t906;
                				signed long long _t908;
                				signed long long _t911;
                				void* _t914;
                				signed long long _t919;
                				signed long long _t920;
                				signed long long _t921;
                				signed long long _t923;
                				signed long long _t924;
                				signed long long _t925;
                				void* _t926;
                				signed char* _t943;
                				signed char* _t944;
                				signed char* _t945;
                				signed char* _t946;
                				signed char* _t947;
                				signed char* _t948;
                				signed char* _t949;
                				signed char* _t950;
                				signed char* _t951;
                				signed char* _t953;
                				signed char* _t954;
                				signed char* _t955;
                				signed char* _t956;
                				signed char* _t957;
                				signed char* _t958;
                				signed char* _t959;
                				signed char* _t960;
                				void* _t963;
                				void* _t965;
                				signed long long _t967;
                				void* _t968;
                				char* _t975;
                				char* _t976;
                				long long _t977;
                				intOrPtr _t978;
                				intOrPtr _t979;
                				intOrPtr _t980;
                				void* _t981;
                				signed long long _t982;
                				long long _t988;
                
                				_t982 = __r12;
                				_t981 = __r11;
                				_t968 = __r9;
                				_t967 = __r8;
                				if (__ebx - 0x20 >= 0) goto 0x3f05600f;
                				if (__edi == 0) goto 0x3f05615f;
                				_t693 = __edi - 1;
                				_t714 = __ebp + (( *__rsi & 0x000000ff) << __ebx);
                				_t943 =  &(__rsi[1]);
                				if (__ebx + 8 - 0x20 < 0) goto 0x3f055ff1;
                				_t481 = r15d;
                				_t350 = (__ebp + (( *__rsi & 0x000000ff) << __ebx) >> 0x00000008 & 0x0000ff00) + ((__ebp + (( *__rsi & 0x000000ff) << __ebx) & 0x0000ff00) + (_t714 << 0x10) << 8) + (_t714 >> 0x18);
                				 *(__r13 + 0x20) = _t350;
                				 *(__r12 + 0x4c) = _t350;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3e;
                				if ( *((intOrPtr*)(__r13 + 0x14)) == 0) goto 0x3f056e80;
                				r8d = 0;
                				_t351 = E0000000113F057490(0, _t890, _t926, __r8, __r9);
                				r10d =  *(_t965 + 0xb8);
                				 *(__r13 + 0x20) = _t351;
                				 *(__r12 + 0x4c) = _t351;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3f;
                				if (__r14 - 5 - 1 <= 0) goto 0x3f05615f;
                				if ( *(__r13 + 0xc) == 0) goto 0x3f0560a3;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4e;
                				_t527 = _t481 & 0x00000007;
                				_t482 = _t481 - _t527;
                				goto 0x3f055fbc;
                				if (_t482 - 3 >= 0) goto 0x3f0560c6;
                				if (_t693 == 0) goto 0x3f05615f;
                				_t694 = _t693 - 1;
                				_t718 = (r15d >> _t527) + (( *_t943 & 0x000000ff) << _t482);
                				_t944 =  &(_t943[1]);
                				_t483 = _t482 + 8;
                				_t769 = _t483 - 3;
                				if (_t769 < 0) goto 0x3f0560a8;
                				_t719 = _t718 >> 1;
                				 *(__r13 + 0xc) = _t718 & 0x00000001;
                				if (_t769 == 0) goto 0x3f0561fd;
                				if (_t769 == 0) goto 0x3f056121;
                				if (_t769 == 0) goto 0x3f05610e;
                				if ((_t719 & 0x00000003) != 1) goto 0x3f056205;
                				 *(__r12 + 0x20) = "invalid block type";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f44;
                				goto 0x3f055fbc;
                				 *(__r13 + 0x70) = 9;
                				 *((long long*)(__r13 + 0x60)) = 0x3f074040;
                				 *((long long*)(__r13 + 0x68)) = 0x3f074840;
                				 *((intOrPtr*)(__r13 + 0x74)) = 5;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f47;
                				if (r14d != 6) goto 0x3f056205;
                				_t722 = _t719 >> 2 >> 2 >> 2;
                				_t486 = _t483 + 0x2fffffff7;
                				r14d =  *(_t965 + 0xa0);
                				r15d =  *(_t965 + 0xb0);
                				 *((long long*)(__r12 + 0x10)) =  *((intOrPtr*)(_t965 + 0x40));
                				 *(__r12 + 0x18) =  *(_t965 + 0xb8);
                				 *__r12 = _t944;
                				 *((intOrPtr*)(__r12 + 8)) = _t694;
                				 *(__r13 + 0x48) = _t722;
                				 *(__r13 + 0x4c) = _t486;
                				if ( *((intOrPtr*)(__r13 + 0x34)) != 0) goto 0x3f0561ce;
                				if (r14d ==  *(__r12 + 0x18)) goto 0x3f056ef1;
                				_t362 =  *((intOrPtr*)(__r13 + 8));
                				if (_t362 - 0x3f51 >= 0) goto 0x3f056ef1;
                				if (_t362 - 0x3f4e < 0) goto 0x3f0561ce;
                				if ( *((intOrPtr*)(_t965 + 0xa8)) == 4) goto 0x3f056ef1;
                				r8d = r14d;
                				r8d = r8d -  *(__r12 + 0x18);
                				_t363 = E0000000113F057380(0x3f074840, _t914, __r12,  *((intOrPtr*)(__r12 + 0x10)), _t963); // executed
                				if (_t363 == 0) goto 0x3f056ef1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f52;
                				goto 0x3f056fca;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f41;
                				_t723 = _t722 >> 2;
                				_t487 = _t486 + 0xfffffffd;
                				_t530 = _t487 & 0x00000007;
                				_t488 = _t487 - _t530;
                				if (_t488 - 0x20 >= 0) goto 0x3f05623e;
                				if (_t694 == 0) goto 0x3f05615f;
                				_t695 = _t694 - 1;
                				_t725 = (_t723 >> _t530) + (( *_t944 & 0x000000ff) << _t488);
                				_t945 =  &(_t944[1]);
                				if (_t488 + 8 - 0x20 < 0) goto 0x3f056220;
                				_t532 = _t725 & 0x0000ffff;
                				if (_t532 ==  !_t725 >> 0x10) goto 0x3f056265;
                				_t894 = "invalid stored block lengths";
                				 *(__r12 + 0x20) = _t894;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x50) = _t532;
                				_t726 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f42;
                				_t490 = r15d;
                				if (r14d == 6) goto 0x3f05615f;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f43;
                				_t533 =  *(__r13 + 0x50);
                				if (_t533 == 0) goto 0x3f0562eb;
                				r14d = r10d;
                				_t371 =  <=  ? _t533 : _t695;
                				r14d =  <=  ?  <=  ? _t533 : _t695 : r14d;
                				if (r14d == 0) goto 0x3f05615f;
                				r8d = r14d;
                				E0000000113F0593C0( <=  ? _t533 : _t695, _t968, _t945, __r8);
                				r10d =  *(_t965 + 0xb8);
                				_t696 = _t695 - r14d;
                				r10d = r10d - r14d;
                				 *(_t965 + 0xb8) = r10d;
                				_t946 =  &(_t945[_t894]);
                				 *((long long*)(_t965 + 0x40)) =  *((intOrPtr*)(_t965 + 0x40)) + _t894;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) - r14d;
                				goto 0x3f055fc1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f3f;
                				if (_t490 - 0xe >= 0) goto 0x3f05631e;
                				if (_t696 == 0) goto 0x3f05615f;
                				_t697 = _t696 - 1;
                				_t727 = _t726 + (( *_t946 & 0x000000ff) << _t490);
                				_t947 =  &(_t946[1]);
                				_t491 = _t490 + 8;
                				if (_t491 - 0xe < 0) goto 0x3f056300;
                				_t492 = _t491 + 0xfffffff2;
                				_t728 = _t727 >> 5;
                				_t537 = (_t727 & 0x0000001f) + 0x101;
                				_t729 = _t728 >> 5;
                				 *(__r13 + 0x7c) = _t537;
                				_t657 = (_t728 & 0x0000001f) + 1;
                				 *(__r13 + 0x80) = _t657;
                				 *((intOrPtr*)(__r13 + 0x78)) = (_t729 & 0x0000000f) + 4;
                				if (_t537 - 0x11e > 0) goto 0x3f056480;
                				if (_t657 - 0x1e > 0) goto 0x3f056480;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f45;
                				if ( *(__r13 + 0x84) -  *((intOrPtr*)(__r13 + 0x78)) >= 0) goto 0x3f0563e8;
                				if (_t492 - 3 >= 0) goto 0x3f0563ae;
                				if (_t697 == 0) goto 0x3f05615f;
                				_t698 = _t697 - 1;
                				_t731 = (_t729 >> 4) + (( *_t947 & 0x000000ff) << _t492);
                				_t948 =  &(_t947[1]);
                				_t493 = _t492 + 8;
                				if (_t493 - 3 < 0) goto 0x3f056390;
                				_t494 = _t493 + 0xfffffffd;
                				 *(__r13 + 0x90 + _t894 * 2) = _t731 & 7;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				_t384 =  *(__r13 + 0x84);
                				if (_t384 -  *((intOrPtr*)(__r13 + 0x78)) < 0) goto 0x3f056384;
                				if (_t384 - 0x13 >= 0) goto 0x3f05641a;
                				 *(__r13 + 0x90 + _t894 * 2) = r15w;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				if ( *(__r13 + 0x84) - 0x13 < 0) goto 0x3f0563f0;
                				_t919 = __r13 + 0x70;
                				_t895 = __r13 + 0x550;
                				 *_t919 = 7;
                				 *((long long*)(__r13 + 0x60)) = _t895;
                				 *((long long*)(__r13 + 0x88)) = _t895;
                				 *((long long*)(_t965 + 0x28)) = __r13 + 0x310;
                				 *(_t965 + 0x20) = _t919;
                				_t87 = _t919 + 0x13; // 0x13
                				r8d = _t87;
                				_t387 = E0000000113F057AC0(0, __r13 + 0x90, _t963, __r13 + 0x88, __r12);
                				 *(_t965 + 0xb0) = _t387;
                				if (_t387 == 0) goto 0x3f056499;
                				 *(_t982 + 0x20) = "invalid code lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t898 = "too many length or distance symbols";
                				 *(_t982 + 0x20) = _t898;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fc1;
                				 *(__r13 + 0x84) = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f46;
                				r10d =  *(__r13 + 0x7c);
                				if ( *(__r13 + 0x84) -  *(__r13 + 0x80) + r10d >= 0) goto 0x3f0566c2;
                				r9d = 1;
                				_t978 =  *((intOrPtr*)(__r13 + 0x60));
                				r9d = r9d <<  *(__r13 + 0x70);
                				r9d = r9d - 1;
                				_t920 = _t919 & _t898;
                				_t389 =  *(_t978 + _t920 * 4);
                				r8d = _t389;
                				r8d = r8d >> 0x10;
                				 *(_t965 + 0x34) = _t389;
                				if ((_t389 >> 0x00000008 & 0x000000ff) - _t494 <= 0) goto 0x3f056543;
                				if (_t698 == 0) goto 0x3f05615f;
                				_t699 = _t698 - 1;
                				_t949 =  &(_t948[1]);
                				_t495 = _t494 + 8;
                				_t899 = _t898 & _t920;
                				_t393 =  *(_t978 + _t899 * 4);
                				_t662 = _t393 >> 8;
                				r8d = _t393;
                				r8d = r8d >> 0x10;
                				 *(_t965 + 0x34) = _t393;
                				if ((_t662 & 0x000000ff) - _t495 > 0) goto 0x3f056507;
                				_t804 = r8w - 0x10;
                				if (_t804 >= 0) goto 0x3f05657a;
                				_t496 = _t495 - (_t662 & 0x000000ff);
                				 *((short*)(__r13 + 0x90 + _t920 * 2)) = _t393 >> 0x10;
                				 *(__r13 + 0x84) =  *(__r13 + 0x84) + 1;
                				r8d =  *(__r13 + 0x84);
                				goto 0x3f0566a7;
                				if (_t804 != 0) goto 0x3f0565d9;
                				_t664 = (_t662 & 0x000000ff) + 2;
                				if (_t496 - _t664 >= 0) goto 0x3f0565a3;
                				if (_t699 == 0) goto 0x3f05615f;
                				_t700 = _t699 - 1;
                				_t950 =  &(_t949[1]);
                				_t497 = _t496 + 8;
                				if (_t497 - _t664 < 0) goto 0x3f056586;
                				_t554 =  *(_t965 + 0x35) & 0x000000ff;
                				_t736 = ((_t731 >> 3) + (( *_t948 & 0x000000ff) << _t494) >> (_t662 & 0x000000ff)) + (( *_t949 & 0x000000ff) << _t496) >> _t554;
                				if ( *(__r13 + 0x84) == 0) goto 0x3f0566f2;
                				_t499 = _t497 - _t554 + 0xfffffffe;
                				r9d =  *(__r13 + 0x90 + _t899 * 2) & 0x0000ffff;
                				goto 0x3f056663;
                				if (r8w != 0x11) goto 0x3f056620;
                				_t668 = (_t736 & 0x00000003) + 6;
                				if (_t499 - _t668 >= 0) goto 0x3f056604;
                				if (_t700 == 0) goto 0x3f05615f;
                				_t701 = _t700 - 1;
                				_t951 =  &(_t950[1]);
                				_t500 = _t499 + 8;
                				if (_t500 - _t668 < 0) goto 0x3f0565e7;
                				_t739 = (_t736 >> 2) + (( *_t950 & 0x000000ff) << _t499) >> ( *(_t965 + 0x35) & 0x000000ff);
                				r9d = r15d;
                				goto 0x3f05665f;
                				_t672 = (_t739 & 0x00000007) + 0xa;
                				if (_t500 - _t672 >= 0) goto 0x3f056644;
                				if (_t701 == 0) goto 0x3f05615f;
                				_t702 = _t701 - 1;
                				_t501 = _t500 + 8;
                				if (_t501 - _t672 < 0) goto 0x3f056627;
                				_t558 =  *(_t965 + 0x35) & 0x000000ff;
                				_t742 = (_t739 >> 3) + (( *_t951 & 0x000000ff) << _t500) >> _t558;
                				r9d = r15w & 0xffffffff;
                				_t816 =  *(__r13 + 0x84) + (_t742 & 0x0000007f) + 0xb -  *(__r13 + 0x80) +  *(__r13 + 0x7c);
                				if (_t816 > 0) goto 0x3f0566f2;
                				 *(__r13 + 0x90 + _t899 * 2) = r9w;
                				r8d =  *(__r13 + 0x84);
                				r8d = __r8 + 1;
                				 *(__r13 + 0x84) = r8d;
                				if (_t816 != 0) goto 0x3f056680;
                				r10d =  *(__r13 + 0x7c);
                				if (r8d -  *(__r13 + 0x80) + r10d < 0) goto 0x3f0564d0;
                				if ( *((intOrPtr*)(__r13 + 8)) == 0x3f51) goto 0x3f055fb4;
                				if ( *((short*)(__r13 + 0x290)) != 0) goto 0x3f05670b;
                				 *(_t982 + 0x20) = "invalid code -- missing end-of-block";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *(_t982 + 0x20) = "invalid bit length repeat";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t902 = __r13 + 0x550;
                				 *(__r13 + 0x70) = 9;
                				 *((long long*)(__r13 + 0x88)) = _t902;
                				_t988 = __r13 + 0x310;
                				 *((long long*)(__r13 + 0x60)) = _t902;
                				 *((long long*)(_t965 + 0x28)) = _t988;
                				 *(_t965 + 0x20) = __r13 + 0x70;
                				r8d = r10d;
                				_t409 = E0000000113F057AC0(1, __r13 + 0x90, _t963, __r13 + 0x88, _t982);
                				 *(_t965 + 0xb0) = _t409;
                				if (_t409 == 0) goto 0x3f056779;
                				 *(_t982 + 0x20) = "invalid literal/lengths set";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				_t905 =  *((intOrPtr*)(__r13 + 0x88));
                				_t921 = __r13 + 0x74;
                				r8d =  *(__r13 + 0x80);
                				 *((long long*)(__r13 + 0x68)) =  *((intOrPtr*)(__r13 + 0x88));
                				 *_t921 = 6;
                				 *((long long*)(_t965 + 0x28)) = _t988;
                				 *(_t965 + 0x20) = _t921;
                				_t411 = E0000000113F057AC0(2, 0x90 + _t905 * 2 + __r13, _t963, __r13 + 0x88, _t982);
                				 *(_t965 + 0xb0) = _t411;
                				r15d = _t411;
                				if (_t411 == 0) goto 0x3f0567e6;
                				_t906 = "invalid distances set";
                				 *(_t982 + 0x20) = _t906;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f47;
                				if ( *((intOrPtr*)(_t965 + 0xa8)) == 6) goto 0x3f056ee4;
                				r8d =  *(_t965 + 0xa0);
                				r15d = 0;
                				r10d =  *(_t965 + 0xb8);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (_t702 - 6 < 0) goto 0x3f056898;
                				if (r10d - 0x102 < 0) goto 0x3f056898;
                				 *((long long*)(_t982 + 0x10)) =  *((intOrPtr*)(_t965 + 0x40));
                				_t923 = _t982;
                				 *(_t982 + 0x18) = r10d;
                				 *_t982 =  &(_t951[1]);
                				 *((intOrPtr*)(_t982 + 8)) = _t702;
                				 *(__r13 + 0x48) = _t742 >> 7;
                				 *(__r13 + 0x4c) = _t501 + 0xfffffff9 - _t558;
                				E0000000113F058080(r8d, _t712, _t906, _t923, _t978, _t981);
                				r10d =  *(_t982 + 0x18);
                				_t953 =  *_t982;
                				_t703 =  *((intOrPtr*)(_t982 + 8));
                				_t503 =  *(__r13 + 0x4c);
                				 *((long long*)(_t965 + 0x40)) =  *((intOrPtr*)(_t982 + 0x10));
                				 *(_t965 + 0xb8) = r10d;
                				if ( *((intOrPtr*)(__r13 + 8)) != 0x3f3f) goto 0x3f055fc1;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fc1;
                				_t979 =  *((intOrPtr*)(__r13 + 0x60));
                				_t924 = _t923 & _t906;
                				 *(__r13 + 0x1be4) = r15d;
                				if (( *(_t979 + _t924 * 4) >> 0x00000008 & 0x000000ff) - _t503 <= 0) goto 0x3f0568f7;
                				if (_t703 == 0) goto 0x3f05615f;
                				_t704 = _t703 - 1;
                				_t745 =  *(__r13 + 0x48) + (( *_t953 & 0x000000ff) << _t503);
                				_t954 =  &(_t953[1]);
                				_t504 = _t503 + 8;
                				_t418 =  *(_t979 + (_t906 & _t924) * 4);
                				if ((_t418 >> 0x00000008 & 0x000000ff) - _t504 > 0) goto 0x3f0568c7;
                				if (_t418 == 0) goto 0x3f0569b3;
                				if ((_t418 & 0x000000f0) != 0) goto 0x3f0569b3;
                				 *(_t965 + 0x34) = _t418;
                				r14d =  *(_t965 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t418 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t418 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t745;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t418 >> 0x10);
                				r8d =  *(_t979 + _t967 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t504 <= 0) goto 0x3f0569a4;
                				r11d =  *(_t965 + 0x36) & 0x0000ffff;
                				if (_t704 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t746 = _t745 + (( *_t954 & 0x000000ff) << _t504);
                				_t705 = _t704 - 1;
                				r8d = r8d << (_t418 & 0x000000ff) + r14d;
                				_t955 =  &(_t954[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t746;
                				_t505 = _t504 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t423 =  *(_t979 + _t967 * 4);
                				r8d = _t423 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t505 > 0) goto 0x3f056958;
                				_t588 = r14d;
                				 *(__r13 + 0x1be4) = _t588;
                				_t591 = _t423 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t591;
                				_t507 = _t505 - r14d - _t591;
                				 *(__r13 + 0x50) = _t423 >> 0x10;
                				if (_t423 != 0) goto 0x3f0569e0;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4d;
                				goto 0x3f055fb4;
                				if ((_t423 & 0x00000020) == 0) goto 0x3f0569f4;
                				 *(__r13 + 0x1be4) = 0xffffffff;
                				goto 0x3f055fac;
                				if ((_t423 & 0x00000040) == 0) goto 0x3f056a11;
                				_t908 = "invalid literal/length code";
                				 *(_t982 + 0x20) = _t908;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fb4;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f49;
                				 *(__r13 + 0x58) = _t423 & 0xf;
                				_t684 =  *(__r13 + 0x58);
                				if (_t684 == 0) goto 0x3f056a69;
                				if (_t507 - _t684 >= 0) goto 0x3f056a4d;
                				if (_t705 == 0) goto 0x3f05615f;
                				_t706 = _t705 - 1;
                				_t749 = (_t746 >> _t588 >> _t591) + (( *_t955 & 0x000000ff) << _t507);
                				_t956 =  &(_t955[1]);
                				_t508 = _t507 + 8;
                				if (_t508 - _t684 < 0) goto 0x3f056a30;
                				_t597 = _t684;
                				_t509 = _t508 - _t684;
                				 *(__r13 + 0x50) =  *(__r13 + 0x50) + ((0x00000001 << _t597) - 0x00000001 & _t749);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t684;
                				 *(__r13 + 0x1be8) =  *(__r13 + 0x50);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4a;
                				_t980 =  *((intOrPtr*)(__r13 + 0x68));
                				_t925 = _t924 & _t908;
                				if (( *(_t980 + _t925 * 4) >> 0x00000008 & 0x000000ff) - _t509 <= 0) goto 0x3f056ad4;
                				if (_t706 == 0) goto 0x3f05615f;
                				_t707 = _t706 - 1;
                				_t751 = (_t749 >> _t597) + (( *_t956 & 0x000000ff) << _t509);
                				_t957 =  &(_t956[1]);
                				_t510 = _t509 + 8;
                				_t436 =  *(_t980 + (_t908 & _t925) * 4);
                				if ((_t436 >> 0x00000008 & 0x000000ff) - _t510 > 0) goto 0x3f056aa4;
                				if ((_t436 & 0x000000f0) != 0) goto 0x3f056b8b;
                				 *(_t965 + 0x34) = _t436;
                				r14d =  *(_t965 + 0x35) & 0x000000ff;
                				r8d = 1;
                				r9d = _t436 >> 0x00000008 & 0x000000ff;
                				r8d = r8d << (_t436 & 0x000000ff) + r9d;
                				r8d = r8d - 1;
                				r8d = r8d & _t751;
                				r8d = r8d >> r9d;
                				r8d = r8d + (_t436 >> 0x10);
                				r8d =  *(_t980 + _t967 * 4) >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r9d;
                				if (r8d - _t510 <= 0) goto 0x3f056b7c;
                				r11d =  *(_t965 + 0x36) & 0x0000ffff;
                				if (_t707 == 0) goto 0x3f05615f;
                				r8d = 1;
                				_t752 = _t751 + (( *_t957 & 0x000000ff) << _t510);
                				_t708 = _t707 - 1;
                				r8d = r8d << (_t436 & 0x000000ff) + r14d;
                				_t958 =  &(_t957[1]);
                				r8d = r8d - 1;
                				r8d = r8d & _t752;
                				_t511 = _t510 + 8;
                				r8d = r8d >> r14d;
                				r8d = r8d + r11d;
                				_t441 =  *(_t980 + _t967 * 4);
                				r8d = _t441 >> 0x00000008 & 0x000000ff;
                				r8d = r8d + r14d;
                				if (r8d - _t511 > 0) goto 0x3f056b30;
                				_t621 = r14d;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t621;
                				r10d =  *(_t965 + 0xb8);
                				_t624 = _t441 >> 0x00000008 & 0x000000ff;
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t624;
                				_t513 = _t511 - r14d - _t624;
                				if ((_t441 & 0x00000040) == 0) goto 0x3f056bc3;
                				 *(_t982 + 0x20) = "invalid distance code";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				r8d =  *(_t965 + 0xa0);
                				 *(__r13 + 0x54) = _t441 >> 0x10;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4b;
                				 *(__r13 + 0x58) = _t441 & 0xf;
                				_t689 =  *(__r13 + 0x58);
                				if (_t689 == 0) goto 0x3f056c2b;
                				if (_t513 - _t689 >= 0) goto 0x3f056c0f;
                				if (_t708 == 0) goto 0x3f05615f;
                				_t709 = _t708 - 1;
                				_t755 = (_t752 >> _t621 >> _t624) + (( *_t958 & 0x000000ff) << _t513);
                				_t959 =  &(_t958[1]);
                				_t514 = _t513 + 8;
                				if (_t514 - _t689 < 0) goto 0x3f056bf2;
                				_t630 = _t689;
                				_t515 = _t514 - _t689;
                				_t756 = _t755 >> _t630;
                				 *(__r13 + 0x54) =  *(__r13 + 0x54) + ((0x00000001 << _t630) - 0x00000001 & _t755);
                				 *(__r13 + 0x1be4) =  *(__r13 + 0x1be4) + _t689;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4c;
                				if (r10d == 0) goto 0x3f05615f;
                				_t448 =  *(__r13 + 0x54);
                				_t632 = r8d - r10d;
                				if (_t448 - _t632 <= 0) goto 0x3f056c9b;
                				_t449 = _t448 - _t632;
                				if (_t449 -  *((intOrPtr*)(__r13 + 0x38)) <= 0) goto 0x3f056c75;
                				if ( *((intOrPtr*)(__r13 + 0x1be0)) == 0) goto 0x3f056c75;
                				_t911 = "invalid distance too far back";
                				 *(_t982 + 0x20) = _t911;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t633 =  *((intOrPtr*)(__r13 + 0x3c));
                				if (_t449 - _t633 <= 0) goto 0x3f056c83;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				r9d =  <=  ? _t449 - _t633 : r9d;
                				goto 0x3f056caa;
                				r8d =  *(__r13 + 0x50);
                				r9d = r8d;
                				_t637 =  <=  ? r9d : r10d;
                				_t975 =  *((intOrPtr*)(_t965 + 0x40));
                				r10d = r10d - _t637;
                				r8d = r8d - _t637;
                				 *(_t965 + 0xb8) = r10d;
                				 *(__r13 + 0x50) = r8d;
                				 *_t975 =  *( *((intOrPtr*)(_t965 + 0x40)) - _t911 - _t975 + _t975) & 0x000000ff;
                				_t976 = _t975 + 1;
                				if (r9d != r10d) goto 0x3f056cd0;
                				 *((long long*)(_t965 + 0x40)) = _t976;
                				if ( *(__r13 + 0x50) != _t637 + 0xffffffff) goto 0x3f055fc1;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				if (r10d == 0) goto 0x3f05615f;
                				 *_t976 =  *(__r13 + 0x50) & 0x000000ff;
                				_t977 = _t976 + 1;
                				r10d = r10d - 1;
                				 *((long long*)(_t965 + 0x40)) = _t977;
                				 *(_t965 + 0xb8) = r10d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f48;
                				goto 0x3f055fc1;
                				if ( *((intOrPtr*)(_t963 + 0x10)) == 0) goto 0x3f056e16;
                				if (_t515 - 0x20 >= 0) goto 0x3f056d5e;
                				if (_t709 == 0) goto 0x3f05615f;
                				_t710 = _t709 - 1;
                				_t757 = _t756 + (( *_t959 & 0x000000ff) << _t515);
                				_t960 =  &(_t959[1]);
                				if (_t515 + 8 - 0x20 < 0) goto 0x3f056d40;
                				r8d = r8d - r10d;
                				 *((intOrPtr*)(_t982 + 0x1c)) =  *((intOrPtr*)(_t982 + 0x1c)) + r8d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r8d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056dac;
                				if (r8d == 0) goto 0x3f056dac;
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056d92;
                				E0000000113F057780(_t977 - _t911);
                				goto 0x3f056d97;
                				_t458 = E0000000113F057490( *(__r13 + 0x20), _t911, _t977 - _t911, _t967, _t977);
                				r10d =  *(_t965 + 0xb8);
                				 *(__r13 + 0x20) = _t458;
                				 *(_t982 + 0x4c) = _t458;
                				 *(_t965 + 0xa0) = r10d;
                				r14d = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056e06;
                				if ( *((intOrPtr*)(__r13 + 0x18)) != 0) goto 0x3f056de7;
                				if (((_t756 + (( *_t959 & 0x000000ff) << _t515) & 0x0000ff00) + (_t756 + (( *_t959 & 0x000000ff) << _t515) << 0x10) << 8) + (_t757 >> 0x00000008 & 0x0000ff00) + (_t757 >> 0x18) ==  *(__r13 + 0x20)) goto 0x3f056e06;
                				 *(_t982 + 0x20) = "incorrect data check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				_t758 = r15d;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				_t517 = r15d;
                				goto 0x3f056e30;
                				r14d =  *(_t965 + 0xa0);
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f4f;
                				r14d =  *(_t965 + 0xa0);
                				if ( *(__r13 + 0x10) == 0) goto 0x3f056eab;
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056eab;
                				if (_t517 - 0x20 >= 0) goto 0x3f056e61;
                				if (_t710 == 0) goto 0x3f056167;
                				_t759 = _t758 + (( *_t960 & 0x000000ff) << _t517);
                				_t518 = _t517 + 8;
                				if (_t518 - 0x20 < 0) goto 0x3f056e43;
                				if (_t759 ==  *((intOrPtr*)(__r13 + 0x24))) goto 0x3f056ea5;
                				_t913 = "incorrect length check";
                				 *(_t982 + 0x20) = "incorrect length check";
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f51;
                				goto 0x3f055fbc;
                				 *((long long*)(_t982 + 0x10)) = _t977;
                				 *(_t982 + 0x18) = r10d;
                				 *_t982 =  &(_t960[1]);
                				 *((intOrPtr*)(_t982 + 8)) = _t710 - 1;
                				 *(__r13 + 0x48) = _t759;
                				 *(__r13 + 0x4c) = _t518;
                				goto 0x3f056fca;
                				 *((intOrPtr*)(__r13 + 8)) = 0x3f50;
                				r15d = 1;
                				r14d =  *(_t965 + 0xa0);
                				r15d = 1;
                				r14d =  *(_t965 + 0xa0);
                				r15d = 0xfffffffd;
                				goto 0x3f05616f;
                				r14d =  *(_t965 + 0xa0);
                				goto 0x3f056176;
                				r14d = r14d -  *(_t982 + 0x18);
                				r10d =  *(_t965 + 0x38);
                				r10d = r10d -  *((intOrPtr*)(_t982 + 8));
                				 *((intOrPtr*)(_t982 + 0xc)) =  *((intOrPtr*)(_t982 + 0xc)) + r10d;
                				 *((intOrPtr*)(_t982 + 0x1c)) =  *((intOrPtr*)(_t982 + 0x1c)) + r14d;
                				 *((intOrPtr*)(__r13 + 0x24)) =  *((intOrPtr*)(__r13 + 0x24)) + r14d;
                				 *(_t965 + 0x38) = r10d;
                				if (( *(__r13 + 0x10) & 0x00000004) == 0) goto 0x3f056f52;
                				if (r14d == 0) goto 0x3f056f52;
                				r8d = r14d;
                				_t648 =  *(__r13 + 0x20);
                				if ( *((intOrPtr*)(__r13 + 0x18)) == 0) goto 0x3f056f3f;
                				E0000000113F057780( *((intOrPtr*)(_t982 + 0x10)) - _t913);
                				goto 0x3f056f44;
                				_t472 = E0000000113F057490(_t648, _t913,  *((intOrPtr*)(_t982 + 0x10)) - _t913, _t967, _t977);
                				r10d =  *(_t965 + 0x38);
                				 *(__r13 + 0x20) = _t472;
                				 *(_t982 + 0x4c) = _t472;
                				_t691 =  *((intOrPtr*)(__r13 + 8));
                				if (_t691 == 0x3f47) goto 0x3f056f6e;
                				if (_t691 == 0x3f42) goto 0x3f056f6e;
                				r9d = 0;
                				r8d = r9d;
                				goto 0x3f056f77;
                				r8d = 0x100;
                				r9d = 0;
                				asm("sbb ecx, ecx");
                				r9d =  ==  ? 0x80 : r9d;
                				 *((intOrPtr*)(_t982 + 0x48)) = (_t648 & 0x00000040) + r9d +  *(__r13 + 0x4c) + r8d;
                				if (r10d != 0) goto 0x3f056faa;
                				if (r14d == 0) goto 0x3f056fb4;
                				if ( *((intOrPtr*)(_t965 + 0xa8)) != 4) goto 0x3f056fc0;
                				r15d =  ==  ? 0xfffffffb : r15d;
                				goto 0x3f056fca;
                				return 0xfffffffe;
                			}







































































































































































                0x13f055fec
                0x13f055fec
                0x13f055fec
                0x13f055fec
                0x13f055fef
                0x13f055ff3
                0x13f056000
                0x13f056002
                0x13f056004
                0x13f05600d
                0x13f05601e
                0x13f056033
                0x13f056038
                0x13f05603c
                0x13f056041
                0x13f05604e
                0x13f056054
                0x13f05605b
                0x13f056060
                0x13f056068
                0x13f05606c
                0x13f056071
                0x13f056080
                0x13f05608b
                0x13f05608f
                0x13f056097
                0x13f05609c
                0x13f05609e
                0x13f0560a6
                0x13f0560aa
                0x13f0560b7
                0x13f0560b9
                0x13f0560bb
                0x13f0560be
                0x13f0560c1
                0x13f0560c4
                0x13f0560c8
                0x13f0560cd
                0x13f0560d6
                0x13f0560df
                0x13f0560e4
                0x13f0560e9
                0x13f0560f9
                0x13f056101
                0x13f056109
                0x13f056114
                0x13f05611c
                0x13f056121
                0x13f056130
                0x13f05613b
                0x13f05613f
                0x13f056147
                0x13f056153
                0x13f056159
                0x13f05615c
                0x13f05615f
                0x13f056167
                0x13f056182
                0x13f056187
                0x13f05618c
                0x13f056190
                0x13f05619a
                0x13f05619e
                0x13f0561a2
                0x13f0561a9
                0x13f0561af
                0x13f0561b8
                0x13f0561c3
                0x13f0561c8
                0x13f0561d3
                0x13f0561d6
                0x13f0561de
                0x13f0561e5
                0x13f0561eb
                0x13f0561f8
                0x13f0561fd
                0x13f056205
                0x13f056208
                0x13f056212
                0x13f056217
                0x13f05621c
                0x13f056222
                0x13f05622f
                0x13f056231
                0x13f056233
                0x13f05623c
                0x13f056240
                0x13f05624a
                0x13f05624c
                0x13f056253
                0x13f056258
                0x13f056260
                0x13f056265
                0x13f056269
                0x13f05626c
                0x13f056274
                0x13f05627b
                0x13f056281
                0x13f056289
                0x13f05628f
                0x13f056295
                0x13f056298
                0x13f05629e
                0x13f0562a5
                0x13f0562ab
                0x13f0562b4
                0x13f0562b9
                0x13f0562c1
                0x13f0562c9
                0x13f0562d2
                0x13f0562da
                0x13f0562dd
                0x13f0562e2
                0x13f0562e6
                0x13f0562eb
                0x13f0562fb
                0x13f056302
                0x13f05630f
                0x13f056311
                0x13f056313
                0x13f056316
                0x13f05631c
                0x13f056320
                0x13f056323
                0x13f05632b
                0x13f056331
                0x13f056339
                0x13f056346
                0x13f056348
                0x13f05634f
                0x13f056359
                0x13f056362
                0x13f056368
                0x13f05636f
                0x13f056382
                0x13f056387
                0x13f056392
                0x13f05639f
                0x13f0563a1
                0x13f0563a3
                0x13f0563a6
                0x13f0563ac
                0x13f0563bf
                0x13f0563cb
                0x13f0563d4
                0x13f0563db
                0x13f0563e6
                0x13f0563eb
                0x13f056400
                0x13f056409
                0x13f056418
                0x13f05641a
                0x13f05641e
                0x13f056425
                0x13f056432
                0x13f056436
                0x13f056447
                0x13f05644c
                0x13f056453
                0x13f056453
                0x13f056457
                0x13f05645c
                0x13f056465
                0x13f05646e
                0x13f056473
                0x13f05647b
                0x13f056480
                0x13f056487
                0x13f05648c
                0x13f056494
                0x13f056499
                0x13f0564a5
                0x13f0564b4
                0x13f0564c2
                0x13f0564d4
                0x13f0564da
                0x13f0564de
                0x13f0564e1
                0x13f0564e9
                0x13f0564ec
                0x13f0564f5
                0x13f0564fb
                0x13f0564ff
                0x13f056505
                0x13f056509
                0x13f056516
                0x13f05651a
                0x13f05651f
                0x13f056525
                0x13f056528
                0x13f05652e
                0x13f056531
                0x13f056537
                0x13f05653b
                0x13f056541
                0x13f056543
                0x13f056548
                0x13f056555
                0x13f05655e
                0x13f056567
                0x13f05656e
                0x13f056575
                0x13f05657d
                0x13f05657f
                0x13f056584
                0x13f056588
                0x13f056595
                0x13f056599
                0x13f05659c
                0x13f0565a1
                0x13f0565a3
                0x13f0565b1
                0x13f0565b5
                0x13f0565bd
                0x13f0565cb
                0x13f0565d4
                0x13f0565de
                0x13f0565e0
                0x13f0565e5
                0x13f0565e9
                0x13f0565f6
                0x13f0565fa
                0x13f0565fd
                0x13f056602
                0x13f05660e
                0x13f056610
                0x13f05661e
                0x13f056620
                0x13f056625
                0x13f056629
                0x13f056636
                0x13f05663d
                0x13f056642
                0x13f056644
                0x13f05664e
                0x13f056650
                0x13f056677
                0x13f056679
                0x13f056687
                0x13f056690
                0x13f056697
                0x13f05669b
                0x13f0566a5
                0x13f0566ae
                0x13f0566b8
                0x13f0566c8
                0x13f0566d7
                0x13f0566e0
                0x13f0566e5
                0x13f0566ed
                0x13f0566f9
                0x13f0566fe
                0x13f056706
                0x13f05670b
                0x13f056712
                0x13f05671a
                0x13f056721
                0x13f056728
                0x13f056737
                0x13f056743
                0x13f056748
                0x13f056750
                0x13f056755
                0x13f05675e
                0x13f056767
                0x13f05676c
                0x13f056774
                0x13f056779
                0x13f056780
                0x13f056784
                0x13f056792
                0x13f05679a
                0x13f0567a0
                0x13f0567a5
                0x13f0567ba
                0x13f0567bf
                0x13f0567c6
                0x13f0567cb
                0x13f0567cd
                0x13f0567d4
                0x13f0567d9
                0x13f0567e1
                0x13f0567ed
                0x13f0567f8
                0x13f0567fe
                0x13f056806
                0x13f056809
                0x13f056811
                0x13f05681c
                0x13f056825
                0x13f05682f
                0x13f056834
                0x13f056837
                0x13f05683c
                0x13f056840
                0x13f056845
                0x13f056849
                0x13f05684d
                0x13f05685f
                0x13f056864
                0x13f056868
                0x13f056871
                0x13f056875
                0x13f05687a
                0x13f056882
                0x13f056888
                0x13f056893
                0x13f0568a1
                0x13f0568ad
                0x13f0568b0
                0x13f0568c5
                0x13f0568c9
                0x13f0568d6
                0x13f0568d8
                0x13f0568da
                0x13f0568df
                0x13f0568e7
                0x13f0568f5
                0x13f0568f9
                0x13f056901
                0x13f056909
                0x13f05690d
                0x13f056913
                0x13f05691e
                0x13f05692b
                0x13f056931
                0x13f056934
                0x13f056937
                0x13f05693a
                0x13f056946
                0x13f05694a
                0x13f056950
                0x13f056952
                0x13f05695a
                0x13f056967
                0x13f05696d
                0x13f056975
                0x13f056977
                0x13f05697a
                0x13f05697d
                0x13f056983
                0x13f056986
                0x13f056989
                0x13f05698c
                0x13f05698f
                0x13f056998
                0x13f05699c
                0x13f0569a2
                0x13f0569a4
                0x13f0569ac
                0x13f0569b8
                0x13f0569bb
                0x13f0569c2
                0x13f0569cb
                0x13f0569d1
                0x13f0569d3
                0x13f0569db
                0x13f0569e2
                0x13f0569e4
                0x13f0569ef
                0x13f0569f6
                0x13f0569f8
                0x13f0569ff
                0x13f056a04
                0x13f056a0c
                0x13f056a17
                0x13f056a1f
                0x13f056a23
                0x13f056a29
                0x13f056a2d
                0x13f056a32
                0x13f056a3f
                0x13f056a41
                0x13f056a43
                0x13f056a46
                0x13f056a4b
                0x13f056a4d
                0x13f056a56
                0x13f056a5e
                0x13f056a62
                0x13f056a6d
                0x13f056a74
                0x13f056a85
                0x13f056a91
                0x13f056aa2
                0x13f056aa6
                0x13f056ab3
                0x13f056ab5
                0x13f056ab7
                0x13f056abc
                0x13f056ac4
                0x13f056ad2
                0x13f056ad6
                0x13f056ade
                0x13f056ae2
                0x13f056ae8
                0x13f056af3
                0x13f056b00
                0x13f056b06
                0x13f056b09
                0x13f056b0c
                0x13f056b0f
                0x13f056b1b
                0x13f056b1f
                0x13f056b25
                0x13f056b27
                0x13f056b32
                0x13f056b3f
                0x13f056b45
                0x13f056b4d
                0x13f056b4f
                0x13f056b52
                0x13f056b55
                0x13f056b5b
                0x13f056b5e
                0x13f056b61
                0x13f056b64
                0x13f056b67
                0x13f056b70
                0x13f056b74
                0x13f056b7a
                0x13f056b7c
                0x13f056b84
                0x13f056b8b
                0x13f056b98
                0x13f056b9b
                0x13f056ba2
                0x13f056ba8
                0x13f056bb1
                0x13f056bb6
                0x13f056bbe
                0x13f056bc3
                0x13f056bd0
                0x13f056bda
                0x13f056be2
                0x13f056be6
                0x13f056bec
                0x13f056bf0
                0x13f056bf4
                0x13f056c01
                0x13f056c03
                0x13f056c05
                0x13f056c08
                0x13f056c0d
                0x13f056c0f
                0x13f056c18
                0x13f056c1e
                0x13f056c20
                0x13f056c24
                0x13f056c2b
                0x13f056c36
                0x13f056c3c
                0x13f056c43
                0x13f056c48
                0x13f056c4a
                0x13f056c50
                0x13f056c5a
                0x13f056c5c
                0x13f056c63
                0x13f056c68
                0x13f056c70
                0x13f056c75
                0x13f056c7b
                0x13f056c83
                0x13f056c8b
                0x13f056c95
                0x13f056c99
                0x13f056ca0
                0x13f056ca7
                0x13f056cb0
                0x13f056cb4
                0x13f056cb9
                0x13f056cbc
                0x13f056cbf
                0x13f056cca
                0x13f056cd5
                0x13f056cd8
                0x13f056cde
                0x13f056ce0
                0x13f056ce9
                0x13f056cef
                0x13f056cff
                0x13f056d0a
                0x13f056d0d
                0x13f056d10
                0x13f056d13
                0x13f056d18
                0x13f056d20
                0x13f056d28
                0x13f056d32
                0x13f056d3b
                0x13f056d42
                0x13f056d4f
                0x13f056d51
                0x13f056d53
                0x13f056d5c
                0x13f056d5e
                0x13f056d61
                0x13f056d66
                0x13f056d70
                0x13f056d75
                0x13f056d89
                0x13f056d8b
                0x13f056d90
                0x13f056d92
                0x13f056d97
                0x13f056d9f
                0x13f056da3
                0x13f056dac
                0x13f056db4
                0x13f056db9
                0x13f056dc2
                0x13f056deb
                0x13f056df4
                0x13f056df9
                0x13f056e01
                0x13f056e06
                0x13f056e09
                0x13f056e11
                0x13f056e14
                0x13f056e16
                0x13f056e1e
                0x13f056e28
                0x13f056e35
                0x13f056e3c
                0x13f056e41
                0x13f056e45
                0x13f056e54
                0x13f056e59
                0x13f056e5f
                0x13f056e65
                0x13f056e67
                0x13f056e6e
                0x13f056e73
                0x13f056e7b
                0x13f056e80
                0x13f056e8a
                0x13f056e8f
                0x13f056e93
                0x13f056e98
                0x13f056e9c
                0x13f056ea0
                0x13f056eab
                0x13f056eb3
                0x13f056ebe
                0x13f056ec6
                0x13f056ed1
                0x13f056ed9
                0x13f056edf
                0x13f056ee4
                0x13f056eec
                0x13f056ef1
                0x13f056ef6
                0x13f056efb
                0x13f056f00
                0x13f056f05
                0x13f056f0a
                0x13f056f13
                0x13f056f18
                0x13f056f1d
                0x13f056f24
                0x13f056f27
                0x13f056f36
                0x13f056f38
                0x13f056f3d
                0x13f056f3f
                0x13f056f44
                0x13f056f49
                0x13f056f4d
                0x13f056f52
                0x13f056f5c
                0x13f056f64
                0x13f056f66
                0x13f056f69
                0x13f056f6c
                0x13f056f6e
                0x13f056f74
                0x13f056f82
                0x13f056f8d
                0x13f056f9b
                0x13f056fa3
                0x13f056fa8
                0x13f056fb2
                0x13f056fbc
                0x13f056fc3
                0x13f056fda

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: $ $invalid block type
                • API String ID: 0-2056396358
                • Opcode ID: 23e5ca7d8acd9a80ccc5350b13e9247b855179e933cacfbddf6429b7ca81d52b
                • Instruction ID: 7faf0ad4958c7db29b71f84a04bd7093c16c02a61c8854f1c089d78784442d3e
                • Opcode Fuzzy Hash: 23e5ca7d8acd9a80ccc5350b13e9247b855179e933cacfbddf6429b7ca81d52b
                • Instruction Fuzzy Hash: A661B573A04799CBE7688F1DD88C7AE7AAEF740354F15413DE65882792DBB4CA46CB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 69%
                			E0000000113F05876C(intOrPtr* __rax, long long __rbx, void* __r8, long long _a8) {
                				char _v24;
                				void* _t9;
                				void* _t10;
                				void* _t11;
                				signed short _t21;
                				void* _t23;
                				void* _t27;
                				intOrPtr _t37;
                				intOrPtr* _t56;
                				long long _t57;
                				void* _t70;
                				void* _t72;
                				void* _t73;
                				void* _t81;
                
                				_t58 = __rbx;
                				_t56 = __rax;
                				E0000000113F0590F8(); // executed
                				SetUnhandledExceptionFilter(??);
                				goto 0x3f06225c;
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				_a8 = __rbx;
                				_t9 = E0000000113F058BE8(1); // executed
                				if (_t9 == 0) goto 0x3f0588d4;
                				dil = 0;
                				_v24 = dil;
                				_t10 = E0000000113F058BAC();
                				_t37 =  *0x3f0912a0; // 0x2
                				if (_t37 == 1) goto 0x3f0588df;
                				if (_t37 != 0) goto 0x3f058810;
                				 *0x3f0912a0 = 1;
                				_t11 = E0000000113F061E14(__rbx, 0x3f072380, 0x3f0723b8); // executed
                				if (_t11 == 0) goto 0x3f0587f1;
                				goto 0x3f0588c9;
                				E0000000113F061DB0(_t58, 0x3f072368, 0x3f072378, _t72, _t73); // executed
                				 *0x3f0912a0 = 2;
                				goto 0x3f058818;
                				dil = 1;
                				_v24 = dil;
                				E0000000113F058EFC(E0000000113F058D58(_t10, 0x3f072378));
                				if ( *_t56 == 0) goto 0x3f05884b;
                				if (E0000000113F058CC0(_t56, _t56) == 0) goto 0x3f05884b;
                				r8d = 0;
                				_t57 =  *_t56;
                				E0000000113F058F04( *0x3f072350(_t70));
                				if ( *_t57 == 0) goto 0x3f05886d;
                				if (E0000000113F058CC0(_t57, _t57) == 0) goto 0x3f05886d;
                				E0000000113F0620F4( *_t57);
                				_t21 = E0000000113F059060(0x3f072378);
                				E0000000113F061D5C();
                				r9d = _t21 & 0x0000ffff;
                				_t80 = _t57;
                				_t23 = E0000000113F051000(_t57, 0x13f050000, _t57, _t81); // executed
                				if (E0000000113F0590A4(_t57) == 0) goto 0x3f0588e9;
                				if (dil != 0) goto 0x3f0588a3;
                				E0000000113F0620D8(0x13f050000, 0x3f072378, _t57);
                				E0000000113F058D7C(1, 0);
                				_t27 = _t23;
                				if (E0000000113F0590A4(_t57) == 0) goto 0x3f0588f1;
                				if (_v24 != 0) goto 0x3f0588c7;
                				E0000000113F0620C8(0x13f050000, 0x3f072378, _t80);
                				return _t27;
                			}

















                0x13f05876c
                0x13f05876c
                0x13f058770
                0x13f058775
                0x13f058780
                0x13f058785
                0x13f058786
                0x13f058787
                0x13f058788
                0x13f058797
                0x13f05879e
                0x13f0587a4
                0x13f0587a7
                0x13f0587ac
                0x13f0587b3
                0x13f0587bc
                0x13f0587c4
                0x13f0587c6
                0x13f0587de
                0x13f0587e5
                0x13f0587ec
                0x13f0587ff
                0x13f058804
                0x13f05880e
                0x13f058810
                0x13f058813
                0x13f05881f
                0x13f05882b
                0x13f058837
                0x13f058839
                0x13f058842
                0x13f05884b
                0x13f058857
                0x13f058863
                0x13f058868
                0x13f05886d
                0x13f058875
                0x13f05887a
                0x13f05887d
                0x13f058889
                0x13f058897
                0x13f05889c
                0x13f05889e
                0x13f0588a7
                0x13f0588ac
                0x13f0588b9
                0x13f0588c0
                0x13f0588c2
                0x13f0588d3

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled_invalid_parameter_noinfo
                • String ID:
                • API String ID: 59578552-0
                • Opcode ID: ed82aac568f9e4e1cfdfc06df3119b0967ea7a1b2384f7998913628c2db1f86f
                • Instruction ID: 2ef9d6c54deedf9b8e2cae341aff6e62cbf23af1b7643ffd4e0e660f52075e83
                • Opcode Fuzzy Hash: ed82aac568f9e4e1cfdfc06df3119b0967ea7a1b2384f7998913628c2db1f86f
                • Instruction Fuzzy Hash: 39E0EC30E0A142D6FE2D376D48863DD12939B95334F70023EB129457D3C9AC47975A52
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 13f051710-13f051731 1 13f051752-13f051768 call 13f05a50c 0->1 2 13f051733-13f05173e call 13f052e30 0->2 7 13f05176e-13f05177e call 13f05abb4 1->7 8 13f05182f-13f05183a call 13f05a4f8 1->8 6 13f051743-13f05174c 2->6 6->1 9 13f051861-13f051866 6->9 7->8 15 13f051784-13f051793 call 13f05b08c 7->15 8->9 16 13f05183c-13f05184c call 13f05abb4 8->16 10 13f0519d3-13f0519eb 9->10 15->8 21 13f051799 15->21 22 13f05184e-13f05185c call 13f051b30 16->22 23 13f05186b-13f051884 call 13f05a8e4 16->23 26 13f0517a0-13f0517b9 21->26 22->9 30 13f051886 23->30 31 13f0518a3-13f0518ff call 13f05abb4 call 13f05a50c 23->31 28 13f051817-13f051824 call 13f05a4f8 26->28 29 13f0517bb-13f0517cb call 13f05abb4 26->29 28->10 29->28 40 13f0517cd-13f0517db call 13f05a8e4 29->40 34 13f05188d-13f05189e call 13f051b30 30->34 47 13f051901-13f051919 call 13f051b30 31->47 48 13f05191e-13f051937 call 13f05a8e4 31->48 34->10 45 13f0517e0-13f0517e3 40->45 45->28 46 13f0517e5-13f0517ec 45->46 49 13f05180e-13f051815 46->49 50 13f0517ee-13f0517fc 46->50 47->10 58 13f051945-13f05195b call 13f05a628 48->58 59 13f051939-13f051940 48->59 49->26 49->28 54 13f051800-13f051803 50->54 56 13f051805-13f05180c 54->56 57 13f051829-13f05182c 54->57 56->49 56->54 57->8 62 13f05195d-13f05196e call 13f051dd0 58->62 63 13f051970-13f051978 58->63 59->34 62->10 65 13f0519c1-13f0519c7 63->65 66 13f05197a 63->66 67 13f0519d1 65->67 68 13f0519c9 call 13f05a598 65->68 70 13f051980-13f0519ab 66->70 67->10 75 13f0519ce 68->75 72 13f0519b5-13f0519bc call 13f051dd0 70->72 73 13f0519ad-13f0519b1 70->73 72->65 73->70 76 13f0519b3 73->76 75->67 76->65
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _fread_nolock$Message
                • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC.$Could not read from file.$Error on file.$failed to read cookie.$failed to seek to cookie position.$fread$fseek$malloc
                • API String ID: 677216364-63831892
                • Opcode ID: 54f28ef45afce761e8cbb502114f60f2230ac001d8fdc18cb878060b1c1d3233
                • Instruction ID: cb9860a2fcb4c0244ac321aa5c12d1dcfe69c7968b8a870d159ee2140bb712ba
                • Opcode Fuzzy Hash: 54f28ef45afce761e8cbb502114f60f2230ac001d8fdc18cb878060b1c1d3233
                • Instruction Fuzzy Hash: 02818C71B09610D6EA6CDB2DD5483E823A2FB45B94F44853AFB1D87B83DBB4D662C700
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 100%
                			E0000000113F051430(void* __rcx, void* __rdx) {
                				void* _t1;
                				void* _t2;
                				void* _t3;
                				void* _t5;
                				void* _t9;
                				void* _t10;
                
                				_t1 = E0000000113F054220(_t2, _t3, _t5, __rcx, _t9, _t10); // executed
                				if (_t1 != 0xffffffff) goto 0x3f051452;
                				return _t1;
                			}









                0x13f05143f
                0x13f051447
                0x13f051451

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                • API String ID: 0-666925554
                • Opcode ID: ee24884d824ea33fe490d64ed3b6df1b717362858d32accb229bd11741dbf188
                • Instruction ID: a3c79b0c0a9a4e12df4be42617b73f935b0e8c8d71beb5db879ea7fc4806aecb
                • Opcode Fuzzy Hash: ee24884d824ea33fe490d64ed3b6df1b717362858d32accb229bd11741dbf188
                • Instruction Fuzzy Hash: CD516C71B08640C1FE28DB2AE45C7EA6352AB45BD4F844539BE1D477A7EAB8C74BC700
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                • String ID: D:(A;;FA;;;%s)$S-1-3-4
                • API String ID: 4998090-2855260032
                • Opcode ID: 71b6aa508a1911d28ae2d3507b52321c628e04872096e75fff83500fc565a3bc
                • Instruction ID: 230451ebd353960345ad206ed6f6b81e0dbebf7c704e41ac5564eeb445e0fbd4
                • Opcode Fuzzy Hash: 71b6aa508a1911d28ae2d3507b52321c628e04872096e75fff83500fc565a3bc
                • Instruction Fuzzy Hash: 45419231A18781C2EB548F69F8487DA6362F784794F440239BA9E476D7DF7CC64ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 160 13f06e914-13f06e987 call 13f06e644 163 13f06e9a1-13f06e9ab call 13f0603e4 160->163 164 13f06e989-13f06e992 call 13f05de94 160->164 170 13f06e9c6-13f06ea2f CreateFileW 163->170 171 13f06e9ad-13f06e9c4 call 13f05de94 call 13f05deb4 163->171 169 13f06e995-13f06e99c call 13f05deb4 164->169 183 13f06ecda-13f06ecfa 169->183 174 13f06ea31-13f06ea37 170->174 175 13f06eaac-13f06eab7 GetFileType 170->175 171->169 180 13f06ea79-13f06eaa7 GetLastError call 13f05de44 174->180 181 13f06ea39-13f06ea3d 174->181 177 13f06eab9-13f06eaf4 GetLastError call 13f05de44 CloseHandle 175->177 178 13f06eb0a-13f06eb11 175->178 177->169 194 13f06eafa-13f06eb05 call 13f05deb4 177->194 186 13f06eb13-13f06eb17 178->186 187 13f06eb19-13f06eb1c 178->187 180->169 181->180 188 13f06ea3f-13f06ea77 CreateFileW 181->188 192 13f06eb22-13f06eb73 call 13f0602fc 186->192 187->192 193 13f06eb1e 187->193 188->175 188->180 198 13f06eb75-13f06eb81 call 13f06e850 192->198 199 13f06eb92-13f06ebc2 call 13f06e3b0 192->199 193->192 194->169 198->199 205 13f06eb83 198->205 206 13f06eb85-13f06eb8d call 13f0638b0 199->206 207 13f06ebc4-13f06ec07 199->207 205->206 206->183 209 13f06ec29-13f06ec34 207->209 210 13f06ec09-13f06ec0d 207->210 213 13f06ecd8 209->213 214 13f06ec3a-13f06ec3e 209->214 210->209 212 13f06ec0f-13f06ec24 210->212 212->209 213->183 214->213 215 13f06ec44-13f06ec89 CloseHandle CreateFileW 214->215 216 13f06ecbe-13f06ecd3 215->216 217 13f06ec8b-13f06ecb9 GetLastError call 13f05de44 call 13f060524 215->217 216->213 217->216
                C-Code - Quality: 42%
                			E0000000113F06E914(void* __ecx, void* __edi, void* __ebp, void* __eflags, long long __rbx, long long __rcx, signed int* __rdx, long long __rdi, long long __rsi, long long __r8) {
                				void* __rbp;
                				signed int _t152;
                				long _t165;
                				void* _t169;
                				intOrPtr _t171;
                				intOrPtr _t174;
                				void* _t185;
                				signed int _t188;
                				signed int _t189;
                				void* _t213;
                				void* _t217;
                				intOrPtr* _t238;
                				intOrPtr* _t241;
                				long long _t253;
                				long long _t261;
                				signed long long _t267;
                				signed long long _t281;
                				intOrPtr _t282;
                				signed long long _t283;
                				signed long long _t302;
                				signed int* _t307;
                				long long _t310;
                				void* _t312;
                				void* _t313;
                				intOrPtr* _t315;
                				void* _t316;
                				void* _t324;
                				void* _t326;
                				void* _t330;
                				void* _t334;
                
                				_t217 = __ebp;
                				_t213 = __edi;
                				_t238 = _t315;
                				 *((long long*)(_t238 + 8)) = __rbx;
                				 *((long long*)(_t238 + 0x10)) = __rsi;
                				 *((long long*)(_t238 + 0x20)) = __rdi;
                				 *((long long*)(_t238 + 0x18)) = __r8;
                				_t313 = _t238 - 0x47;
                				_t316 = _t315 - 0xb0;
                				r12d = r9d;
                				_t261 = __r8;
                				r9d =  *(_t313 + 0x77);
                				_t307 = __rdx;
                				r8d =  *(_t313 + 0x6f);
                				_t310 = __rcx;
                				E0000000113F06E644(r12d, __eflags, _t238, __r8, _t313 - 1, _t313);
                				asm("movups xmm0, [eax]");
                				asm("movsd xmm1, [eax+0x10]");
                				asm("movups [ebp-0x49], xmm0");
                				asm("psrldq xmm0, 0x8");
                				asm("dec cx");
                				asm("movsd [ebp-0x31], xmm1");
                				asm("movsd [ebp-0x39], xmm1");
                				 *(_t313 - 0x21) = _t334 >> 0x20;
                				if (r15d != 0xffffffff) goto 0x3f06e9a1;
                				E0000000113F05DE94(_t238);
                				 *_t238 = 0;
                				 *__rdx =  *__rdx | 0xffffffff;
                				E0000000113F05DEB4(_t238);
                				goto 0x3f06ecda;
                				_t152 = E0000000113F0603E4(r12d, _t238, __r8, __rdx, __rdx, _t310);
                				 *__rdx = _t152;
                				if (_t152 != 0xffffffff) goto 0x3f06e9c6;
                				E0000000113F05DE94(_t238);
                				 *_t238 = 0;
                				 *__rdx =  *__rdx | 0xffffffff;
                				E0000000113F05DEB4(_t238);
                				 *_t238 = 0x18;
                				goto 0x3f06e995;
                				r8d = r15d;
                				r14d = r14d |  *(_t313 - 0x39);
                				 *_t310 = 1;
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				 *(_t316 + 0x28) = r14d;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				 *((intOrPtr*)(_t313 - 0x19)) = 0x18;
                				 *((long long*)(_t313 - 0x11)) = _t310;
                				 *(_t313 - 9) =  !(r12d >> 7) & 0x00000001;
                				 *(_t313 - 0x29) =  *(_t313 - 0x39) >> 0x20;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??); // executed
                				_t188 =  *(_t313 - 0x45);
                				if (_t238 != 0xffffffff) goto 0x3f06eaac;
                				if ((_t188 & 0xc0000000) != 0xc0000000) goto 0x3f06ea79;
                				if ((r12b & 0x00000001) == 0) goto 0x3f06ea79;
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				asm("btr ebx, 0x1f");
                				 *(_t313 - 0x45) = _t188;
                				r8d = r15d;
                				 *(_t316 + 0x28) = r14d;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				CreateFileW(??, ??, ??, ??, ??, ??, ??);
                				if (_t238 != 0xffffffff) goto 0x3f06eaac;
                				_t267 =  *__rdx;
                				_t241 =  *((intOrPtr*)(0x3f0917a0 + (_t267 >> 6) * 8));
                				 *(_t241 + 0x38 + (_t267 + _t267 * 8) * 8) =  *(_t241 + 0x38 + (_t267 + _t267 * 8) * 8) & 0x000000fe;
                				E0000000113F05DE44(GetLastError(), _t241, _t261);
                				goto 0x3f06e995;
                				_t165 = GetFileType(_t334); // executed
                				if (_t165 != 0) goto 0x3f06eb0a;
                				_t189 = GetLastError();
                				E0000000113F05DE44(_t166, _t241, _t261);
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) & 0x000000fe;
                				CloseHandle(_t330);
                				if (_t189 != 0) goto 0x3f06e995;
                				_t169 = E0000000113F05DEB4(_t241);
                				 *_t241 = 0xd;
                				goto 0x3f06e995;
                				r14b =  *(_t313 - 0x49);
                				if (_t169 != 2) goto 0x3f06eb19;
                				r14b = r14b | 0x00000040;
                				goto 0x3f06eb22;
                				if (_t169 != 3) goto 0x3f06eb22;
                				r14b = r14b | 0x00000008;
                				E0000000113F0602FC(_t169, _t189,  *__rdx, _t261, _t238, __rdx, _t310, _t313, _t326, _t324);
                				r14b = r14b | 0x00000001;
                				 *(_t313 - 0x49) = r14b;
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) = r14b;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x39 + ( *__rdx +  *__rdx * 8) * 8)) = sil;
                				if ((r12b & 0x00000002) == 0) goto 0x3f06eb92;
                				_t171 = E0000000113F06E850(_t189,  *__rdx, r12d & 0x0000003f, _t261, _t310, _t313 - 0x19);
                				 *((intOrPtr*)(_t313 - 0x4d)) = _t171;
                				if (_t171 == 0) goto 0x3f06eb92;
                				E0000000113F0638B0( *_t307, r12d & 0x0000003f, _t213, _t171,  *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)), _t261, _t310);
                				goto 0x3f06ecda;
                				asm("movups xmm0, [ebp-0x49]");
                				asm("movsd xmm1, [ebp-0x31]");
                				r8d = r12d;
                				asm("movaps [ebp-0x1], xmm0");
                				 *((intOrPtr*)(_t313 - 0x51)) = sil;
                				asm("movsd [ebp+0xf], xmm1");
                				_t174 = E0000000113F06E3B0( *_t307, _t217, _t261, _t313 - 1, _t310, _t313 - 0x51);
                				_t278 =  *_t307;
                				 *((intOrPtr*)(_t313 - 0x4d)) = _t174;
                				if (_t174 != 0) goto 0x3f06eb85;
                				 *((char*)( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x39 + ( *_t307 + _t278 * 8) * 8)) =  *((intOrPtr*)(_t313 - 0x51));
                				_t281 =  *_t307;
                				_t302 = _t281 + _t281 * 8;
                				_t282 =  *((intOrPtr*)(0x3f0917a0 + (_t281 >> 6) * 8));
                				 *(_t282 + 0x3d + _t302 * 8) =  *(_t282 + 0x3d + _t302 * 8) & 0x000000fe;
                				 *(_t282 + 0x3d + _t302 * 8) =  *(_t282 + 0x3d + _t302 * 8) | r12d >> 0x00000010 & 0x00000001;
                				if ((r14b & 0x00000048) != 0) goto 0x3f06ec29;
                				if ((r12b & 0x00000008) == 0) goto 0x3f06ec29;
                				_t283 =  *_t307;
                				_t253 =  *((intOrPtr*)(0x3f0917a0 + (_t283 >> 6) * 8));
                				 *(_t253 + 0x38 + (_t283 + _t283 * 8) * 8) =  *(_t253 + 0x38 + (_t283 + _t283 * 8) * 8) | 0x00000020;
                				if ((_t189 & 0xc0000000) != 0xc0000000) goto 0x3f06ecd8;
                				if ((r12b & 0x00000001) == 0) goto 0x3f06ecd8;
                				CloseHandle(_t312);
                				r8d =  *(_t313 - 0x21);
                				asm("btr ebx, 0x1f");
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				 *(_t316 + 0x28) = 0xc0000000;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				 *(_t313 - 0x45) = _t189;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??);
                				if (_t253 != 0xffffffff) goto 0x3f06ecbe;
                				_t185 = E0000000113F05DE44(GetLastError(), _t253, _t261);
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x38 + ( *_t307 +  *_t307 * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x38 + ( *_t307 +  *_t307 * 8) * 8) & 0x000000fe;
                				E0000000113F060524(_t185, _t189,  *_t307, _t261, _t307, _t310);
                				goto 0x3f06e995;
                				 *((long long*)( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x28 + ( *_t307 +  *_t307 * 8) * 8)) = _t253;
                				return 0;
                			}

































                0x13f06e914
                0x13f06e914
                0x13f06e914
                0x13f06e917
                0x13f06e91b
                0x13f06e91f
                0x13f06e923
                0x13f06e930
                0x13f06e934
                0x13f06e93b
                0x13f06e93e
                0x13f06e941
                0x13f06e945
                0x13f06e948
                0x13f06e94c
                0x13f06e956
                0x13f06e95b
                0x13f06e95e
                0x13f06e963
                0x13f06e967
                0x13f06e96c
                0x13f06e971
                0x13f06e97a
                0x13f06e97f
                0x13f06e987
                0x13f06e989
                0x13f06e990
                0x13f06e992
                0x13f06e995
                0x13f06e99c
                0x13f06e9a1
                0x13f06e9a6
                0x13f06e9ab
                0x13f06e9ad
                0x13f06e9b4
                0x13f06e9b6
                0x13f06e9b9
                0x13f06e9be
                0x13f06e9c4
                0x13f06e9d8
                0x13f06e9e4
                0x13f06e9eb
                0x13f06e9f3
                0x13f06e9f8
                0x13f06e9fd
                0x13f06ea08
                0x13f06ea0f
                0x13f06ea13
                0x13f06ea16
                0x13f06ea1a
                0x13f06ea20
                0x13f06ea2f
                0x13f06ea37
                0x13f06ea3d
                0x13f06ea46
                0x13f06ea4b
                0x13f06ea4f
                0x13f06ea52
                0x13f06ea59
                0x13f06ea5e
                0x13f06ea6a
                0x13f06ea77
                0x13f06ea79
                0x13f06ea91
                0x13f06ea95
                0x13f06eaa2
                0x13f06eaa7
                0x13f06eaaf
                0x13f06eab7
                0x13f06eac1
                0x13f06eac3
                0x13f06eae4
                0x13f06eaec
                0x13f06eaf4
                0x13f06eafa
                0x13f06eaff
                0x13f06eb05
                0x13f06eb0a
                0x13f06eb11
                0x13f06eb13
                0x13f06eb17
                0x13f06eb1c
                0x13f06eb1e
                0x13f06eb27
                0x13f06eb39
                0x13f06eb44
                0x13f06eb50
                0x13f06eb6a
                0x13f06eb73
                0x13f06eb77
                0x13f06eb7c
                0x13f06eb81
                0x13f06eb85
                0x13f06eb8d
                0x13f06eb92
                0x13f06eb9c
                0x13f06eba5
                0x13f06eba8
                0x13f06ebac
                0x13f06ebb0
                0x13f06ebb5
                0x13f06ebba
                0x13f06ebbd
                0x13f06ebc2
                0x13f06ebd9
                0x13f06ebdd
                0x13f06ebea
                0x13f06ebee
                0x13f06ebfa
                0x13f06ebff
                0x13f06ec07
                0x13f06ec0d
                0x13f06ec0f
                0x13f06ec20
                0x13f06ec24
                0x13f06ec34
                0x13f06ec3e
                0x13f06ec47
                0x13f06ec55
                0x13f06ec59
                0x13f06ec5d
                0x13f06ec62
                0x13f06ec69
                0x13f06ec71
                0x13f06ec7c
                0x13f06ec89
                0x13f06ec93
                0x13f06ecad
                0x13f06ecb4
                0x13f06ecb9
                0x13f06ecd3
                0x13f06ecfa

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                • String ID:
                • API String ID: 1330151763-0
                • Opcode ID: b5962c6797ef03967ed471b72d4fdb05eff1f6d83bd2944ca28bbdbd86a22b53
                • Instruction ID: 15539e83c6657c907463df9f9f22660e7c8e6bfe8ffc70b5ac7b0d6fc7354c0b
                • Opcode Fuzzy Hash: b5962c6797ef03967ed471b72d4fdb05eff1f6d83bd2944ca28bbdbd86a22b53
                • Instruction Fuzzy Hash: 73C1A136B20A4085EB18DF69C4903ED3772F749BA8F115229EF2A877D6DB38C656C340
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 68%
                			E0000000113F051040(long long __rax, long long __rcx, long long __rdx, void* __r8, void* __r9) {
                				void* __rbx;
                				void* __rbp;
                				void* _t13;
                				void* _t28;
                				void* _t31;
                				void* _t34;
                				void* _t36;
                				void* _t37;
                				void* _t41;
                				void* _t44;
                
                				_t40 = __r9;
                				_t39 = __r8;
                				_t18 = __rax;
                				 *((long long*)(_t36 + 0x10)) = __rdx;
                				 *((long long*)(_t36 + 8)) = __rcx;
                				_t37 = _t36 - 0x88;
                				 *((long long*)(_t37 + 0x50)) = __rax;
                				 *((long long*)(_t37 + 0x58)) = __rax;
                				 *((long long*)(_t37 + 0x60)) = __rax;
                				_t6 = _t18 + 0x58; // 0x58
                				r8d = _t6;
                				 *((intOrPtr*)(_t37 + 0x28)) = 0;
                				 *((long long*)(_t37 + 0x20)) = __rax;
                				_t13 = E0000000113F057370(__rax, __rdx, _t37 + 0x20, "1.2.11", _t34, _t44); // executed
                				r15d = _t13;
                				if (_t13 == 0) goto 0x3f0510c3;
                				r8d = _t13;
                				E0000000113F051DD0(_t18, "Failed to extract %s: inflateInit() failed with return code %d!\n", __rdx + 0x12, _t39, _t40, _t41, _t28, _t31, _t34);
                				_t11 = _t34 - 1; // -1
                				return _t11;
                			}













                0x13f051040
                0x13f051040
                0x13f051040
                0x13f051040
                0x13f051045
                0x13f051052
                0x13f051061
                0x13f051069
                0x13f051075
                0x13f05107a
                0x13f05107a
                0x13f05107e
                0x13f051087
                0x13f051091
                0x13f051096
                0x13f05109b
                0x13f0510a1
                0x13f0510ab
                0x13f0510b0
                0x13f0510c2

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message
                • String ID: 1.2.11$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                • API String ID: 2030045667-1060636955
                • Opcode ID: 638125b1238b853f3c9868ae8557bbf4aa46a529fa13a829b98a66853b5133ed
                • Instruction ID: 053c9461a73cf3771fbf3ee55c42a9c50cf8deeee0036c1de9db0a351fc27fff
                • Opcode Fuzzy Hash: 638125b1238b853f3c9868ae8557bbf4aa46a529fa13a829b98a66853b5133ed
                • Instruction Fuzzy Hash: E151D432A09680C5EA689B1AE8483EA6392F785794F440139FE5D877D7EFB8C757C700
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 45%
                			E0000000113F054B30(void* __rax, long long __rbx, void* __rcx, long long _a16, short _a24, intOrPtr _a32, long long _a40, long long _a48, long long _a56, long long _a64, intOrPtr _a72, char _a80, long long _a88, short _a96, char _a104, char _a136, long long _a144, intOrPtr _a196, short _a200, signed long long _a216, signed long long _a224, signed long long _a232, char _a248, signed int _a8440, void* _a8480) {
                				void* __rdi;
                				int _t53;
                				void* _t61;
                				signed long long _t81;
                				signed long long _t82;
                				long long _t103;
                				void* _t104;
                				void* _t105;
                				void* _t108;
                				void* _t110;
                				void* _t111;
                				void* _t112;
                				void* _t113;
                
                				_t85 = __rbx;
                				_a16 = __rbx;
                				E0000000113F058610(_t61, __rax, __rcx, _t111, _t112);
                				_t106 = _t105 - __rax;
                				_t81 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t82 = _t81 ^ _t105 - __rax;
                				_a8440 = _t82;
                				_t99 = __rcx;
                				_a72 = 0;
                				r8d = 0x1000;
                				E0000000113F0554B0(_t82, __rbx,  &_a248, __rcx, _t104, _t108);
                				_t5 = _t103 + 0x16; // 0x16
                				E0000000113F060A2C(_t5, _t85, _t99, _t103, _t112, _t113);
                				_t6 = _t103 + 2; // 0x2, executed
                				E0000000113F060A2C(_t6, _t85, _t99, _t103, _t112, _t113); // executed
                				_t7 = _t103 + 0xf; // 0xf
                				E0000000113F060A2C(_t7, _t85, _t99, _t103, _t112, _t113);
                				_t8 = _t103 + 0x15; // 0x15
                				E0000000113F060A2C(_t8, _t85, _t99, _t103, _t112, _t113);
                				_a80 = 0x18;
                				_a88 = _t103;
                				_a96 = 1;
                				GetStartupInfoW(??);
                				asm("xorps xmm0, xmm0");
                				_a144 = _t103;
                				asm("movdqa [esp+0xa0], xmm0");
                				_a196 = 0x101;
                				_a200 = 1;
                				E0000000113F05B520(0, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_a216 = _t82;
                				E0000000113F05B520(1, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_t17 = _t103 + 2; // 0x2
                				_a224 = _t82;
                				E0000000113F05B520(_t17, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_a232 = _t82;
                				GetCommandLineW();
                				r9d = 0;
                				_a64 =  &_a104;
                				_a56 =  &_a136;
                				_a48 = _t103;
                				_a40 = _t103;
                				_a32 = 0;
                				_a24 = 1;
                				_t53 = CreateProcessW(??, ??, ??, ??, ??, ??, ??, ??, ??, ??); // executed
                				if (_t53 == 0) goto 0x3f054cb1;
                				WaitForSingleObject(??, ??);
                				GetExitCodeProcess(??, ??); // executed
                				goto 0x3f054cc9;
                				E0000000113F051C80( &_a136, "CreateProcessW", "Error creating child process!\n",  &_a80, _t110);
                				return E0000000113F058680(_t50,  &_a136, _a8440 ^ _t106);
                			}
















                0x13f054b30
                0x13f054b30
                0x13f054b3b
                0x13f054b40
                0x13f054b43
                0x13f054b4a
                0x13f054b4d
                0x13f054b55
                0x13f054b62
                0x13f054b66
                0x13f054b6c
                0x13f054b76
                0x13f054b7b
                0x13f054b82
                0x13f054b85
                0x13f054b8c
                0x13f054b8f
                0x13f054b96
                0x13f054b99
                0x13f054ba6
                0x13f054bae
                0x13f054bb3
                0x13f054bb7
                0x13f054bbd
                0x13f054bc0
                0x13f054bca
                0x13f054bd3
                0x13f054bde
                0x13f054be6
                0x13f054bf5
                0x13f054bfc
                0x13f054c04
                0x13f054c13
                0x13f054c18
                0x13f054c1b
                0x13f054c23
                0x13f054c32
                0x13f054c37
                0x13f054c3f
                0x13f054c45
                0x13f054c5d
                0x13f054c6a
                0x13f054c6f
                0x13f054c74
                0x13f054c79
                0x13f054c7d
                0x13f054c81
                0x13f054c89
                0x13f054c95
                0x13f054ca5
                0x13f054caf
                0x13f054cbf
                0x13f054ce9

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlErrorExitHandlerInfoLastLineMultiObjectSingleStartupWaitWide
                • String ID: CreateProcessW$Error creating child process!
                • API String ID: 1742298069-3524285272
                • Opcode ID: a495fe73a262902a3a0309a7634280808d8197f1015b9f70ca5b024d79297555
                • Instruction ID: a951c0840225ba14d698cf5dbbadce38820a83afe46c718a9112228c62bc1c46
                • Opcode Fuzzy Hash: a495fe73a262902a3a0309a7634280808d8197f1015b9f70ca5b024d79297555
                • Instruction Fuzzy Hash: 71413132A0468086EB18DB68F4553DEB3A2FBD4350F50013DB68947B9BEF78D259CB40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 689 13f064204-13f06422a 690 13f064245-13f064249 689->690 691 13f06422c-13f064240 call 13f05de94 call 13f05deb4 689->691 693 13f064628-13f064634 call 13f05de94 call 13f05deb4 690->693 694 13f06424f-13f064256 690->694 709 13f06463f 691->709 711 13f06463a call 13f063618 693->711 694->693 697 13f06425c-13f06428e 694->697 697->693 698 13f064294-13f06429b 697->698 701 13f0642b4-13f0642b7 698->701 702 13f06429d-13f0642af call 13f05de94 call 13f05deb4 698->702 707 13f064624-13f064626 701->707 708 13f0642bd-13f0642bf 701->708 702->711 712 13f064642-13f064659 707->712 708->707 713 13f0642c5-13f0642c8 708->713 709->712 711->709 713->702 716 13f0642ca-13f0642f0 713->716 718 13f0642f2-13f0642f5 716->718 719 13f06432f-13f064337 716->719 722 13f0642f7-13f0642ff 718->722 723 13f06431d-13f06432a 718->723 720 13f064301-13f064318 call 13f05de94 call 13f05deb4 call 13f063618 719->720 721 13f064339-13f064361 call 13f063738 call 13f0636f8 * 2 719->721 750 13f0644b8 720->750 752 13f064363-13f064379 call 13f05deb4 call 13f05de94 721->752 753 13f06437e-13f0643af call 13f06495c 721->753 722->720 722->723 724 13f0643b3-13f0643c6 723->724 727 13f0643c8-13f0643d0 724->727 728 13f064442-13f06444c call 13f06b9b8 724->728 727->728 731 13f0643d2-13f0643d4 727->731 739 13f0644d6 728->739 740 13f064452-13f064467 728->740 731->728 737 13f0643d6-13f0643ed 731->737 737->728 742 13f0643ef-13f0643fb 737->742 748 13f0644db-13f0644fb ReadFile 739->748 740->739 744 13f064469-13f06447b GetConsoleMode 740->744 742->728 746 13f0643fd-13f0643ff 742->746 744->739 749 13f06447d-13f064485 744->749 746->728 751 13f064401-13f064419 746->751 754 13f064501-13f064509 748->754 755 13f0645ee-13f0645f7 GetLastError 748->755 749->748 758 13f064487-13f0644a9 ReadConsoleW 749->758 761 13f0644bb-13f0644c5 call 13f0636f8 750->761 751->728 762 13f06441b-13f064427 751->762 752->750 753->724 754->755 756 13f06450f 754->756 759 13f064614-13f064617 755->759 760 13f0645f9-13f06460f call 13f05deb4 call 13f05de94 755->760 764 13f064516-13f06452b 756->764 766 13f0644ab GetLastError 758->766 767 13f0644ca-13f0644d4 758->767 771 13f0644b1-13f0644b3 call 13f05de44 759->771 772 13f06461d-13f06461f 759->772 760->750 761->712 762->728 770 13f064429-13f06442b 762->770 764->761 774 13f06452d-13f064538 764->774 766->771 767->764 770->728 778 13f06442d-13f06443d 770->778 771->750 772->761 781 13f06455f-13f064567 774->781 782 13f06453a-13f064553 call 13f063f4c 774->782 778->728 785 13f0645dc-13f0645e9 call 13f063cd0 781->785 786 13f064569-13f06457b 781->786 789 13f064558-13f06455a 782->789 785->789 790 13f0645cf-13f0645d7 786->790 791 13f06457d 786->791 789->761 790->761 793 13f064582-13f064589 791->793 794 13f0645c5-13f0645c9 793->794 795 13f06458b-13f06458f 793->795 794->790 796 13f064591-13f064598 795->796 797 13f0645ab 795->797 796->797 798 13f06459a-13f06459e 796->798 799 13f0645b1-13f0645c1 797->799 798->797 801 13f0645a0-13f0645a9 798->801 799->793 800 13f0645c3 799->800 800->790 801->799
                C-Code - Quality: 58%
                			E0000000113F064204(void* __ebx, signed int __ecx, intOrPtr* __rax, long long __rbx, long long __rdx, long long __r9, char _a8, long long _a16, long long _a24, intOrPtr _a32) {
                				void* _v72;
                				long long _v80;
                				signed int _v88;
                				long long _v96;
                				void* _v104;
                				unsigned long long _v120;
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				signed char _t126;
                				char _t140;
                				int _t149;
                				void* _t150;
                				void* _t154;
                				char _t166;
                				char _t167;
                				signed int _t171;
                				void* _t194;
                				void* _t195;
                				void* _t196;
                				unsigned int _t198;
                				void* _t201;
                				long long _t206;
                				long long _t242;
                				signed long long _t249;
                				signed short* _t253;
                				intOrPtr* _t255;
                				char* _t258;
                				intOrPtr _t263;
                				signed long long _t276;
                				void* _t278;
                				unsigned long long _t283;
                				void* _t284;
                				signed long long _t290;
                				unsigned long long _t291;
                				signed short* _t293;
                				signed short* _t299;
                				signed short* _t301;
                				unsigned long long _t304;
                				signed long long _t305;
                				char* _t307;
                				char* _t308;
                				char* _t309;
                
                				_a24 = __rbx;
                				_a16 = __rdx;
                				r13d = r8d;
                				if (r12d != 0xfffffffe) goto 0x3f064245;
                				E0000000113F05DE94(__rax);
                				 *__rax = 0;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f06463f;
                				if (__ecx < 0) goto 0x3f064628;
                				_t201 = r12d -  *0x3f091ba0; // 0x40
                				if (_t201 >= 0) goto 0x3f064628;
                				_t3 = _t283 + 1; // 0x1
                				r9d = _t3;
                				_v80 = __r9;
                				_t289 = __ecx >> 6;
                				_v88 = __ecx >> 6;
                				_t305 = __ecx + __ecx * 8;
                				if ((r9b &  *(0x3f0917a0 + 0x38 + _t305 * 8)) == 0) goto 0x3f064628;
                				if (r13d - 0x7fffffff <= 0) goto 0x3f0642b4;
                				E0000000113F05DE94(__ecx);
                				 *__ecx = 0;
                				_t126 = E0000000113F05DEB4(__ecx);
                				 *__ecx = 0x16;
                				goto 0x3f06463a;
                				if (r13d == 0) goto 0x3f064624;
                				if ((_t126 & 0x00000002) != 0) goto 0x3f064624;
                				_t206 = __rdx;
                				if (_t206 == 0) goto 0x3f06429d;
                				r11d =  *((char*)(0x3f0917a0 + 0x39 + _t305 * 8));
                				_t242 =  *((intOrPtr*)(0x3f0917a0 + 0x28 + _t305 * 8));
                				_v96 = _t242;
                				_a8 = r11b;
                				if (_t206 == 0) goto 0x3f06432f;
                				if (r11d - r9d != r9d) goto 0x3f06431d;
                				if ((r9b &  !r13d) != 0) goto 0x3f06431d;
                				E0000000113F05DE94(_t242);
                				 *_t242 = 0;
                				E0000000113F05DEB4(_t242);
                				 *_t242 = 0x16;
                				E0000000113F063618();
                				goto 0x3f0644b8;
                				goto 0x3f0643b3;
                				if ((r9b &  !r13d) == 0) goto 0x3f064301;
                				_t194 =  <  ? 4 : r13d >> 1;
                				E0000000113F063738(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				_t258 = _t242;
                				E0000000113F0636F8(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				E0000000113F0636F8(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				_t307 = _t258;
                				if (_t258 != 0) goto 0x3f06437e;
                				E0000000113F05DEB4(_t242);
                				 *_t242 = 0xc;
                				E0000000113F05DE94(_t242);
                				 *_t242 = 8;
                				goto 0x3f0644b8;
                				r8d = 0x13f0917a1;
                				E0000000113F06495C(_t258, _t278, _t283);
                				_t290 = _v88;
                				r11b = _a8;
                				r9d = 1;
                				 *((long long*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x30 + _t305 * 8)) = _t242;
                				_t263 =  *((intOrPtr*)(0x3f0917a0 + _t290 * 8));
                				_v72 = _t307;
                				r10d = 0xa;
                				if (( *(_t263 + 0x38 + _t305 * 8) & 0x00000048) == 0) goto 0x3f064442;
                				_t140 =  *((intOrPtr*)(_t263 + 0x3a + _t305 * 8));
                				if (_t140 == r10b) goto 0x3f064442;
                				if (_t194 == 0) goto 0x3f064442;
                				 *_t307 = _t140;
                				_t195 = _t194 - 1;
                				_t308 = _t307 + __r9;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3a + _t305 * 8)) = r10b;
                				if (r11b == 0) goto 0x3f064442;
                				_t166 =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3b + _t305 * 8));
                				if (_t166 == r10b) goto 0x3f064442;
                				if (_t195 == 0) goto 0x3f064442;
                				 *_t308 = _t166;
                				_t309 = _t308 + __r9;
                				_t196 = _t195 - 1;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3b + _t305 * 8)) = r10b;
                				if (r11b != r9b) goto 0x3f064442;
                				_t167 =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3c + _t305 * 8));
                				if (_t167 == r10b) goto 0x3f064442;
                				if (_t196 == 0) goto 0x3f064442;
                				 *_t309 = _t167;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3c + _t305 * 8)) = r10b;
                				if (E0000000113F06B9B8(r12d,  *((intOrPtr*)(0x3f0917a0 + _t290 * 8))) == 0) goto 0x3f0644d6;
                				_t249 =  *((intOrPtr*)(0x3f0917a0 + _v88 * 8));
                				if ( *((intOrPtr*)(_t249 + 0x38 + _t305 * 8)) - sil >= 0) goto 0x3f0644d6;
                				if (GetConsoleMode(??, ??) == 0) goto 0x3f0644d6;
                				if (_a8 != 2) goto 0x3f0644db;
                				_t198 = _t196 - 1 >> 1;
                				r8d = _t198;
                				_v120 = _t283;
                				if (ReadConsoleW(??, ??, ??, ??, ??) != 0) goto 0x3f0644ca;
                				E0000000113F05DE44(GetLastError(), _t249, _t258);
                				E0000000113F0636F8(_t249, _t258);
                				goto 0x3f064642;
                				goto 0x3f064516;
                				_v80 = sil;
                				r8d = _t198;
                				_v120 = _t283;
                				_t149 = ReadFile(??, ??, ??, ??, ??); // executed
                				if (_t149 == 0) goto 0x3f0645ee;
                				if (_a32 - r13d > 0) goto 0x3f0645ee;
                				if ( *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _v88 * 8)) + 0x38 + _t305 * 8)) - sil >= 0) goto 0x3f0644bb;
                				_t291 = _t278 + _t249 * 2 + _a32;
                				if (_a8 == 2) goto 0x3f06455f;
                				_t276 = _t309 + __r9;
                				_v120 = _t304 >> 1;
                				_t150 = E0000000113F063F4C(__ebx, r12d, _t278 + _t249 * 2 + _a32, _t198, _a8 - 2, _t258, _t276, _t278, _t283, _t284, _t291, _a16);
                				goto 0x3f0644bb;
                				if (_v80 == sil) goto 0x3f0645dc;
                				_t301 = _v72;
                				_t253 = _t301;
                				_t299 =  &(_t301[_t291 >> 1]);
                				if (_t301 - _t299 >= 0) goto 0x3f0645cf;
                				_t171 =  *_t253 & 0x0000ffff;
                				if (_t171 == 0x1a) goto 0x3f0645c5;
                				if (_t171 != 0xd) goto 0x3f0645ab;
                				_t293 =  &(_t253[1]);
                				if (_t293 - _t299 >= 0) goto 0x3f0645ab;
                				if ( *_t293 != 0xa) goto 0x3f0645ab;
                				r8d = 4;
                				goto 0x3f0645b1;
                				r8d = 2;
                				 *_t301 = 0xa;
                				if (_t253 + _t293 - _t299 < 0) goto 0x3f064582;
                				goto 0x3f0645cf;
                				_t255 =  *((intOrPtr*)(0x3f0917a0 + _t276 * 8));
                				 *(_t255 + 0x38 + _t305 * 8) =  *(_t255 + 0x38 + _t305 * 8) | 0x00000002;
                				goto 0x3f0644bb;
                				E0000000113F063CD0(_t150, r12d, _v72,  &(_t301[1]), 0x3f0917a0);
                				goto 0x3f064558;
                				if (GetLastError() != 5) goto 0x3f064614;
                				E0000000113F05DEB4(_t255);
                				 *_t255 = 9;
                				_t154 = E0000000113F05DE94(_t255);
                				 *_t255 = 5;
                				goto 0x3f0644b8;
                				if (_t154 != 0x6d) goto 0x3f0644b1;
                				goto 0x3f0644bb;
                				goto 0x3f064642;
                				E0000000113F05DE94(_t255);
                				 *_t255 = 0xa;
                				E0000000113F05DEB4(_t255);
                				 *_t255 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}














































                0x13f064204
                0x13f064209
                0x13f064223
                0x13f06422a
                0x13f06422c
                0x13f064233
                0x13f064235
                0x13f06423a
                0x13f064240
                0x13f064249
                0x13f06424f
                0x13f064256
                0x13f06425f
                0x13f06425f
                0x13f064266
                0x13f064275
                0x13f064279
                0x13f06427e
                0x13f06428e
                0x13f06429b
                0x13f06429d
                0x13f0642a2
                0x13f0642a4
                0x13f0642a9
                0x13f0642af
                0x13f0642b7
                0x13f0642bf
                0x13f0642c5
                0x13f0642c8
                0x13f0642ca
                0x13f0642d3
                0x13f0642db
                0x13f0642e5
                0x13f0642f0
                0x13f0642f5
                0x13f0642ff
                0x13f064301
                0x13f064306
                0x13f064308
                0x13f06430d
                0x13f064313
                0x13f064318
                0x13f06432a
                0x13f064337
                0x13f064340
                0x13f064345
                0x13f06434c
                0x13f06434f
                0x13f064356
                0x13f06435b
                0x13f064361
                0x13f064363
                0x13f064368
                0x13f06436e
                0x13f064373
                0x13f064379
                0x13f064383
                0x13f064387
                0x13f06438c
                0x13f064398
                0x13f0643a0
                0x13f0643aa
                0x13f0643af
                0x13f0643bb
                0x13f0643c0
                0x13f0643c6
                0x13f0643c8
                0x13f0643d0
                0x13f0643d4
                0x13f0643d6
                0x13f0643d9
                0x13f0643df
                0x13f0643e5
                0x13f0643ed
                0x13f0643f3
                0x13f0643fb
                0x13f0643ff
                0x13f064401
                0x13f06440c
                0x13f06440f
                0x13f064411
                0x13f064419
                0x13f06441f
                0x13f064427
                0x13f06442b
                0x13f06442d
                0x13f06443d
                0x13f06444c
                0x13f06445e
                0x13f064467
                0x13f06447b
                0x13f064485
                0x13f064494
                0x13f064499
                0x13f06449c
                0x13f0644a9
                0x13f0644b3
                0x13f0644be
                0x13f0644c5
                0x13f0644d4
                0x13f0644d6
                0x13f0644e8
                0x13f0644eb
                0x13f0644f3
                0x13f0644fb
                0x13f064509
                0x13f06452b
                0x13f064535
                0x13f064538
                0x13f064548
                0x13f06454e
                0x13f064553
                0x13f06455a
                0x13f064567
                0x13f064569
                0x13f06456e
                0x13f064574
                0x13f06457b
                0x13f064582
                0x13f064589
                0x13f06458f
                0x13f064591
                0x13f064598
                0x13f06459e
                0x13f0645a3
                0x13f0645a9
                0x13f0645ab
                0x13f0645b4
                0x13f0645c1
                0x13f0645c3
                0x13f0645c5
                0x13f0645c9
                0x13f0645d7
                0x13f0645e4
                0x13f0645e9
                0x13f0645f7
                0x13f0645f9
                0x13f0645fe
                0x13f064604
                0x13f064609
                0x13f06460f
                0x13f064617
                0x13f06461f
                0x13f064626
                0x13f064628
                0x13f06462d
                0x13f06462f
                0x13f064634
                0x13f064659

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: a1c0c3a1b1d6bd38253fd92a1b1da45b18ad0840d53657d948fd2d889d963241
                • Instruction ID: 80da37cd7c11a7457fbaf9b22fbc5e5f5e8125f7fd724138e0c90ffd6f2fe650
                • Opcode Fuzzy Hash: a1c0c3a1b1d6bd38253fd92a1b1da45b18ad0840d53657d948fd2d889d963241
                • Instruction Fuzzy Hash: 8FC12636A0478591EB699B1D9040BDE7BA3F780BE0F650129FA4A03797CF78CA57C701
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 79%
                			E0000000113F058788(intOrPtr* __rax, long long __rbx, void* __r8, long long _a8) {
                				char _v24;
                				void* _t8;
                				void* _t9;
                				void* _t10;
                				signed short _t20;
                				void* _t22;
                				void* _t26;
                				intOrPtr _t35;
                				intOrPtr* _t54;
                				intOrPtr* _t55;
                				void* _t68;
                				void* _t69;
                				void* _t75;
                
                				_t56 = __rbx;
                				_t54 = __rax;
                				_a8 = __rbx;
                				_t8 = E0000000113F058BE8(1); // executed
                				if (_t8 == 0) goto 0x3f0588d4;
                				dil = 0;
                				_v24 = dil;
                				_t9 = E0000000113F058BAC();
                				_t35 =  *0x3f0912a0; // 0x2
                				if (_t35 == 1) goto 0x3f0588df;
                				if (_t35 != 0) goto 0x3f058810;
                				 *0x3f0912a0 = 1;
                				_t10 = E0000000113F061E14(__rbx, 0x3f072380, 0x3f0723b8); // executed
                				if (_t10 == 0) goto 0x3f0587f1;
                				goto 0x3f0588c9;
                				E0000000113F061DB0(_t56, 0x3f072368, 0x3f072378, _t68, _t69); // executed
                				 *0x3f0912a0 = 2;
                				goto 0x3f058818;
                				dil = 1;
                				_v24 = dil;
                				E0000000113F058EFC(E0000000113F058D58(_t9, 0x3f072378));
                				if ( *_t54 == 0) goto 0x3f05884b;
                				if (E0000000113F058CC0(_t54, _t54) == 0) goto 0x3f05884b;
                				r8d = 0;
                				_t55 =  *_t54;
                				E0000000113F058F04( *0x3f072350());
                				if ( *_t55 == 0) goto 0x3f05886d;
                				if (E0000000113F058CC0(_t55, _t55) == 0) goto 0x3f05886d;
                				E0000000113F0620F4( *_t55);
                				_t20 = E0000000113F059060(0x3f072378);
                				E0000000113F061D5C();
                				r9d = _t20 & 0x0000ffff;
                				_t74 = _t55;
                				_t22 = E0000000113F051000(_t55, 0x13f050000, _t55, _t75); // executed
                				if (E0000000113F0590A4(_t55) == 0) goto 0x3f0588e9;
                				if (dil != 0) goto 0x3f0588a3;
                				E0000000113F0620D8(0x13f050000, 0x3f072378, _t55);
                				E0000000113F058D7C(1, 0);
                				_t26 = _t22;
                				if (E0000000113F0590A4(_t55) == 0) goto 0x3f0588f1;
                				if (_v24 != 0) goto 0x3f0588c7;
                				E0000000113F0620C8(0x13f050000, 0x3f072378, _t74);
                				return _t26;
                			}
















                0x13f058788
                0x13f058788
                0x13f058788
                0x13f058797
                0x13f05879e
                0x13f0587a4
                0x13f0587a7
                0x13f0587ac
                0x13f0587b3
                0x13f0587bc
                0x13f0587c4
                0x13f0587c6
                0x13f0587de
                0x13f0587e5
                0x13f0587ec
                0x13f0587ff
                0x13f058804
                0x13f05880e
                0x13f058810
                0x13f058813
                0x13f05881f
                0x13f05882b
                0x13f058837
                0x13f058839
                0x13f058842
                0x13f05884b
                0x13f058857
                0x13f058863
                0x13f058868
                0x13f05886d
                0x13f058875
                0x13f05887a
                0x13f05887d
                0x13f058889
                0x13f058897
                0x13f05889c
                0x13f05889e
                0x13f0588a7
                0x13f0588ac
                0x13f0588b9
                0x13f0588c0
                0x13f0588c2
                0x13f0588d3

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: __scrt_fastfail$__scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                • String ID:
                • API String ID: 2735655165-0
                • Opcode ID: 54703c015601a388242d526a7ec929817a87e24da4d50ebdd5dac0dcf281f813
                • Instruction ID: 6870d9aac9d6a030ae20ad25f86950bee77f0fbce46ba86ced8783e6fe0318dc
                • Opcode Fuzzy Hash: 54703c015601a388242d526a7ec929817a87e24da4d50ebdd5dac0dcf281f813
                • Instruction Fuzzy Hash: 78316F31E08208C5FA5CA76DDA993EA13D3DB55784F44403CBE4D4B2E7DAA88B0BC310
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 861 13f05a0d0-13f05a10d 862 13f05a113-13f05a116 861->862 863 13f05a1fd 861->863 864 13f05a1ff-13f05a21b 862->864 865 13f05a11c 862->865 863->864 866 13f05a11f 865->866 867 13f05a1f5 866->867 868 13f05a125-13f05a133 866->868 867->863 869 13f05a135-13f05a138 868->869 870 13f05a140-13f05a15f LoadLibraryExW 868->870 871 13f05a1d7-13f05a1e6 GetProcAddress 869->871 872 13f05a13e 869->872 873 13f05a1b7-13f05a1cc 870->873 874 13f05a161-13f05a16a GetLastError 870->874 871->867 876 13f05a1e8-13f05a1f3 871->876 877 13f05a1ab-13f05a1b2 872->877 873->871 875 13f05a1ce-13f05a1d1 FreeLibrary 873->875 878 13f05a199-13f05a1a3 874->878 879 13f05a16c-13f05a181 call 13f0633d8 874->879 875->871 876->864 877->866 878->877 879->878 882 13f05a183-13f05a197 LoadLibraryExW 879->882 882->873 882->878
                C-Code - Quality: 50%
                			E0000000113F05A0D0(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                				intOrPtr _t61;
                				intOrPtr _t65;
                				intOrPtr _t67;
                				intOrPtr _t68;
                				struct HINSTANCE__* _t81;
                				long long _t85;
                				void* _t89;
                				struct HINSTANCE__* _t94;
                				long _t97;
                				void* _t100;
                				signed long long _t101;
                				WCHAR* _t104;
                
                				 *((long long*)(_t89 + 8)) = __rbx;
                				 *((long long*)(_t89 + 0x10)) = _t85;
                				 *((long long*)(_t89 + 0x18)) = __rsi;
                				_t61 =  *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8));
                				_t101 = _t100 | 0xffffffff;
                				if (_t61 == _t101) goto 0x3f05a1fd;
                				if (_t61 != 0) goto 0x3f05a1ff;
                				if (__r8 == __r9) goto 0x3f05a1f5;
                				_t67 =  *((intOrPtr*)(0x13f050000 + 0x41448 + __rsi * 8));
                				if (_t67 == 0) goto 0x3f05a140;
                				if (_t67 != _t101) goto 0x3f05a1d7;
                				goto 0x3f05a1ab;
                				r8d = 0x800; // executed
                				LoadLibraryExW(_t104, _t100, _t97); // executed
                				_t68 = _t61;
                				if (_t61 != 0) goto 0x3f05a1b7;
                				if (GetLastError() != 0x57) goto 0x3f05a199;
                				_t14 = _t68 + 7; // 0x7
                				r8d = _t14;
                				if (E0000000113F0633D8(__r8) == 0) goto 0x3f05a199;
                				r8d = 0;
                				LoadLibraryExW(??, ??, ??);
                				if (_t61 != 0) goto 0x3f05a1b7;
                				 *((intOrPtr*)(0x13f050000 + 0x41448 + __rsi * 8)) = _t101;
                				goto 0x3f05a11f;
                				_t21 = 0x13f050000 + 0x41448 + __rsi * 8;
                				_t65 =  *_t21;
                				 *_t21 = _t61;
                				if (_t65 == 0) goto 0x3f05a1d7;
                				FreeLibrary(_t94);
                				GetProcAddress(_t81);
                				if (_t65 == 0) goto 0x3f05a1f5;
                				 *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8)) = _t65;
                				goto 0x3f05a1ff;
                				 *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8)) = _t101;
                				return 0;
                			}















                0x13f05a0d0
                0x13f05a0d5
                0x13f05a0da
                0x13f05a0fe
                0x13f05a106
                0x13f05a10d
                0x13f05a116
                0x13f05a11f
                0x13f05a128
                0x13f05a133
                0x13f05a138
                0x13f05a13e
                0x13f05a14d
                0x13f05a153
                0x13f05a159
                0x13f05a15f
                0x13f05a16a
                0x13f05a16c
                0x13f05a16c
                0x13f05a181
                0x13f05a183
                0x13f05a18b
                0x13f05a197
                0x13f05a1a3
                0x13f05a1b2
                0x13f05a1c1
                0x13f05a1c1
                0x13f05a1c1
                0x13f05a1cc
                0x13f05a1d1
                0x13f05a1dd
                0x13f05a1e6
                0x13f05a1eb
                0x13f05a1f3
                0x13f05a1f5
                0x13f05a21b

                APIs
                • LoadLibraryExW.KERNELBASE(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A153
                • GetLastError.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A161
                • LoadLibraryExW.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A18B
                • FreeLibrary.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A1D1
                • GetProcAddress.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A1DD
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Library$Load$AddressErrorFreeLastProc
                • String ID: api-ms-
                • API String ID: 2559590344-2084034818
                • Opcode ID: ab915c05323a93562967bdf0f1ca73c137925dd5d12ccf2297365f0bdfe17a08
                • Instruction ID: 2da50821bafe619e89dd74e3b274e295604f0c38f5278ef395f431fe9ebca5a5
                • Opcode Fuzzy Hash: ab915c05323a93562967bdf0f1ca73c137925dd5d12ccf2297365f0bdfe17a08
                • Instruction Fuzzy Hash: ED31F431B16A80C4EE29DB0AA8087D92396F744BA4F09013DFD1D1B792EF78D286C314
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 883 13f06dc9c-13f06dcc6 call 13f06d510 call 13f06d578 888 13f06de2d-13f06de9d call 13f063638 call 13f069910 883->888 889 13f06dccc-13f06dcd7 call 13f06d518 883->889 900 13f06dea6-13f06dea9 888->900 901 13f06de9f-13f06dea4 888->901 889->888 894 13f06dcdd-13f06dce8 call 13f06d548 889->894 894->888 902 13f06dcee-13f06dd11 call 13f0636f8 GetTimeZoneInformation 894->902 904 13f06deb0-13f06dec0 call 13f063738 900->904 905 13f06deab-13f06deae 900->905 903 13f06def4-13f06df06 901->903 914 13f06dd17-13f06dd38 902->914 915 13f06de06-13f06de2c call 13f06d508 call 13f06d4f8 call 13f06d500 902->915 907 13f06df17 call 13f06dc9c 903->907 908 13f06df08-13f06df0b 903->908 918 13f06dec2 904->918 919 13f06decb-13f06dee6 call 13f069910 904->919 905->903 920 13f06df1c-13f06df48 call 13f0636f8 call 13f058680 907->920 908->907 911 13f06df0d-13f06df15 call 13f06da94 908->911 911->920 921 13f06dd43-13f06dd4a 914->921 922 13f06dd3a-13f06dd40 914->922 925 13f06dec4-13f06dec9 call 13f0636f8 918->925 936 13f06dee8-13f06deeb 919->936 937 13f06deed-13f06deef call 13f0636f8 919->937 928 13f06dd5e-13f06dd60 921->928 929 13f06dd4c-13f06dd54 921->929 922->921 925->905 932 13f06dd62-13f06dda3 call 13f06ad88 call 13f0683ec 928->932 929->928 931 13f06dd56-13f06dd5c 929->931 931->932 949 13f06dda5-13f06dda8 932->949 950 13f06ddb3-13f06ddb6 932->950 936->925 937->903 949->950 951 13f06ddaa-13f06ddb1 949->951 952 13f06ddb9-13f06ddee call 13f0683ec 950->952 951->952 955 13f06ddff-13f06de03 952->955 956 13f06ddf0-13f06ddf3 952->956 955->915 956->955 957 13f06ddf5-13f06ddfd 956->957 957->915
                C-Code - Quality: 70%
                			E0000000113F06DC9C(void* __ecx, void* __eflags, signed int** __rax, void* __rdx, void* __r9, signed int _a8, char _a16, signed int _a24, signed int _a32) {
                				long long _v48;
                				long long _v56;
                				intOrPtr _v64;
                				long long _v72;
                				void* __rbx;
                				void* __rsi;
                				void* _t32;
                				long _t38;
                				void* _t43;
                				void* _t44;
                				void* _t45;
                				void* _t46;
                				signed int _t55;
                				signed int** _t74;
                				signed int* _t81;
                				signed int** _t82;
                				long long _t90;
                
                				_t74 = __rax;
                				E0000000113F06D510(_t32);
                				_a8 = 0;
                				_t82 = _t74;
                				_a24 = 0;
                				_a32 = 0;
                				if (E0000000113F06D578(_t74,  &_a8) != 0) goto 0x3f06de2d;
                				if (E0000000113F06D518(_t74,  &_a24) != 0) goto 0x3f06de2d;
                				if (E0000000113F06D548(_t74,  &_a32) != 0) goto 0x3f06de2d;
                				E0000000113F0636F8(_t74,  *0x3f092018);
                				 *0x3f092018 = _t90; // executed
                				_t38 = GetTimeZoneInformation(??); // executed
                				if (_t38 == 0xffffffff) goto 0x3f06de06;
                				_t55 =  *0x3f092030 * 0x3c;
                				_t7 = _t90 + 1; // 0x1
                				r8d =  *0x3f092084;
                				 *0x3f092020 = _t7;
                				_a8 = _t55;
                				if ( *0x3f092076 == 0) goto 0x3f06dd43;
                				_a8 = r8d * 0x3c + _t55;
                				if ( *0x3f0920ca == 0) goto 0x3f06dd5e;
                				if ( *0x3f0920d8 == 0) goto 0x3f06dd5e;
                				goto 0x3f06dd62;
                				_a24 = 0;
                				_a32 = 0;
                				_t43 = E0000000113F06AD88(0, _t74, _t82, 0x3f092030, __rdx, _t90, __r9);
                				r9d = r9d | 0xffffffff;
                				_v48 =  &_a16;
                				_v56 = _t90;
                				_v64 = 0x3f;
                				_v72 =  *_t82;
                				E0000000113F0683EC();
                				if (_t43 == 0) goto 0x3f06ddb3;
                				if (_a16 != 0) goto 0x3f06ddb3;
                				( *_t82)[0xf] = sil;
                				goto 0x3f06ddb9;
                				 *( *_t82) = sil;
                				r9d = r9d | 0xffffffff;
                				_v48 =  &_a16;
                				_v56 = _t90;
                				_v64 = 0x3f;
                				_v72 = _t82[1];
                				E0000000113F0683EC();
                				if (_t43 == 0) goto 0x3f06ddff;
                				if (_a16 != 0) goto 0x3f06ddff;
                				_t82[1][0xf] = sil;
                				goto 0x3f06de06;
                				_t81 = _t82[1];
                				 *_t81 = sil;
                				_t44 = E0000000113F06D508(_t43);
                				 *_t81 = _a8;
                				_t45 = E0000000113F06D4F8(_t44);
                				 *_t81 = _a24;
                				_t46 = E0000000113F06D500(_t45);
                				 *_t81 = _a32;
                				return _t46;
                			}




















                0x13f06dc9c
                0x13f06dca8
                0x13f06dcb3
                0x13f06dcb6
                0x13f06dcb9
                0x13f06dcbc
                0x13f06dcc6
                0x13f06dcd7
                0x13f06dce8
                0x13f06dcf5
                0x13f06dd01
                0x13f06dd08
                0x13f06dd11
                0x13f06dd17
                0x13f06dd1e
                0x13f06dd28
                0x13f06dd2f
                0x13f06dd35
                0x13f06dd38
                0x13f06dd40
                0x13f06dd4a
                0x13f06dd54
                0x13f06dd5c
                0x13f06dd62
                0x13f06dd65
                0x13f06dd68
                0x13f06dd79
                0x13f06dd83
                0x13f06dd88
                0x13f06dd8d
                0x13f06dd95
                0x13f06dd9c
                0x13f06dda3
                0x13f06dda8
                0x13f06ddad
                0x13f06ddb1
                0x13f06ddb6
                0x13f06ddbd
                0x13f06ddc1
                0x13f06ddd3
                0x13f06ddda
                0x13f06dde2
                0x13f06dde7
                0x13f06ddee
                0x13f06ddf3
                0x13f06ddf9
                0x13f06ddfd
                0x13f06ddff
                0x13f06de03
                0x13f06de09
                0x13f06de0e
                0x13f06de13
                0x13f06de18
                0x13f06de1d
                0x13f06de22
                0x13f06de2c

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight_invalid_parameter_noinfo$FreeHeapInformationTimeZone
                • String ID: ?
                • API String ID: 428190724-1684325040
                • Opcode ID: 8bd5cd7c7b6c0f67661463626d4ac031c5a02eaa9154a0057d9920a7943e1a32
                • Instruction ID: 47df4dce2b475279e4f81dfaea0e905422e70ffc0ac4e3fb4389b1bc47da758a
                • Opcode Fuzzy Hash: 8bd5cd7c7b6c0f67661463626d4ac031c5a02eaa9154a0057d9920a7943e1a32
                • Instruction Fuzzy Hash: 4461D532A1164086E768EF2DE8803D977A6F7847A4F64013EFA5947BA7DB38C643C740
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 958 13f065528-13f06554b 959 13f0657e8 958->959 960 13f065551-13f065554 958->960 963 13f0657ea-13f065801 959->963 961 13f065576-13f06559c 960->961 962 13f065556-13f065571 call 13f05de94 call 13f05deb4 call 13f063618 960->962 965 13f0655a7-13f0655ad 961->965 966 13f06559e-13f0655a5 961->966 962->963 968 13f0655af-13f0655b8 call 13f06495c 965->968 969 13f0655bd-13f0655cd call 13f06b9b8 965->969 966->962 966->965 968->969 975 13f0656d6-13f0656e6 969->975 976 13f0655d3-13f0655e3 969->976 980 13f065737-13f06575c WriteFile 975->980 981 13f0656e8-13f0656ef 975->981 976->975 978 13f0655e9-13f0655fc call 13f06699c 976->978 993 13f065614-13f065630 GetConsoleMode 978->993 994 13f0655fe-13f06560e 978->994 983 13f065767 980->983 984 13f06575e-13f065764 GetLastError 980->984 985 13f065723-13f065735 call 13f0650ac 981->985 986 13f0656f1-13f0656f4 981->986 989 13f06576a 983->989 984->983 1002 13f0656ca-13f0656d1 985->1002 990 13f0656f6-13f0656f9 986->990 991 13f06570f-13f065721 call 13f0652cc 986->991 996 13f06576f 989->996 997 13f065774-13f06577e 990->997 998 13f0656fb-13f06570d call 13f0651b0 990->998 991->1002 993->975 1001 13f065636-13f065639 993->1001 994->975 994->993 996->997 1003 13f0657e1-13f0657e6 997->1003 1004 13f065780-13f065785 997->1004 998->1002 1006 13f0656b8-13f0656c5 call 13f064bdc 1001->1006 1007 13f06563b-13f065642 1001->1007 1002->996 1003->963 1008 13f065787-13f06578a 1004->1008 1009 13f0657b1-13f0657c2 1004->1009 1006->1002 1007->997 1013 13f065648-13f065658 1007->1013 1010 13f0657a7-13f0657ac call 13f05de44 1008->1010 1011 13f06578c-13f06579c call 13f05deb4 call 13f05de94 1008->1011 1014 13f0657c4-13f0657c7 1009->1014 1015 13f0657c9-13f0657d9 call 13f05deb4 call 13f05de94 1009->1015 1010->1009 1011->1010 1018 13f0656b1-13f0656b3 1013->1018 1019 13f06565a 1013->1019 1014->959 1014->1015 1015->1003 1018->989 1023 13f06565d-13f065674 call 13f06ba80 1019->1023 1031 13f0656a8-13f0656ae GetLastError 1023->1031 1032 13f065676-13f065680 1023->1032 1031->1018 1033 13f065682-13f065694 call 13f06ba80 1032->1033 1034 13f06569d-13f0656a4 1032->1034 1033->1031 1038 13f065696-13f06569b 1033->1038 1034->1018 1036 13f0656a6 1034->1036 1036->1023 1038->1034
                C-Code - Quality: 51%
                			E0000000113F065528(signed long long __ecx, void* __edi, void* __ebp, signed int* __rax, unsigned int __rbx, signed short* __rdx, void* __r10, void* __r11, long long _a32) {
                				signed short _v72;
                				void* _v84;
                				unsigned int _v88;
                				intOrPtr _v96;
                				intOrPtr _v100;
                				long _v104;
                				signed int _v120;
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				void* _t89;
                				int _t97;
                				long _t98;
                				intOrPtr _t109;
                				signed int _t118;
                				unsigned int _t123;
                				void* _t129;
                				intOrPtr _t151;
                				intOrPtr _t163;
                				unsigned long long _t169;
                				signed int* _t171;
                				unsigned int _t172;
                				signed short* _t185;
                				signed short* _t188;
                				long _t189;
                				void* _t191;
                				void* _t198;
                				void* _t201;
                				signed long long _t202;
                				void* _t203;
                				signed long long _t205;
                				void* _t206;
                				signed short* _t207;
                				signed long long _t209;
                
                				_t201 = __r11;
                				_t185 = __rdx;
                				_t172 = __rbx;
                				_t129 = __edi;
                				_a32 = __rbx;
                				r14d = r8d;
                				_t188 = __rdx;
                				_t202 = __ecx;
                				if (r8d == 0) goto 0x3f0657e8;
                				if (__rdx != 0) goto 0x3f065576;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f0657ea;
                				_t205 = _t202 >> 6;
                				_t209 = _t202 + _t202 * 8;
                				sil =  *((intOrPtr*)(0x3f0917a0 + 0x39 + _t209 * 8));
                				if (_t189 - 1 - 1 > 0) goto 0x3f0655a7;
                				if (( !r14d & 0x00000001) == 0) goto 0x3f065556;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x38 + _t209 * 8) & 0x00000020) == 0) goto 0x3f0655bd;
                				_t17 = _t185 + 2; // 0x2
                				r8d = _t17;
                				E0000000113F06495C(__rbx, __rdx, _t189);
                				_v88 = _t172;
                				if (E0000000113F06B9B8(r12d, _t202) == 0) goto 0x3f0656d6;
                				_t163 =  *((intOrPtr*)(0x3f0917a0 + _t205 * 8));
                				if ( *(0x3f0917a0 + 0x38 + _t209 * 8) >= 0) goto 0x3f0656d6;
                				E0000000113F06699C(_t163, _t172,  *((intOrPtr*)(0x3f0917a0 + _t205 * 8)), _t185, _t189, _t198);
                				if ( *((intOrPtr*)( *((intOrPtr*)(_t163 + 0x90)) + 0x138)) != _t172) goto 0x3f065614;
                				if ( *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x39 + _t209 * 8)) == 0) goto 0x3f0656d6;
                				if (GetConsoleMode(??, ??) == 0) goto 0x3f0656d6;
                				if (sil == 0) goto 0x3f0656b8;
                				sil = sil - 1;
                				if (sil - 1 > 0) goto 0x3f065774;
                				_t203 = _t188 + _t206;
                				_v104 = _t189;
                				_t207 = _t188;
                				if (_t188 - _t203 >= 0) goto 0x3f0656b1;
                				_v72 =  *_t207 & 0x0000ffff;
                				_t89 = E0000000113F06BA80( *_t207 & 0xffff);
                				_t118 = _v72 & 0x0000ffff;
                				if (_t89 != _t118) goto 0x3f0656a8;
                				_t109 = _v100 + 2;
                				_v100 = _t109;
                				if (_t118 != 0xa) goto 0x3f06569d;
                				if (E0000000113F06BA80(0xd) != 0xd) goto 0x3f0656a8;
                				_v100 = _t109 + 1;
                				if ( &(_t207[1]) - _t203 >= 0) goto 0x3f0656b1;
                				goto 0x3f06565d;
                				_v104 = GetLastError();
                				goto 0x3f06576a;
                				r9d = r14d;
                				E0000000113F064BDC(_t91, r12d, 1,  &(_t207[1]) - _t203, _t172,  &_v104,  &_v72, _t188, __r10);
                				asm("movsd xmm0, [eax]");
                				goto 0x3f06576f;
                				if ( *( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x38 + _t209 * 8) -  *0x13F0917A8 >= 0) goto 0x3f065737;
                				_t151 = sil;
                				if (_t151 == 0) goto 0x3f065723;
                				if (_t151 == 0) goto 0x3f06570f;
                				if (sil - 1 != 1) goto 0x3f065774;
                				r9d = r14d;
                				E0000000113F0651B0( *0x13F0917A8, sil - 1, r12d, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r9d = r14d;
                				E0000000113F0652CC(sil - 1, r12d, _t129, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r9d = r14d;
                				E0000000113F0650AC( *0x13F0917A8, r12d, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r8d = r14d;
                				_v120 = _v120 & 0x3f0917a0;
                				_v104 = 0x3f0917a0;
                				_v96 = 0;
                				_t97 = WriteFile(??, ??, ??, ??, ??); // executed
                				if (_t97 != 0) goto 0x3f065767;
                				_t98 = GetLastError();
                				_v104 = _t98;
                				asm("movsd xmm0, [ebp-0x30]");
                				asm("movsd [ebp-0x20], xmm0");
                				_t169 = _v88 >> 0x20;
                				if (_t98 != 0) goto 0x3f0657e1;
                				_t123 = _v88;
                				if (_t123 == 0) goto 0x3f0657b1;
                				if (_t123 != 5) goto 0x3f0657a7;
                				E0000000113F05DEB4(_t169);
                				 *_t169 = 9;
                				E0000000113F05DE94(_t169);
                				 *_t169 = 5;
                				goto 0x3f06556e;
                				E0000000113F05DE44(_t123, _t169, _t172);
                				goto 0x3f06556e;
                				_t171 =  *((intOrPtr*)(0x3f0917a0 + _t205 * 8));
                				if (( *(0x3f0917a0 + 0x38 + _t209 * 8) & 0x00000040) == 0) goto 0x3f0657c9;
                				if ( *_t188 == 0x1a) goto 0x3f0657e8;
                				E0000000113F05DEB4(_t171);
                				 *0x3f0917a0 = 0x1c;
                				E0000000113F05DE94(_t171);
                				 *_t171 =  *_t171 & 0x00000000;
                				goto 0x3f06556e;
                				goto 0x3f0657ea;
                				return 0;
                			}





































                0x13f065528
                0x13f065528
                0x13f065528
                0x13f065528
                0x13f065528
                0x13f06553f
                0x13f065542
                0x13f065545
                0x13f06554b
                0x13f065554
                0x13f065556
                0x13f06555b
                0x13f06555e
                0x13f065563
                0x13f065569
                0x13f065571
                0x13f065586
                0x13f06558a
                0x13f065592
                0x13f06559c
                0x13f0655a5
                0x13f0655ad
                0x13f0655b4
                0x13f0655b4
                0x13f0655b8
                0x13f0655c2
                0x13f0655cd
                0x13f0655da
                0x13f0655e3
                0x13f0655e9
                0x13f0655fc
                0x13f06560e
                0x13f065630
                0x13f065639
                0x13f06563b
                0x13f065642
                0x13f06564a
                0x13f06564e
                0x13f065652
                0x13f065658
                0x13f065664
                0x13f065668
                0x13f06566d
                0x13f065674
                0x13f065676
                0x13f065679
                0x13f065680
                0x13f065694
                0x13f065698
                0x13f0656a4
                0x13f0656a6
                0x13f0656ae
                0x13f0656b3
                0x13f0656b8
                0x13f0656c5
                0x13f0656ca
                0x13f0656d1
                0x13f0656e6
                0x13f0656ec
                0x13f0656ef
                0x13f0656f4
                0x13f0656f9
                0x13f0656fb
                0x13f065708
                0x13f06570d
                0x13f06570f
                0x13f06571c
                0x13f065721
                0x13f065723
                0x13f065730
                0x13f065735
                0x13f065742
                0x13f065745
                0x13f06574d
                0x13f065751
                0x13f065754
                0x13f06575c
                0x13f06575e
                0x13f065764
                0x13f06576a
                0x13f06576f
                0x13f065778
                0x13f06577e
                0x13f065780
                0x13f065785
                0x13f06578a
                0x13f06578c
                0x13f065791
                0x13f065797
                0x13f06579c
                0x13f0657a2
                0x13f0657a7
                0x13f0657ac
                0x13f0657b8
                0x13f0657c2
                0x13f0657c7
                0x13f0657c9
                0x13f0657ce
                0x13f0657d4
                0x13f0657d9
                0x13f0657dc
                0x13f0657e6
                0x13f065801

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                • String ID:
                • API String ID: 2210144848-0
                • Opcode ID: bc1f743b9c0a1a252fb222de23ce953d4e7556d384d1b8457ca2d1eaf71d8965
                • Instruction ID: 6d3855ced312ffaa81fd11c56e2df80a8fd8076b5ea610e8d057dfacabba5a8c
                • Opcode Fuzzy Hash: bc1f743b9c0a1a252fb222de23ce953d4e7556d384d1b8457ca2d1eaf71d8965
                • Instruction Fuzzy Hash: D981CE32F1161089FB289BA998503FD67A3F744BA8F64413AFE0A537A3DB348643C710
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1098 13f067ccc-13f067d09 1099 13f067eb4-13f067ebf call 13f05deb4 1098->1099 1100 13f067d0f-13f067d15 1098->1100 1106 13f067ec3-13f067edf call 13f058680 1099->1106 1100->1099 1101 13f067d1b-13f067d23 1100->1101 1101->1099 1103 13f067d29-13f067d2c 1101->1103 1103->1099 1105 13f067d32-13f067d43 1103->1105 1107 13f067d45-13f067d4e call 13f067c6c 1105->1107 1108 13f067d6d-13f067d71 1105->1108 1107->1099 1115 13f067d54-13f067d57 1107->1115 1108->1099 1112 13f067d77-13f067d7b 1108->1112 1112->1099 1114 13f067d81-13f067d85 1112->1114 1114->1099 1116 13f067d8b-13f067d9b call 13f067c6c 1114->1116 1115->1099 1118 13f067d5d-13f067d60 1115->1118 1121 13f067da4 call 13f06df4c 1116->1121 1122 13f067d9d-13f067da0 1116->1122 1118->1099 1120 13f067d66 1118->1120 1120->1108 1125 13f067da9-13f067dc0 call 13f06d518 1121->1125 1122->1121 1123 13f067da2 1122->1123 1123->1121 1128 13f067dc6-13f067dd1 call 13f06d548 1125->1128 1129 13f067ee0-13f067ef7 call 13f063638 1125->1129 1128->1129 1134 13f067dd7-13f067de2 call 13f06d578 1128->1134 1134->1129 1137 13f067de8-13f067e79 1134->1137 1138 13f067eaf-13f067eb2 1137->1138 1139 13f067e7b-13f067e95 1137->1139 1138->1106 1140 13f067e97-13f067e9b 1139->1140 1141 13f067eaa-13f067ead 1139->1141 1140->1141 1142 13f067e9d-13f067ea8 call 13f06df8c 1140->1142 1141->1106 1142->1138 1142->1141
                C-Code - Quality: 97%
                			E0000000113F067CCC(signed int __edx, void* __edi, void* __rcx, void* __rdx, intOrPtr _a40, intOrPtr _a48, intOrPtr _a56) {
                				signed int _v80;
                				intOrPtr _v92;
                				intOrPtr _v100;
                				intOrPtr _v104;
                				signed long long _v112;
                				intOrPtr _v116;
                				char _v120;
                				char _v124;
                				char _v128;
                				char _v132;
                				unsigned int _v136;
                				void* _t54;
                				intOrPtr _t67;
                				signed long long _t86;
                				intOrPtr _t88;
                				signed long long _t110;
                				signed long long _t111;
                				signed long long _t118;
                				void* _t120;
                				signed long long _t138;
                				void* _t143;
                
                				_t110 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t111 = _t110 ^ _t143 - 0x00000078;
                				_v80 = _t111;
                				_t67 = __rcx - 0x76c;
                				_t86 = r8d;
                				_v136 = r9d;
                				_t138 = __edx;
                				if (_t67 - 0x46 < 0) goto 0x3f067eb4;
                				if (_t67 - 0x44d > 0) goto 0x3f067eb4;
                				r15d = __edx - 1;
                				if (r15d - 0xb > 0) goto 0x3f067eb4;
                				if (r8d <= 0) goto 0x3f067eb4;
                				if (r8d -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4)) -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4 - 4)) <= 0) goto 0x3f067d6d;
                				if (E0000000113F067C6C(_t67, r8d -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4)) -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4 - 4))) == 0) goto 0x3f067eb4;
                				if (__edi != 2) goto 0x3f067eb4;
                				if (_t86 - 0x1d > 0) goto 0x3f067eb4;
                				if (_v136 - 0x17 > 0) goto 0x3f067eb4;
                				if (r13d - 0x3b > 0) goto 0x3f067eb4;
                				if (r12d - 0x3b > 0) goto 0x3f067eb4;
                				_t54 = E0000000113F067C6C(_t67, r12d - 0x3b);
                				r14d = 0;
                				if (_t54 == 0) goto 0x3f067da4;
                				if (__edi - 2 <= 0) goto 0x3f067da4;
                				_t88 = _t86 +  *((intOrPtr*)(0x3f07d8a8 + _t138 * 4 - 4)) + 1; // executed
                				E0000000113F06DF4C(_t111); // executed
                				_v124 = r14d;
                				_v128 = r14d;
                				_v132 = r14d;
                				if (E0000000113F06D518(_t111,  &_v124) != 0) goto 0x3f067ee0;
                				if (E0000000113F06D548(_t111,  &_v128) != 0) goto 0x3f067ee0;
                				if (E0000000113F06D578(_t111,  &_v132) != 0) goto 0x3f067ee0;
                				r8d = _t120 - 1;
                				r10d = 0x51eb851f;
                				r9d = r10d * (_t120 + 0x12b) >> 0x20;
                				r9d = r9d >> 7;
                				r9d = r9d + (r9d >> 0x1f);
                				r9d = r9d - (r10d * r8d >> 0x20 >> 5) + (r10d * r8d >> 0x20 >> 5 >> 0x1f);
                				asm("cdq");
                				if (_a56 == 1) goto 0x3f067eaf;
                				_v92 = _t88;
                				_v100 = _t67;
                				_v104 = r15d;
                				_v112 = r8d;
                				_v116 = r13d;
                				_v120 = r12d;
                				if (_a56 != 0xffffffff) goto 0x3f067eaa;
                				if (_v124 == 0) goto 0x3f067eaa;
                				if (E0000000113F06DF8C( &_v120) != 0) goto 0x3f067eaf;
                				goto 0x3f067ec3;
                				_t118 = _v128 + ((_v136 + ((__rdx + _t111 >> 2) + 0xffffffef + r9d + (_t67 - 0x46) * 0x16d + _t88 + ((__rdx + _t111 >> 2) + 0xffffffef + r9d + (_t67 - 0x46) * 0x16d + _t88) * 2) * 8) * 0x3c + _a40) * 0x3c + _v132 + _a48;
                				goto 0x3f067ec3;
                				E0000000113F05DEB4(_t118);
                				 *_t118 = 0x16;
                				return E0000000113F058680((__rdx + _t111 >> 2) + 0xffffffef + r9d, _t118 | 0xffffffff, _v80 ^ _t143 - 0x00000078);
                			}
























                0x13f067ce0
                0x13f067ce7
                0x13f067cea
                0x13f067cf2
                0x13f067cfc
                0x13f067cff
                0x13f067d03
                0x13f067d09
                0x13f067d15
                0x13f067d1b
                0x13f067d23
                0x13f067d2c
                0x13f067d43
                0x13f067d4e
                0x13f067d57
                0x13f067d60
                0x13f067d71
                0x13f067d7b
                0x13f067d85
                0x13f067d91
                0x13f067d96
                0x13f067d9b
                0x13f067da0
                0x13f067da2
                0x13f067da4
                0x13f067dad
                0x13f067db1
                0x13f067db5
                0x13f067dc0
                0x13f067dd1
                0x13f067de2
                0x13f067df2
                0x13f067df6
                0x13f067e04
                0x13f067e0a
                0x13f067e1e
                0x13f067e28
                0x13f067e2b
                0x13f067e79
                0x13f067e7f
                0x13f067e82
                0x13f067e85
                0x13f067e89
                0x13f067e8d
                0x13f067e91
                0x13f067e95
                0x13f067e9b
                0x13f067ea8
                0x13f067ead
                0x13f067eaf
                0x13f067eb2
                0x13f067eb4
                0x13f067eb9
                0x13f067edf

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight$_isindst
                • String ID:
                • API String ID: 4170891091-0
                • Opcode ID: d72cd05f9d71bc8b8cce3d7f2f67f565c79c7d641685d878663712710c1f8cc9
                • Instruction ID: f217fab75c844adfd3d635fd0a2df7caf1185f86214f3f9f0221ee03de021fe5
                • Opcode Fuzzy Hash: d72cd05f9d71bc8b8cce3d7f2f67f565c79c7d641685d878663712710c1f8cc9
                • Instruction Fuzzy Hash: DD51C772F012108AFB2CDB6C99857EC27A7E744368F70013EFD1956AD6DB389A478700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 60%
                			E0000000113F05E288(intOrPtr __edx, long long __rbx, void* __rcx, void* __r8, intOrPtr* __r9, long long _a16) {
                				signed int _v56;
                				signed int _v76;
                				intOrPtr _v80;
                				intOrPtr _v92;
                				intOrPtr _v100;
                				intOrPtr _v108;
                				char _v112;
                				signed int _v120;
                				signed long long _v128;
                				long long _v136;
                				void* __rsi;
                				void* __rbp;
                				long _t38;
                				intOrPtr _t41;
                				int _t43;
                				signed int _t48;
                				intOrPtr _t61;
                				long _t62;
                				signed long long _t80;
                				signed long long _t81;
                				intOrPtr* _t83;
                				intOrPtr _t92;
                				signed int* _t97;
                				void* _t105;
                
                				_a16 = __rbx;
                				_t80 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t81 = _t80 ^ _t105 - 0x00000080;
                				_v56 = _t81;
                				_t83 = __r9;
                				r14d = __edx; // executed
                				_t38 = GetFileType(??); // executed
                				r15d = 1;
                				asm("btr ecx, 0xf");
                				if (_t38 != r15d) goto 0x3f05e38e;
                				 *((intOrPtr*)(__r9 + 8)) = r15w;
                				if (__rcx == 0) goto 0x3f05e302;
                				_v120 = _v120 & 0x00000000;
                				_t97 =  &_v120;
                				if (E0000000113F05E600(__rcx, _t97, __r8) == 0) goto 0x3f05e3a5;
                				_t41 = _v120 - 1;
                				 *((intOrPtr*)(__r9 + 0x10)) = _t41;
                				 *__r9 = _t41;
                				_t10 = _t97 + 0x34; // 0x34
                				r8d = _t10;
                				E0000000113F0597D0(_t41, 0,  &_v112, _t97, __r8);
                				_t43 = GetFileInformationByHandle(??, ??); // executed
                				if (_t43 == 0) goto 0x3f05e3a9;
                				_t61 = _v112;
                				_t99 = __rcx;
                				 *((short*)(_t83 + 6)) = E0000000113F05E4C4(_t61, _t83, __rcx, __r8, _t105);
                				E0000000113F05E42C(_t61, _v92, _t99); // executed
                				 *(_t83 + 0x20) = _t81;
                				E0000000113F05E42C(_t61, _v100, _t81); // executed
                				_t92 = _v108;
                				 *(_t83 + 0x18) = _t81;
                				E0000000113F05E42C(_t61, _t92,  *(_t83 + 0x20)); // executed
                				 *(_t83 + 0x28) = _t81;
                				 *(_t83 + 0x14) =  *(_t83 + 0x14) & 0x00000000;
                				if (_v80 != 0) goto 0x3f05e381;
                				_t48 = _v76;
                				if (_t48 - 0x7fffffff > 0) goto 0x3f05e381;
                				 *(_t83 + 0x14) = _t48;
                				goto 0x3f05e405;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 0x84;
                				goto 0x3f05e3a5;
                				_t26 = _t92 - 2; // -2
                				if (_t26 - r15d <= 0) goto 0x3f05e3b8;
                				if (_t61 != 0) goto 0x3f05e3a9;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 9;
                				goto 0x3f05e408;
                				_t62 = GetLastError();
                				E0000000113F05DE44(_t62, _t81, _t83);
                				goto 0x3f05e3a5;
                				 *((intOrPtr*)(_t83 + 8)) = r15w;
                				 *((intOrPtr*)(_t83 + 0x10)) = r14d;
                				 *_t83 = r14d;
                				_t56 =  ==  ? 0x2000 : 0x1000;
                				 *((short*)(_t83 + 6)) =  ==  ? 0x2000 : 0x1000;
                				if (_t62 == 2) goto 0x3f05e405;
                				_v128 = _v128 & 0x00000000;
                				_v136 =  &_v120;
                				r9d = 0;
                				r8d = 0;
                				if (PeekNamedPipe(??, ??, ??, ??, ??, ??) == 0) goto 0x3f05e405;
                				 *(_t83 + 0x14) = _v120;
                				return E0000000113F058680(_v120, _t81, _v56 ^ _t105 - 0x00000080);
                			}



























                0x13f05e288
                0x13f05e29e
                0x13f05e2a5
                0x13f05e2a8
                0x13f05e2af
                0x13f05e2b8
                0x13f05e2bb
                0x13f05e2c3
                0x13f05e2c9
                0x13f05e2d0
                0x13f05e2d6
                0x13f05e2de
                0x13f05e2e0
                0x13f05e2e4
                0x13f05e2f2
                0x13f05e2fb
                0x13f05e2fd
                0x13f05e300
                0x13f05e308
                0x13f05e308
                0x13f05e30c
                0x13f05e318
                0x13f05e320
                0x13f05e326
                0x13f05e329
                0x13f05e337
                0x13f05e33b
                0x13f05e347
                0x13f05e34b
                0x13f05e354
                0x13f05e358
                0x13f05e35c
                0x13f05e361
                0x13f05e365
                0x13f05e36d
                0x13f05e36f
                0x13f05e377
                0x13f05e379
                0x13f05e37c
                0x13f05e381
                0x13f05e386
                0x13f05e38c
                0x13f05e38e
                0x13f05e394
                0x13f05e398
                0x13f05e39a
                0x13f05e39f
                0x13f05e3a7
                0x13f05e3af
                0x13f05e3b1
                0x13f05e3b6
                0x13f05e3bb
                0x13f05e3c5
                0x13f05e3ce
                0x13f05e3d1
                0x13f05e3d5
                0x13f05e3d9
                0x13f05e3db
                0x13f05e3e5
                0x13f05e3ea
                0x13f05e3f0
                0x13f05e3fd
                0x13f05e402
                0x13f05e42a

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                • String ID:
                • API String ID: 2780335769-0
                • Opcode ID: fc8ef600d8b44ffe79ffca64d72736d438c134a100b0f67cb29c755305dde9f2
                • Instruction ID: 5df046adaddbf8deca1743e5238b5bbd90499abfca43bf200a4fe3e874e9d2d4
                • Opcode Fuzzy Hash: fc8ef600d8b44ffe79ffca64d72736d438c134a100b0f67cb29c755305dde9f2
                • Instruction Fuzzy Hash: B2417E32A08640C6FB18DF79D5483ED33A2AB44B88F154439EE8D4768ADB78C646C754
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 35%
                			E0000000113F051000(long long __rax, long long __rcx, void* __r8, void* __r9) {
                				void* __rbx;
                				void* __rbp;
                				void* _t12;
                				void* _t18;
                				long long _t25;
                				long long _t30;
                				long long _t34;
                				void* _t37;
                				void* _t40;
                				void* _t43;
                				void* _t45;
                				void* _t47;
                				void* _t48;
                				void* _t52;
                				void* _t55;
                
                				_t51 = __r9;
                				_t50 = __r8;
                				_t30 = __rcx;
                				_t25 = __rax;
                				E0000000113F05A4E0(E0000000113F055180(E0000000113F05A4E0(E0000000113F05A4E8(_t12)),  *_t25, _t25,  *_t25));
                				_t34 = _t25;
                				_t47 = _t45 - 0x20 + 0x20;
                				_pop(_t28);
                				goto 0x3f0529d0;
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				 *((long long*)(_t47 + 0x10)) = _t34;
                				 *((long long*)(_t47 + 8)) = _t30;
                				_t48 = _t47 - 0x88;
                				_t29 = _t34;
                				 *((long long*)(_t48 + 0x50)) = _t25;
                				 *((long long*)(_t48 + 0x58)) = _t25;
                				 *((long long*)(_t48 + 0x60)) = _t25;
                				_t6 = _t25 + 0x58; // 0x58
                				r8d = _t6;
                				 *((intOrPtr*)(_t48 + 0x28)) = 0;
                				 *((long long*)(_t48 + 0x20)) = _t25;
                				_t18 = E0000000113F057370(_t25, _t34, _t48 + 0x20, "1.2.11", _t43, _t55); // executed
                				r15d = _t18;
                				if (_t18 == 0) goto 0x3f0510c3;
                				r8d = _t18;
                				E0000000113F051DD0(_t25, "Failed to extract %s: inflateInit() failed with return code %d!\n", _t29 + 0x12, _t50, _t51, _t52, _t37, _t40, _t43);
                				_t11 = _t43 - 1; // -1
                				return _t11;
                			}


















                0x13f051000
                0x13f051000
                0x13f051000
                0x13f051000
                0x13f051020
                0x13f051025
                0x13f05102a
                0x13f05102e
                0x13f05102f
                0x13f051034
                0x13f051035
                0x13f051036
                0x13f051037
                0x13f051038
                0x13f051039
                0x13f05103a
                0x13f05103b
                0x13f05103c
                0x13f05103d
                0x13f05103e
                0x13f05103f
                0x13f051040
                0x13f051045
                0x13f051052
                0x13f05105e
                0x13f051061
                0x13f051069
                0x13f051075
                0x13f05107a
                0x13f05107a
                0x13f05107e
                0x13f051087
                0x13f051091
                0x13f051096
                0x13f05109b
                0x13f0510a1
                0x13f0510ab
                0x13f0510b0
                0x13f0510c2

                APIs
                  • Part of subcall function 000000013F052D20: GetModuleFileNameW.KERNEL32(?,000000013F052A30), ref: 000000013F052D51
                • SetDllDirectoryW.KERNEL32 ref: 000000013F052B22
                  • Part of subcall function 000000013F054490: GetEnvironmentVariableW.KERNEL32(000000013F052A70), ref: 000000013F0544CA
                  • Part of subcall function 000000013F054490: ExpandEnvironmentStringsW.KERNEL32 ref: 000000013F0544E7
                  • Part of subcall function 000000013F054AF0: SetEnvironmentVariableW.KERNEL32(00000000,000000013F052A7F), ref: 000000013F054B0F
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Environment$Variable$DirectoryExpandFileMessageModuleNameStrings
                • String ID: Cannot open self %s or archive %s$_MEIPASS2
                • API String ID: 2418257720-930416966
                • Opcode ID: 21d5d9693f2d6ecb79cd1d2d906e3b5171e8b21b4eeb3f0853cabd04a082e912
                • Instruction ID: be53e6809965bd585d6bcdd22ee6825968f3fa68aca584083275057845ff3d02
                • Opcode Fuzzy Hash: 21d5d9693f2d6ecb79cd1d2d906e3b5171e8b21b4eeb3f0853cabd04a082e912
                • Instruction Fuzzy Hash: 1C616031B08684D2FE2DAB6995593EAA397AB847C4F444039FA4D47787EFA8C707C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 20%
                			E0000000113F06602C(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, void* __r8, long long _a8, long long _a16, long long _a24, long long _a40, intOrPtr _a48, long long _a56, long long _a64, long long _a72) {
                				long long _v24;
                				long long _v32;
                				long long _v40;
                				intOrPtr _v48;
                				long long _v56;
                				void* _t26;
                				void* _t38;
                				void* _t53;
                
                				_t40 = __rbx;
                				_t38 = __rax;
                				_a8 = __rbx;
                				_a16 = __rbp;
                				_a24 = __rsi;
                				_t26 = r9d;
                				_t53 = __rcx;
                				E0000000113F065B5C(0x14, __rbx, "LCMapStringEx", __rsi, 0x3f078640, "LCMapStringEx"); // executed
                				if (_t38 == 0) goto 0x3f0660c1;
                				r9d = _t26;
                				_v24 = _a72;
                				_v32 = _a64;
                				_v40 = _a56;
                				_v48 = _a48;
                				_v56 = _a40;
                				 *0x3f072350();
                				goto 0x3f0660f3;
                				E0000000113F066108(0, 0, _t38, _t40, _t53);
                				r9d = _t26;
                				_v48 = _a48;
                				_v56 = _a40;
                				return LCMapStringW(??, ??, ??, ??, ??, ??);
                			}











                0x13f06602c
                0x13f06602c
                0x13f06602c
                0x13f066031
                0x13f066036
                0x13f066040
                0x13f06604f
                0x13f066065
                0x13f06606d
                0x13f066077
                0x13f066084
                0x13f06608c
                0x13f066099
                0x13f0660a5
                0x13f0660b1
                0x13f0660b9
                0x13f0660bf
                0x13f0660c6
                0x13f0660cd
                0x13f0660da
                0x13f0660e8
                0x13f066107

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Stringtry_get_function
                • String ID: LCMapStringEx
                • API String ID: 2588686239-3893581201
                • Opcode ID: 85cdc4dcf88f56ab021be3ad67fb762049591e1a090dd458c10f686554ff6dbc
                • Instruction ID: 2b10b749720e5ee0807af2929fd264fdca316d93fe7d8711c05e687772ccd4ca
                • Opcode Fuzzy Hash: 85cdc4dcf88f56ab021be3ad67fb762049591e1a090dd458c10f686554ff6dbc
                • Instruction Fuzzy Hash: 00114D32608BC086D764CB1AF48039AB7A1F7C9B90F14412AFE8D43B1ADF38C6458B40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 20%
                			E0000000113F05E0F4(long long __rax, long long __rbx, void* __rcx, void* __rdx, long long __rsi, void* __r8, long long _a8, long long _a24) {
                				void* _v40;
                				char _v88;
                				long long _v104;
                				intOrPtr _v112;
                				intOrPtr _v120;
                				signed int _t15;
                				void* _t19;
                				long long _t34;
                				long long _t36;
                				void* _t58;
                
                				_t44 = __rdx;
                				_t34 = __rax;
                				_a8 = __rbx;
                				_a24 = __rsi;
                				if (__rdx != 0) goto 0x3f05e139;
                				E0000000113F05DE94(__rax);
                				 *((intOrPtr*)(__rax)) = 0;
                				E0000000113F05DEB4(__rax);
                				 *((intOrPtr*)(__rax)) = 0x16;
                				_t15 = E0000000113F063618();
                				goto 0x3f05e1e9;
                				r15d = 0x30;
                				r8d = r15d;
                				E0000000113F0597D0(_t15 | 0xffffffff, 0,  &_v88, __rdx, __r8);
                				asm("movups xmm0, [ebp-0x30]");
                				asm("movups xmm1, [ebp-0x20]");
                				asm("movups [edi], xmm0");
                				asm("movups xmm0, [ebp-0x10]");
                				asm("movups [edi+0x10], xmm1");
                				asm("movups [edi+0x20], xmm0");
                				if (__rcx == 0) goto 0x3f05e11a;
                				_v104 = __rsi;
                				_v112 = 0x2000000;
                				r8d = _t58 - 0x29;
                				r9d = 0;
                				_v120 = 3;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??); // executed
                				_t36 = _t34;
                				if (_t34 == 0xffffffff) goto 0x3f05e202;
                				_t19 = E0000000113F05E288(_t58 + 0x00000050 | 0xffffffff, _t36, __rcx, _t34, __rdx); // executed
                				if (_t19 != 0) goto 0x3f05e1d8;
                				E0000000113F0597D0(_t19, 0,  &_v88, _t44, _t58);
                				asm("movups xmm0, [ebp-0x30]");
                				asm("movups xmm1, [ebp-0x20]");
                				asm("movups [edi], xmm0");
                				asm("movups xmm0, [ebp-0x10]");
                				asm("movups [edi+0x10], xmm1");
                				asm("movups [edi+0x20], xmm0");
                				if (_t36 == 0xffffffff) goto 0x3f05e1e7;
                				CloseHandle(??);
                				return 0xffffffff;
                			}













                0x13f05e0f4
                0x13f05e0f4
                0x13f05e0f4
                0x13f05e0f9
                0x13f05e118
                0x13f05e11a
                0x13f05e11f
                0x13f05e121
                0x13f05e126
                0x13f05e12c
                0x13f05e134
                0x13f05e139
                0x13f05e143
                0x13f05e148
                0x13f05e14d
                0x13f05e151
                0x13f05e155
                0x13f05e158
                0x13f05e15c
                0x13f05e160
                0x13f05e167
                0x13f05e169
                0x13f05e172
                0x13f05e17a
                0x13f05e17e
                0x13f05e181
                0x13f05e18c
                0x13f05e192
                0x13f05e19c
                0x13f05e1a7
                0x13f05e1ae
                0x13f05e1b9
                0x13f05e1be
                0x13f05e1c5
                0x13f05e1c9
                0x13f05e1cc
                0x13f05e1d0
                0x13f05e1d4
                0x13f05e1dc
                0x13f05e1e1
                0x13f05e201

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CloseCreateDriveFileHandleType_invalid_parameter_noinfo
                • String ID:
                • API String ID: 2907017715-0
                • Opcode ID: 473a5552467add6b6ccaeebbd9ebddf6c15bba23c4770aa496e9ac3e70390568
                • Instruction ID: 0523c1878ce527ac40272c3772e556643139cd68a5a25f8d085d123d64819036
                • Opcode Fuzzy Hash: 473a5552467add6b6ccaeebbd9ebddf6c15bba23c4770aa496e9ac3e70390568
                • Instruction Fuzzy Hash: 3241F132E0875086F7189F3999047D82762F7587A8F009728FFAD13AC7DB789292C704
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F0586A4(intOrPtr* __rax) {
                				void* __rbx;
                				void* _t2;
                				intOrPtr _t6;
                				void* _t20;
                				intOrPtr* _t32;
                				void* _t33;
                				void* _t34;
                				void* _t37;
                				void* _t38;
                
                				_t32 = __rax;
                				E0000000113F0613A0(_t2, 2);
                				E0000000113F05F130(E0000000113F058EB0(), __rax, _t34);
                				_t6 = E0000000113F054D40();
                				E0000000113F062288(_t6);
                				 *_t32 = _t6;
                				if (E0000000113F058C34(1, _t32) == 0) goto 0x3f05874f;
                				E0000000113F059164(_t33);
                				E0000000113F058DE4(E0000000113F058C34(1, _t32), _t32);
                				if (E0000000113F06162C(E0000000113F058EA8(), _t32, _t33, E0000000113F0591A0, _t37, _t38) != 0) goto 0x3f05874f;
                				E0000000113F058EB8();
                				if (E0000000113F058EF0() == 0) goto 0x3f058717;
                				E0000000113F0529C0(E0000000113F0529C0(E0000000113F061400(_t13, 0x13f054d40)));
                				E0000000113F0621E8(E0000000113F054D40(), _t32, 0x13f054d40);
                				if (E0000000113F058EC8() == 0) goto 0x3f05873b; // executed
                				0x3f061d54(); // executed
                				_t20 = E0000000113F054D40();
                				0x3f05909c();
                				if (_t20 != 0) goto 0x3f05874f;
                				return _t20;
                			}












                0x13f0586a4
                0x13f0586af
                0x13f0586bb
                0x13f0586c0
                0x13f0586c7
                0x13f0586d1
                0x13f0586da
                0x13f0586dc
                0x13f0586e8
                0x13f0586fb
                0x13f0586fd
                0x13f058709
                0x13f05871c
                0x13f058728
                0x13f058734
                0x13f058736
                0x13f05873b
                0x13f058740
                0x13f058747
                0x13f05874e

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Initialize__scrt_fastfail_invalid_parameter_noinfo_set_fmode
                • String ID:
                • API String ID: 1714861634-0
                • Opcode ID: 4ca034c3268443245ee24b29e896d00d50891b666733e8bc72cb19cc8a401450
                • Instruction ID: 08b860cebe7163ced5e95ab3608d0e8e50fe7e28ebc5d11f88a216289a9cbcd7
                • Opcode Fuzzy Hash: 4ca034c3268443245ee24b29e896d00d50891b666733e8bc72cb19cc8a401450
                • Instruction Fuzzy Hash: 8B119234E08119C1FE5D77BD8A9F3E902938F94355F50043CB95D8A6D3EEA88B474262
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 21%
                			E0000000113F062018() {
                				void* _t3;
                				void* _t8;
                
                				_t3 = E0000000113F06AD4C(); // executed
                				if (_t3 == 1) goto 0x3f062052;
                				if (( *( *[gs:0x60] + 0xbc) >> 0x00000008 & 0x00000001) != 0) goto 0x3f062052;
                				GetCurrentProcess();
                				E0000000113F062064(TerminateProcess(??, ??), _t8,  *[gs:0x60]);
                				ExitProcess(??);
                			}





                0x13f062020
                0x13f062028
                0x13f06203f
                0x13f062041
                0x13f062054
                0x13f06205b

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: d8a0b14cd86ab3ec898dca1a1510d615acac720a3763545de0ced35dc975d291
                • Instruction ID: e95f9d17d26043adfb3077e07a75581413dc5bcd712088bdb5dddd3dc75e117d
                • Opcode Fuzzy Hash: d8a0b14cd86ab3ec898dca1a1510d615acac720a3763545de0ced35dc975d291
                • Instruction Fuzzy Hash: DCE09A30B0070486FE5C6B299D953A923A3FB98751F20547CA94646753CE3DD64BCA11
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 63%
                			E0000000113F06A410(long long __rbx, void* __rcx, long long __rsi) {
                				void* _t97;
                				signed int _t99;
                				signed int _t120;
                				signed long long _t125;
                				long long _t129;
                				char* _t135;
                				void* _t136;
                				void* _t141;
                				signed char* _t145;
                				signed char* _t146;
                				void* _t147;
                				long long _t148;
                				int _t151;
                				void* _t152;
                				void* _t154;
                				signed long long _t155;
                				void* _t157;
                				void* _t160;
                				void* _t161;
                
                				_t148 = __rsi;
                				 *((long long*)(_t154 + 0x10)) = __rbx;
                				 *((long long*)(_t154 + 0x18)) = __rsi;
                				_t152 = _t154 - 0x680;
                				_t155 = _t154 - 0x780;
                				_t125 =  *0x3f082018; // 0x3bece1c8a3ca
                				 *(_t152 + 0x670) = _t125 ^ _t155;
                				if ( *((intOrPtr*)(__rcx + 4)) == 0xfde9) goto 0x3f06a58c;
                				if (GetCPInfo(_t151) == 0) goto 0x3f06a58c;
                				_t135 = _t155 + 0x70;
                				 *_t135 = 0;
                				_t136 = _t135 + 1;
                				if (1 - 0x100 < 0) goto 0x3f06a46c;
                				_t141 = _t155 + 0x56;
                				 *((char*)(_t155 + 0x70)) = 0x20;
                				goto 0x3f06a4a9;
                				r8d =  *(_t141 + 1) & 0x000000ff;
                				_t99 =  *(_t155 + 0x56) & 0x000000ff;
                				goto 0x3f06a49e;
                				if (_t99 - 0x100 >= 0) goto 0x3f06a4a3;
                				 *((char*)(_t155 + _t136 + 0x70)) = 0x20;
                				if (_t99 + 1 - r8d <= 0) goto 0x3f06a491;
                				_t118 =  *((intOrPtr*)(_t141 + 2));
                				if ( *((intOrPtr*)(_t141 + 2)) != 0) goto 0x3f06a487;
                				_t157 = _t155 + 0x70;
                				 *(_t155 + 0x30) =  *(_t155 + 0x30) & 0x00000000;
                				r9d = 0x100;
                				 *((intOrPtr*)(_t155 + 0x28)) =  *((intOrPtr*)(__rcx + 4));
                				 *(_t155 + 0x20) = _t152 + 0x270;
                				E0000000113F06B0C0(1,  *((intOrPtr*)(_t141 + 2)), __rcx, _t136, _t147, __rsi, _t157, _t160, _t161);
                				 *(_t155 + 0x40) =  *(_t155 + 0x40) & 0x00000000;
                				r8d = 0x100;
                				 *((intOrPtr*)(_t155 + 0x38)) =  *((intOrPtr*)(__rcx + 4));
                				 *(_t155 + 0x30) = 0x100;
                				 *((long long*)(_t155 + 0x28)) = _t152 + 0x70;
                				 *(_t155 + 0x20) = 0x100;
                				E0000000113F06FA58(_t97, 0, 1,  *((intOrPtr*)(_t141 + 2)), _t152 + 0x70, __rcx, _t136,  *((intOrPtr*)(__rcx + 0x220)), _t148, _t155 + 0x70, _t160, _t161); // executed
                				 *(_t155 + 0x40) =  *(_t155 + 0x40) & 0x00000000;
                				r8d = 0x200;
                				 *((intOrPtr*)(_t155 + 0x38)) =  *((intOrPtr*)(__rcx + 4));
                				_t129 = _t152 + 0x170;
                				 *(_t155 + 0x30) = 0x100;
                				 *((long long*)(_t155 + 0x28)) = _t129;
                				 *(_t155 + 0x20) = 0x100;
                				E0000000113F06FA58(_t97, 0, 1, _t118, _t129, __rcx, _t136,  *((intOrPtr*)(__rcx + 0x220)), _t148, _t155 + 0x70, _t160, _t161);
                				_t145 = _t152 + 0x270;
                				if (( *_t145 & 0x00000001) == 0) goto 0x3f06a561;
                				 *(_t129 + __rcx + 0x18) =  *(_t129 + __rcx + 0x18) | 0x00000010;
                				goto 0x3f06a576;
                				_t120 =  *_t145 & 0x00000002;
                				if (_t120 == 0) goto 0x3f06a574;
                				 *(_t129 + __rcx + 0x18) =  *(_t129 + __rcx + 0x18) | 0x00000020;
                				goto 0x3f06a576;
                				 *((char*)(_t129 + __rcx + 0x118)) = 0;
                				_t146 =  &(_t145[2]);
                				if (_t120 != 0) goto 0x3f06a551;
                				goto 0x3f06a5cf;
                				_t60 =  &(_t146[1]); // 0x1
                				_t61 = _t146 - 0x61; // -97
                				r8d = _t61;
                				_t62 = _t157 + 0x20; // -65
                				if (_t62 - 0x19 > 0) goto 0x3f06a5ad;
                				 *(_t136 + __rcx + 0x18) =  *(_t136 + __rcx + 0x18) | 0x00000010;
                				goto 0x3f06a5bf;
                				if (r8d - 0x19 > 0) goto 0x3f06a5bd;
                				 *(_t136 + __rcx + 0x18) =  *(_t136 + __rcx + 0x18) | 0x00000020;
                				goto 0x3f06a5bf;
                				 *((char*)(_t136 + __rcx + 0x118)) = 0;
                				if (1 - 0x100 < 0) goto 0x3f06a596;
                				return E0000000113F058680(_t60, _t129 + 1,  *(_t152 + 0x670) ^ _t155);
                			}






















                0x13f06a410
                0x13f06a410
                0x13f06a415
                0x13f06a41b
                0x13f06a423
                0x13f06a42a
                0x13f06a434
                0x13f06a447
                0x13f06a45a
                0x13f06a462
                0x13f06a46c
                0x13f06a470
                0x13f06a475
                0x13f06a47b
                0x13f06a480
                0x13f06a485
                0x13f06a487
                0x13f06a48c
                0x13f06a48f
                0x13f06a493
                0x13f06a497
                0x13f06a4a1
                0x13f06a4a9
                0x13f06a4ab
                0x13f06a4b0
                0x13f06a4b5
                0x13f06a4ba
                0x13f06a4bd
                0x13f06a4cf
                0x13f06a4d4
                0x13f06a4d9
                0x13f06a4e6
                0x13f06a4f2
                0x13f06a4fa
                0x13f06a4fe
                0x13f06a503
                0x13f06a507
                0x13f06a50c
                0x13f06a519
                0x13f06a528
                0x13f06a52c
                0x13f06a533
                0x13f06a537
                0x13f06a53c
                0x13f06a540
                0x13f06a54a
                0x13f06a554
                0x13f06a556
                0x13f06a55f
                0x13f06a561
                0x13f06a564
                0x13f06a566
                0x13f06a572
                0x13f06a576
                0x13f06a57d
                0x13f06a588
                0x13f06a58a
                0x13f06a593
                0x13f06a596
                0x13f06a596
                0x13f06a59a
                0x13f06a5a1
                0x13f06a5a3
                0x13f06a5ab
                0x13f06a5b1
                0x13f06a5b3
                0x13f06a5bb
                0x13f06a5bf
                0x13f06a5cd
                0x13f06a5f2

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Info
                • String ID:
                • API String ID: 1807457897-3916222277
                • Opcode ID: 84283770675b39abde34306101d49113749eaddf3cfaacc9ae08736a8dacc304
                • Instruction ID: 7ec0d295fe1abd9d910ffc2544a467a482e392685abdd93c791239a0ae385feb
                • Opcode Fuzzy Hash: 84283770675b39abde34306101d49113749eaddf3cfaacc9ae08736a8dacc304
                • Instruction Fuzzy Hash: 90510972B1C6D086E729DF28E0443DE7BE1F345754F64412DF68957A8ACB38C646CB90
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F065D34() {
                				void* _t4;
                				void* _t7;
                				void* _t11;
                
                				E0000000113F065B5C(0x1c, _t7, "AppPolicyGetProcessTerminationMethod", _t11, 0x3f078674, "AppPolicyGetProcessTerminationMethod"); // executed
                				if (_t4 == 0) goto 0x3f065d77;
                				goto ( *0x3f072350);
                			}






                0x13f065d57
                0x13f065d5f
                0x13f065d70

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: AppPolicyGetProcessTerminationMethod
                • API String ID: 2742660187-2031265017
                • Opcode ID: 60f8f55c1d09f95549388ba841670d9caef90142e0006adc000e97f6f4fdf900
                • Instruction ID: ff35c0ceb1d50f3b052556c5d95ea710cce2da0aae98ff5319d3a09bfc9553bf
                • Opcode Fuzzy Hash: 60f8f55c1d09f95549388ba841670d9caef90142e0006adc000e97f6f4fdf900
                • Instruction Fuzzy Hash: 07E08671F01904E1FE1C47B9A9443E11253D71C774F581779B9380A3D29A388BDBC740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F065E9C() {
                				void* _t4;
                				void* _t7;
                				void* _t10;
                
                				E0000000113F065B5C(3, _t7, "FlsAlloc", _t10, 0x3f078618, 0x3f078620); // executed
                				if (_t4 == 0) goto 0x3f065ed8;
                				goto ( *0x3f072350);
                			}






                0x13f065ebf
                0x13f065ec7
                0x13f065ed1

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: FlsAlloc
                • API String ID: 2742660187-671089009
                • Opcode ID: 37c484a0395dd07e5c7ef60d257afc346ca23f1fe52009b66039b7293385320f
                • Instruction ID: dff309963f684b50f4645d280839f267075f2676b0b97b29e5b141c19e790f58
                • Opcode Fuzzy Hash: 37c484a0395dd07e5c7ef60d257afc346ca23f1fe52009b66039b7293385320f
                • Instruction Fuzzy Hash: CCE0EC71E01908D1FA1D5B99A9513E413A3F70C754F5810B9BA180A2A3EA38879FCB54
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 88%
                			E0000000113F06A8EC(void* __ecx, void* __esp, void* __eflags, signed long long __rbx, void* __rdx, void* __r8, void* __r10, void* _a12, long long _a24) {
                				signed long long _v64;
                				signed int _v76;
                				char _v94;
                				char _v100;
                				void* __rsi;
                				void* __rbp;
                				void* _t50;
                				void* _t86;
                				intOrPtr _t89;
                				void* _t93;
                				void* _t108;
                				signed char _t109;
                				intOrPtr _t111;
                				signed char _t117;
                				void* _t118;
                				signed long long _t120;
                				signed long long _t130;
                				signed long long _t131;
                				signed long long _t135;
                				signed char* _t139;
                				char* _t148;
                				signed char* _t150;
                				void* _t156;
                				void* _t157;
                				void* _t158;
                				void* _t161;
                				signed char* _t163;
                				signed long long _t167;
                
                				_t161 = __r8;
                				_t131 = __rbx;
                				_a24 = __rbx;
                				_t120 =  *0x3f082018; // 0x3bece1c8a3ca
                				_v64 = _t120 ^ _t158 - 0x00000040;
                				_t156 = __rdx;
                				_t50 = E0000000113F06A300(__ecx, __eflags, _t120 ^ _t158 - 0x00000040);
                				_t86 = _t50;
                				if (_t50 == 0) goto 0x3f06ab76;
                				r14d = 0;
                				_t3 = _t131 + 1; // 0x1
                				_t93 = _t3;
                				if ( *0x3f082890 == _t86) goto 0x3f06aa89;
                				r14d = r14d + _t93;
                				if (r14d - 5 < 0) goto 0x3f06a933;
                				if (_t86 == 0xfde8) goto 0x3f06aa81;
                				if (IsValidCodePage(??) == 0) goto 0x3f06aa81;
                				if (_t86 != 0xfde9) goto 0x3f06a99c;
                				 *((long long*)(__rdx + 4)) = 0x13f0828c0;
                				 *((long long*)(__rdx + 0x220)) = __rbx;
                				 *((intOrPtr*)(__rdx + 0x18)) = 0;
                				 *((short*)(__rdx + 0x1c)) = 0;
                				_t8 = _t156 + 0xc; // 0xc
                				memset(_t86, 0, 6);
                				E0000000113F06A410(__rbx, __rdx, __rdx); // executed
                				goto 0x3f06ab7e;
                				_t148 =  &_v100;
                				if (GetCPInfo(??, ??) == 0) goto 0x3f06aa75;
                				_t10 = _t156 + 0x18; // 0x18
                				r8d = 0x101;
                				E0000000113F0597D0(_t56, 0, _t10, _t148, _t161);
                				 *((intOrPtr*)(_t156 + 4)) = _t86 + 6;
                				 *(_t156 + 0x220) = _t131;
                				if (_v100 != 2) goto 0x3f06aa6b;
                				_t139 =  &_v94;
                				if (_v94 == 0) goto 0x3f06aa0e;
                				if (_t139[1] == 0) goto 0x3f06aa0e;
                				_t108 = ( *_t139 & 0x000000ff) - (_t139[1] & 0x000000ff);
                				if (_t108 > 0) goto 0x3f06aa06;
                				 *(_t8 + _t156 + 0x18) =  *(_t8 + _t156 + 0x18) | 0x00000004;
                				_t89 = _t148 + 1 + _t93;
                				if (_t108 != 0) goto 0x3f06a9fa;
                				_t109 = _t139[2];
                				if (_t109 != 0) goto 0x3f06a9e2;
                				_t24 = _t156 + 0x1a; // 0x1a
                				 *_t24 =  *_t24 | 0x00000008;
                				if (_t109 != 0) goto 0x3f06aa17;
                				if (_t109 == 0) goto 0x3f06aa5b;
                				if (_t109 == 0) goto 0x3f06aa52;
                				if (_t109 == 0) goto 0x3f06aa49;
                				if ( *((intOrPtr*)(_t156 + 4)) - 0x393 == _t93) goto 0x3f06aa40;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				_t130 =  *0x3f079338; // 0x13f079358
                				 *(_t156 + 0x220) = _t130;
                				goto 0x3f06aa6d;
                				 *((intOrPtr*)(_t156 + 8)) = 0;
                				goto 0x3f06a980;
                				_t111 =  *0x3f091fe0; // 0x0
                				if (_t111 != 0) goto 0x3f06ab76;
                				goto 0x3f06ab80;
                				_t28 = _t156 + 0x18; // 0x18
                				r8d = 0x101;
                				E0000000113F0597D0((_t139[1] & 0x000000ff) - ( *_t139 & 0x000000ff) | 0xffffffff, 0, _t28, _t148 - _t157, _t161);
                				r14d = 4;
                				_t167 = _t130 + _t130 * 2 << 4;
                				_t163 = 0x13f0828a0 + _t167;
                				_t150 = _t163;
                				if ( *_t163 == 0) goto 0x3f06aaff;
                				if (_t150[1] == 0) goto 0x3f06aaff;
                				r8d =  *_t150 & 0x000000ff;
                				if (r8d - (_t150[1] & 0x000000ff) > 0) goto 0x3f06aaf7;
                				_t34 = _t161 + 1; // 0x81
                				r10d = _t34;
                				if (r10d - 0x101 >= 0) goto 0x3f06aaf7;
                				r8d = r8d;
                				 *(__r10 + _t156 + 0x18) =  *(__r10 + _t156 + 0x18) |  *0x3f082880;
                				r10d = r10d;
                				if (r8d - (_t150[1] & 0x000000ff) <= 0) goto 0x3f06aad7;
                				_t117 = _t150[2];
                				if (_t117 != 0) goto 0x3f06aac1;
                				if (_t117 != 0) goto 0x3f06aab9;
                				 *((intOrPtr*)(_t156 + 4)) = _t89;
                				 *((intOrPtr*)(_t156 + 8)) = 0;
                				if (_t117 == 0) goto 0x3f06ab42;
                				if (_t117 == 0) goto 0x3f06ab39;
                				if (_t117 == 0) goto 0x3f06ab30;
                				_t118 = _t89 - 0x393;
                				if (_t118 != 0) goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				_t135 =  *0x3f079338; // 0x13f079358
                				 *(_t156 + 0x220) = _t135;
                				_t43 = _t156 + 0xc; // 0x10
                				 *_t43 =  *(_t167 - _t156 + 0x3f082890 + _t43 - 8) & 0x0000ffff;
                				if (_t118 != 0) goto 0x3f06ab60;
                				goto 0x3f06a98f;
                				E0000000113F06A380(_t89 - 0x393, __esp + 0xc, _t118, _t130, _t135, _t156, _t43 + 2, _t156);
                				return E0000000113F058680(6, _t130, _v76 ^ _t158 - 0x00000040);
                			}































                0x13f06a8ec
                0x13f06a8ec
                0x13f06a8ec
                0x13f06a900
                0x13f06a90a
                0x13f06a90f
                0x13f06a912
                0x13f06a919
                0x13f06a91d
                0x13f06a92a
                0x13f06a930
                0x13f06a930
                0x13f06a935
                0x13f06a93b
                0x13f06a946
                0x13f06a94e
                0x13f06a95f
                0x13f06a96c
                0x13f06a96e
                0x13f06a972
                0x13f06a979
                0x13f06a97c
                0x13f06a980
                0x13f06a98c
                0x13f06a992
                0x13f06a997
                0x13f06a99c
                0x13f06a9ab
                0x13f06a9b3
                0x13f06a9b7
                0x13f06a9bd
                0x13f06a9c7
                0x13f06a9ca
                0x13f06a9d1
                0x13f06a9d7
                0x13f06a9e0
                0x13f06a9e5
                0x13f06a9ee
                0x13f06a9f0
                0x13f06a9fa
                0x13f06a9ff
                0x13f06aa04
                0x13f06aa0a
                0x13f06aa0c
                0x13f06aa0e
                0x13f06aa17
                0x13f06aa20
                0x13f06aa2b
                0x13f06aa30
                0x13f06aa35
                0x13f06aa39
                0x13f06aa3e
                0x13f06aa47
                0x13f06aa50
                0x13f06aa59
                0x13f06aa5b
                0x13f06aa62
                0x13f06aa69
                0x13f06aa6d
                0x13f06aa70
                0x13f06aa75
                0x13f06aa7b
                0x13f06aa84
                0x13f06aa8b
                0x13f06aa8f
                0x13f06aa95
                0x13f06aaa8
                0x13f06aab2
                0x13f06aab6
                0x13f06aab9
                0x13f06aabf
                0x13f06aac4
                0x13f06aac6
                0x13f06aad1
                0x13f06aad3
                0x13f06aad3
                0x13f06aade
                0x13f06aae3
                0x13f06aae6
                0x13f06aaeb
                0x13f06aaf5
                0x13f06aafb
                0x13f06aafd
                0x13f06ab09
                0x13f06ab0b
                0x13f06ab0e
                0x13f06ab17
                0x13f06ab1c
                0x13f06ab21
                0x13f06ab23
                0x13f06ab25
                0x13f06ab2e
                0x13f06ab37
                0x13f06ab40
                0x13f06ab42
                0x13f06ab4c
                0x13f06ab53
                0x13f06ab65
                0x13f06ab6f
                0x13f06ab71
                0x13f06ab79
                0x13f06aba4

                APIs
                  • Part of subcall function 000000013F06A300: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013F06A624,?,?,?,?,00000000,?,?,000000013F06A8C2), ref: 000000013F06A32A
                • IsValidCodePage.KERNEL32(00000000,00000001,00000000,?,00000000,00000001,?,000000013F06A6D7,?,?,?,?,00000000,?,?,000000013F06A8C2), ref: 000000013F06A957
                • GetCPInfo.KERNEL32(?,000000013F06A6D7,?,?,?,?,00000000,?,?,000000013F06A8C2,?,?,?,?,000000013F0617CE), ref: 000000013F06A9A3
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CodeInfoPageValid
                • String ID:
                • API String ID: 546120528-0
                • Opcode ID: b227e7d3ad4ff2527b227c516facdf3534cd8e7aeb2d123029d3623963e68f84
                • Instruction ID: ca17ade743f08203c9858fe35b0fa00df02dda59099983784433bbe1f363656c
                • Opcode Fuzzy Hash: b227e7d3ad4ff2527b227c516facdf3534cd8e7aeb2d123029d3623963e68f84
                • Instruction Fuzzy Hash: BD819E72B0428086E76DAF2D95543E9B7A3E344760F68413EE68A57693DB78CB478700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiSleepWide_findclose
                • String ID:
                • API String ID: 12292140-0
                • Opcode ID: 741a92feabb5beaef7f6b418de649781a1ef50f924c946778741e3723f0a7c16
                • Instruction ID: 9c9ea1a71756ff001f3a0fde85feafa1e84627bb52b0d70b00c70637a03c0c77
                • Opcode Fuzzy Hash: 741a92feabb5beaef7f6b418de649781a1ef50f924c946778741e3723f0a7c16
                • Instruction Fuzzy Hash: FAA17026A18BC4C5EB25CF2CC5193FD6361F7A9B48F949225EB8C16597EB60D3CAC300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A654(intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, void* __r8, long long __r9, long long _a8, long long _a32) {
                
                				_a8 = __rbx;
                				_a32 = __r9;
                				if (__r8 == 0) goto 0x3f05a695;
                				if (__r9 == 0) goto 0x3f05a695;
                				if (__rcx != 0) goto 0x3f05a6ac;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				return 0;
                			}



                0x13f05a654
                0x13f05a659
                0x13f05a679
                0x13f05a67e
                0x13f05a683
                0x13f05a685
                0x13f05a68a
                0x13f05a690
                0x13f05a6ab

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 9592a9192376ab8ed3866bcce3ce43f042c8573d9d4793acd55ca655b7edca00
                • Instruction ID: 3132e9841739948963f4545db7151b5c45122c05cd2c94d7866afd093f9c9883
                • Opcode Fuzzy Hash: 9592a9192376ab8ed3866bcce3ce43f042c8573d9d4793acd55ca655b7edca00
                • Instruction Fuzzy Hash: 2E61C831B09644C9FA3C9E3D94087EA6693B784BB8F144239BD6D277D7DBB8C6438601
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 66%
                			E0000000113F060A2C(void* __ecx, long long __rbx, signed int __rdx, long long __rdi, void* __r11, long long __r14, long long _a8, long long _a16, long long _a24) {
                				signed long long _v24;
                				int _t20;
                				void* _t26;
                				void* _t30;
                				void* _t43;
                				void* _t45;
                				void* _t53;
                				void* _t64;
                				signed int* _t66;
                				signed long long _t67;
                				void* _t68;
                				void* _t69;
                				void* _t70;
                				intOrPtr* _t71;
                				signed long long _t75;
                				void* _t78;
                				intOrPtr _t79;
                				void* _t81;
                				signed long long* _t86;
                				void* _t90;
                				signed long long _t94;
                				intOrPtr _t95;
                				intOrPtr _t96;
                				signed long long _t97;
                				void* _t98;
                				void* _t99;
                				signed long long _t104;
                				signed long long _t108;
                
                				_a8 = __rbx;
                				_a16 = __rdi;
                				_a24 = __r14;
                				_t43 = __ecx;
                				_t66 = __rdx - 3;
                				if (_t66 - 1 <= 0) goto 0x3f060bd2;
                				_t45 = __ecx - 0x16;
                				if (_t45 > 0) goto 0x3f060b17;
                				asm("bt eax, ecx");
                				if (_t45 >= 0) goto 0x3f060b17;
                				r15d = 0;
                				E0000000113F068A68();
                				if (__ecx == 2) goto 0x3f060a84;
                				if (__ecx != 0x15) goto 0x3f060abe;
                				if ( *0x3f0914d4 != 0) goto 0x3f060abe;
                				_t20 = SetConsoleCtrlHandler(??, ??); // executed
                				if (_t20 == 0) goto 0x3f060aac;
                				 *0x3f0914d4 = 1;
                				goto 0x3f060abe;
                				E0000000113F05DE94(_t66);
                				 *_t66 = GetLastError();
                				E0000000113F060734(__ecx, _t20);
                				if (_t66 == 0) goto 0x3f060afd;
                				_t94 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t108 = _t94 ^  *_t66;
                				asm("dec ecx");
                				_v24 = _t108;
                				if (__rdx == 2) goto 0x3f060afd;
                				asm("dec ecx");
                				_t104 = __rdx ^ _t94;
                				 *_t66 = _t104;
                				E0000000113F068ABC();
                				if (1 != 0) goto 0x3f060bd2;
                				_t67 = _t108;
                				goto 0x3f060bf0;
                				_t53 = __ecx - 0xb;
                				if (_t53 > 0) goto 0x3f060bd2;
                				asm("bt eax, edi");
                				if (_t53 >= 0) goto 0x3f060bd2;
                				E0000000113F066B18(_t67, _t66, 0x13f0606a0, __rdx, _t90, _t98);
                				_t75 = _t67;
                				if (_t67 == 0) goto 0x3f060bd2;
                				_t78 =  *_t67;
                				_t68 = _t78;
                				if (_t78 != 0x3f077ed0) goto 0x3f060b7d;
                				_t79 =  *0x3f077f98; // 0xc0
                				_t26 = E0000000113F063738(_t68, _t79);
                				 *_t75 = _t68;
                				if (_t68 == 0) goto 0x3f060bd2;
                				_t95 =  *0x3f077f98; // 0xc0
                				E0000000113F0593C0(_t26, _t68, 0x3f077ed0, _t95);
                				_t81 =  *_t75;
                				_t69 = _t81;
                				_t96 =  *0x3f077f90; // 0xc
                				_t97 = _t96 + _t96;
                				goto 0x3f060b96;
                				if ( *((intOrPtr*)(_t69 + 4)) == _t43) goto 0x3f060b9d;
                				_t70 = _t69 + 0x10;
                				if (_t70 != _t69 + _t97 * 8) goto 0x3f060b8d;
                				if (_t70 == 0) goto 0x3f060bd2;
                				_t11 = _t70 + 8; // 0x8
                				_t86 = _t11;
                				if (_t104 == 2) goto 0x3f060bcd;
                				_t99 = _t81 + _t97 * 8;
                				if (_t70 == _t99) goto 0x3f060bcd;
                				if ( *((intOrPtr*)(_t86 - 4)) != _t43) goto 0x3f060bcd;
                				 *_t86 = _t104;
                				_t15 =  &(_t86[2]) - 8; // -16
                				if (_t15 != _t99) goto 0x3f060bb8;
                				_t71 =  *_t86;
                				goto 0x3f060bf0;
                				_t64 = _t43 - 0x11;
                				if (_t64 > 0) goto 0x3f060be1;
                				asm("bt eax, edi");
                				if (_t64 < 0) goto 0x3f060bec;
                				_t30 = E0000000113F05DEB4(_t71);
                				 *_t71 = 0x16;
                				return _t30;
                			}































                0x13f060a2c
                0x13f060a31
                0x13f060a36
                0x13f060a44
                0x13f060a46
                0x13f060a4e
                0x13f060a54
                0x13f060a57
                0x13f060a62
                0x13f060a65
                0x13f060a6d
                0x13f060a74
                0x13f060a7d
                0x13f060a82
                0x13f060a8b
                0x13f060a99
                0x13f060aa1
                0x13f060aa3
                0x13f060aaa
                0x13f060aac
                0x13f060aba
                0x13f060ac0
                0x13f060ac8
                0x13f060aca
                0x13f060ada
                0x13f060adf
                0x13f060ae2
                0x13f060aeb
                0x13f060af4
                0x13f060af7
                0x13f060afa
                0x13f060b02
                0x13f060b09
                0x13f060b0f
                0x13f060b12
                0x13f060b17
                0x13f060b1a
                0x13f060b25
                0x13f060b28
                0x13f060b2e
                0x13f060b33
                0x13f060b39
                0x13f060b3f
                0x13f060b42
                0x13f060b4f
                0x13f060b51
                0x13f060b58
                0x13f060b5d
                0x13f060b63
                0x13f060b65
                0x13f060b72
                0x13f060b77
                0x13f060b7a
                0x13f060b7d
                0x13f060b84
                0x13f060b8b
                0x13f060b90
                0x13f060b92
                0x13f060b99
                0x13f060ba0
                0x13f060ba2
                0x13f060ba2
                0x13f060bad
                0x13f060baf
                0x13f060bb6
                0x13f060bbb
                0x13f060bbd
                0x13f060bc4
                0x13f060bcb
                0x13f060bcd
                0x13f060bd0
                0x13f060bd2
                0x13f060bd5
                0x13f060bdc
                0x13f060bdf
                0x13f060be1
                0x13f060be6
                0x13f060c05

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ConsoleCtrlErrorHandlerLast
                • String ID:
                • API String ID: 3113525192-0
                • Opcode ID: d148a9ae40d54ad684f96522df0cf16372618c23943bd7b0cab2099646322671
                • Instruction ID: 1a44692bc72818bdb05e872b6c42a172845197e556877ee407aecb02ab39c435
                • Opcode Fuzzy Hash: d148a9ae40d54ad684f96522df0cf16372618c23943bd7b0cab2099646322671
                • Instruction Fuzzy Hash: 0551B172B8564081FE2D8B1DD6503E86797E7987A4F64953DF94A073E3DB38CA86C300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06ACAC(signed int __rax, long long __rbx, long long __rsi, void* __r11) {
                				void* _t12;
                				signed long long _t26;
                				WCHAR* _t35;
                				long long _t41;
                				void* _t50;
                
                				 *((long long*)(_t50 + 8)) = __rbx;
                				 *((long long*)(_t50 + 0x10)) = _t41;
                				 *((long long*)(_t50 + 0x18)) = __rsi;
                				GetEnvironmentStringsW(); // executed
                				if (__rax == 0) goto 0x3f06ad33;
                				if ( *__rax == 0) goto 0x3f06acf5;
                				_t26 = (__rax | 0xffffffff) + 1;
                				if ( *((intOrPtr*)(__rax + _t26 * 2)) != 0) goto 0x3f06acdc;
                				_t44 = __rax + _t26 * 2 + 2;
                				if ( *((intOrPtr*)(__rax + _t26 * 2 + 2)) != 0) goto 0x3f06acd8;
                				_t12 = E0000000113F063738(_t26, (_t44 - __rax + 2 >> 1) + (_t44 - __rax + 2 >> 1));
                				if (_t26 == 0) goto 0x3f06ad23;
                				E0000000113F0593C0(_t12, _t26, __rax, (_t44 - __rax + 2 >> 1) + (_t44 - __rax + 2 >> 1));
                				E0000000113F0636F8(_t26, _t26);
                				return FreeEnvironmentStringsW(_t35);
                			}








                0x13f06acac
                0x13f06acb1
                0x13f06acb6
                0x13f06acc0
                0x13f06acce
                0x13f06acd6
                0x13f06acdc
                0x13f06ace4
                0x13f06aceb
                0x13f06acf3
                0x13f06ad05
                0x13f06ad10
                0x13f06ad1b
                0x13f06ad25
                0x13f06ad4a

                APIs
                • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,000000013F06183A,?,?,TMP,000000013F061D02,?,?,?,?,000000013F06977C,?,?,TMP), ref: 000000013F06ACC0
                • FreeEnvironmentStringsW.KERNEL32(?,?,00000000,000000013F06183A,?,?,TMP,000000013F061D02,?,?,?,?,000000013F06977C,?,?,TMP), ref: 000000013F06AD2D
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: EnvironmentStrings$Free
                • String ID:
                • API String ID: 3328510275-0
                • Opcode ID: 2d254fee6556cfe3733f9c699e047ceeb5121cfa915ac9f2c87ac74770d918ee
                • Instruction ID: 19671bd8e601cb9335e58da16b5a018f584a6324f855038d921224d345c6d28e
                • Opcode Fuzzy Hash: 2d254fee6556cfe3733f9c699e047ceeb5121cfa915ac9f2c87ac74770d918ee
                • Instruction Fuzzy Hash: 84018C31F4565089DE29BF2965043D96261EB44BF0F9C4638BE6A177C6DE28C6428740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000013F05E340), ref: 000000013F05E460
                • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,000000013F05E340), ref: 000000013F05E474
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Time$System$FileLocalSpecific
                • String ID:
                • API String ID: 1707611234-0
                • Opcode ID: 473d82ff1279c405c3ae8f82e196632faaa8994f0165d0cd2387520b1e299c02
                • Instruction ID: 16f92ed64d96286c1d7f3c58d1646d4760db9c29c6f678833c54ef7132ae4041
                • Opcode Fuzzy Hash: 473d82ff1279c405c3ae8f82e196632faaa8994f0165d0cd2387520b1e299c02
                • Instruction Fuzzy Hash: D1119172F14611C9FB688B6994413FD37B2B708739F401229FEAE559D5EB38C292CB14
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 43%
                			E0000000113F0648B8(void* __ebx, signed long long __ecx, void* __edx, void* __eflags, signed int __rax, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16, intOrPtr _a32) {
                				int _t19;
                				void* _t21;
                				signed long long _t38;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t38 = __ecx;
                				E0000000113F0605E0(__ebx, __rax);
                				if (__rax != 0xffffffff) goto 0x3f0648ee;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f064941;
                				r9d = r8d;
                				_t19 = SetFilePointerEx(??, ??, ??, ??); // executed
                				if (_t19 != 0) goto 0x3f064915;
                				_t21 = E0000000113F05DE44(GetLastError(), __rax | 0xffffffff, __ecx);
                				goto 0x3f0648e8;
                				if (_a32 == 0xffffffff) goto 0x3f0648e8;
                				 *( *((intOrPtr*)(0x3f0917a0 + (_t38 >> 6) * 8)) + 0x38 + (_t38 + _t38 * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + (_t38 >> 6) * 8)) + 0x38 + (_t38 + _t38 * 8) * 8) & 0x000000fd;
                				return _t21;
                			}






                0x13f0648b8
                0x13f0648bd
                0x13f0648c7
                0x13f0648d2
                0x13f0648db
                0x13f0648dd
                0x13f0648e2
                0x13f0648ec
                0x13f0648ee
                0x13f0648fc
                0x13f064904
                0x13f06490e
                0x13f064913
                0x13f06491e
                0x13f06493c
                0x13f064950

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID:
                • API String ID: 2976181284-0
                • Opcode ID: 815bd49431f8a3675ace55cb510c49b1852bc6ea244e038e73d8330aa86f6717
                • Instruction ID: c0bc9aef89a229a835e193a3106de9073b2c9b7f418bd094b09e59c1f2f1cf6d
                • Opcode Fuzzy Hash: 815bd49431f8a3675ace55cb510c49b1852bc6ea244e038e73d8330aa86f6717
                • Instruction Fuzzy Hash: E901A175B14A8081EE189B2DE84439D6662E781BF0F64533ABA7E077E6DE34C6978300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000013F05FEE9), ref: 000000013F06008F
                • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000013F05FEE9), ref: 000000013F0600A5
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Time$System$FileLocalSpecific
                • String ID:
                • API String ID: 1707611234-0
                • Opcode ID: be528ed023ef07740193e35328ea2a56331065d8eac6a267c4b1b7753d06c23e
                • Instruction ID: 8c5636c1215e164e7f9565c43fa477e157cf36c8cc584f716eaea67be633148a
                • Opcode Fuzzy Hash: be528ed023ef07740193e35328ea2a56331065d8eac6a267c4b1b7753d06c23e
                • Instruction Fuzzy Hash: C701C432518250C2F7688F18E9013AEB7B2F385731F604729F6A9019E9DB7CC256CF00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 79%
                			E0000000113F059FF8() {
                				intOrPtr _t2;
                				void* _t11;
                				void* _t12;
                
                				E0000000113F05A21C(); // executed
                				 *0x3f082040 = _t2;
                				if (_t2 == 0xffffffff) goto 0x3f05a038;
                				if (E0000000113F05A2F4(_t2, _t2 - 0xffffffff, _t11, _t12, 0x3f091330) == 0) goto 0x3f05a033;
                				 *0x3f0913a8 = 0xfffffffe;
                				goto 0x3f05a03a;
                				E0000000113F05A040();
                				return 0;
                			}






                0x13f05a003
                0x13f05a008
                0x13f05a011
                0x13f05a023
                0x13f05a025
                0x13f05a031
                0x13f05a033
                0x13f05a03e

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                • String ID:
                • API String ID: 3765095794-0
                • Opcode ID: 1254310bdd7980890fdd32061b20a1cd37b18f601ae636acbf53c5b8c47d7338
                • Instruction ID: a204a790082a1b61847ffa42d7848ca8c0461029055ab3977419a6129bdb63ad
                • Opcode Fuzzy Hash: 1254310bdd7980890fdd32061b20a1cd37b18f601ae636acbf53c5b8c47d7338
                • Instruction Fuzzy Hash: 2BE04F30E18201D5EE1C6B3C9C8A3D523632745350FA05A3EB02DA21F3EAA9834B9700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F05A064() {
                				void* _t1;
                				void* _t6;
                				void* _t9;
                				void* _t10;
                				void* _t12;
                
                				r8d = 0;
                				_t1 = E0000000113F05A348(0xfa0, _t6, _t9, _t10, 0x3f0913b0, _t12); // executed
                				if (_t1 == 0) goto 0x3f05a08a;
                				 *0x3f0913d8 =  *0x3f0913d8 + 1;
                				goto 0x3f05a091;
                				E0000000113F05A098();
                				return 0;
                			}








                0x13f05a068
                0x13f05a077
                0x13f05a07e
                0x13f05a080
                0x13f05a088
                0x13f05a08a
                0x13f05a095

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CriticalInitializeSection__vcrt___vcrt_uninitialize_locks
                • String ID:
                • API String ID: 1232245925-0
                • Opcode ID: c12b0918a402b92c512b9c5bee1e4429491ab56cb47ece2fa303f3a71b730ad6
                • Instruction ID: 4153ce4970e373e66b8915b6a6d61e5409e3b4a93302298e34d3d1f7c54c4363
                • Opcode Fuzzy Hash: c12b0918a402b92c512b9c5bee1e4429491ab56cb47ece2fa303f3a71b730ad6
                • Instruction Fuzzy Hash: A2D05E38F28252C5FA583729A9453E603625706300FA0207CF80852A939858834B5A11
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F05FDD4() {
                				int _t1;
                				void* _t9;
                				void* _t10;
                
                				_t1 = RemoveDirectoryW(); // executed
                				if (_t1 != 0) goto 0x3f05fdf4;
                				E0000000113F05DE44(GetLastError(), _t9, _t10);
                				goto 0x3f05fdf6;
                				return 0;
                			}






                0x13f05fdd8
                0x13f05fde0
                0x13f05fdea
                0x13f05fdf2
                0x13f05fdfa

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: DirectoryErrorLastRemove
                • String ID:
                • API String ID: 377330604-0
                • Opcode ID: a6e55d8079f7d908ee49829a463cd701a80ebc6203178b2165871fafd51cf16a
                • Instruction ID: 6391faa3d541a819ad3b97989f389d5699103e1ce326a858dd4e4fed5bbd7b72
                • Opcode Fuzzy Hash: a6e55d8079f7d908ee49829a463cd701a80ebc6203178b2165871fafd51cf16a
                • Instruction Fuzzy Hash: ACD01230F1A501C2FA1C37BD5C497D912936B55731F60067CB42A801D3ED9C86DF4662
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F060C08() {
                				int _t1;
                				void* _t9;
                				void* _t10;
                
                				_t1 = DeleteFileW(); // executed
                				if (_t1 != 0) goto 0x3f060c28;
                				E0000000113F05DE44(GetLastError(), _t9, _t10);
                				goto 0x3f060c2a;
                				return 0;
                			}






                0x13f060c0c
                0x13f060c14
                0x13f060c1e
                0x13f060c26
                0x13f060c2e

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: DeleteErrorFileLast
                • String ID:
                • API String ID: 2018770650-0
                • Opcode ID: 9cbff42af49a488722fa51a4f4f00d5b36332d0b7c8beb1bbce7861cb2c94fa0
                • Instruction ID: 3eb4fecb377d17f24f796284e11e7518ca7d59398a6b04d0f72d4a5b5ef483e6
                • Opcode Fuzzy Hash: 9cbff42af49a488722fa51a4f4f00d5b36332d0b7c8beb1bbce7861cb2c94fa0
                • Instruction Fuzzy Hash: 4ED0C930F5650082EA5C37BE0C493981292AB94730FA00A78A025805E3EE9C878F4611
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 71%
                			E0000000113F0638B0(signed int __ecx, void* __edx, void* __edi, void* __eflags, void* __rax, long long __rbx, void* __rsi, long long _a8) {
                				void* __rdi;
                				int _t20;
                				long _t27;
                				intOrPtr _t49;
                
                				_a8 = __rbx;
                				E0000000113F0605E0(__edi, __rax);
                				if (__rax != 0xffffffff) goto 0x3f0638ce;
                				goto 0x3f063928;
                				_t49 =  *0x3f0917a0; // 0x474580
                				if (__edi != 1) goto 0x3f0638e8;
                				if (( *(_t49 + 0xc8) & dil) != 0) goto 0x3f0638f5;
                				if (__edi != 2) goto 0x3f06390c;
                				if (( *(_t49 + 0x80) & 0x00000001) == 0) goto 0x3f06390c;
                				E0000000113F0605E0(2, _t49);
                				E0000000113F0605E0(1, _t49);
                				if (_t49 == _t49) goto 0x3f0638ca;
                				E0000000113F0605E0(__edi, _t49);
                				_t20 = CloseHandle(??); // executed
                				if (_t20 != 0) goto 0x3f0638ca;
                				_t27 = GetLastError();
                				E0000000113F060524(_t21, _t27, __edi, _t49, __ecx, __rsi);
                				 *((char*)( *((intOrPtr*)(0x3f0917a0 + (__ecx >> 6) * 8)) + 0x38 + (__ecx + __ecx * 8) * 8)) = 0;
                				if (_t27 == 0) goto 0x3f063960;
                				E0000000113F05DE44(_t27, _t49, _t49);
                				goto 0x3f063962;
                				return 0;
                			}







                0x13f0638b0
                0x13f0638bf
                0x13f0638c8
                0x13f0638cc
                0x13f0638ce
                0x13f0638dd
                0x13f0638e6
                0x13f0638ea
                0x13f0638f3
                0x13f0638f5
                0x13f063902
                0x13f06390a
                0x13f06390e
                0x13f063916
                0x13f06391e
                0x13f063926
                0x13f06392a
                0x13f06394b
                0x13f063952
                0x13f063956
                0x13f06395e
                0x13f06396c

                APIs
                • CloseHandle.KERNELBASE ref: 000000013F063916
                • GetLastError.KERNEL32(?,?,?,000000013F0637E3,?,?,00000000,000000013F06388B,?,?,?,?,?,?,000000013F05A566), ref: 000000013F063920
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CloseErrorHandleLast
                • String ID:
                • API String ID: 918212764-0
                • Opcode ID: 12c23d5105a88acb804e74ebf782837962daae1713f2c50e447738db6b1d22c8
                • Instruction ID: 150107e017d6371c7abc96b82e8d9d0d7c37246cc3babd130d4cf8faf08785e2
                • Opcode Fuzzy Hash: 12c23d5105a88acb804e74ebf782837962daae1713f2c50e447738db6b1d22c8
                • Instruction Fuzzy Hash: 5A118E31F0064041FEAC577D95913FE1293DB847B4F24123EFA6A463D3DE6886868650
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05B140(intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rsi, long long __rbp, void* __r8, void* __r9, long long _a8, long long _a24, long long _a32) {
                
                				_a8 = __rbx;
                				_a24 = __rbp;
                				_a32 = __rsi;
                				if (__rdx == 0) goto 0x3f05b187;
                				if (__r8 == 0) goto 0x3f05b187;
                				if (__r9 != 0) goto 0x3f05b1a6;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				return 0;
                			}



                0x13f05b140
                0x13f05b145
                0x13f05b14a
                0x13f05b16b
                0x13f05b170
                0x13f05b175
                0x13f05b177
                0x13f05b17c
                0x13f05b182
                0x13f05b1a5

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 089ca40b22d1978cf1ad815848e3fcf026611dadae4a8de138106d0c54466af2
                • Instruction ID: e4aa967ceeb0266c230bc13a2a73f33dd604c2e0829fccfa9231b57322c17793
                • Opcode Fuzzy Hash: 089ca40b22d1978cf1ad815848e3fcf026611dadae4a8de138106d0c54466af2
                • Instruction Fuzzy Hash: 0741E7B1B08254C9FE5C9D6E59083A97292A744FE4F584138BE2D477D6C6B8E9438314
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 67%
                			E0000000113F06465C(void* __ebx, void* __edi, signed int __esi, intOrPtr* __rax, long long __rbx, signed char** __rcx, long long __rdi, long long __rsi, void* __r12, long long _a8, long long _a16, long long _a24) {
                				void* _t55;
                				signed int _t56;
                				void* _t76;
                				signed int _t78;
                				intOrPtr* _t95;
                				signed char* _t97;
                				signed char** _t115;
                
                				_t95 = __rax;
                				_t76 = __edi;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_a24 = __rdi;
                				_t115 = __rcx;
                				if (__rcx != 0) goto 0x3f06468e;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x0000000d & 0x00000001) == 0) goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x0000000c & 0x00000001) != 0) goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x00000001 & 0x00000001) == 0) goto 0x3f0646bd;
                				asm("lock or dword [ecx+0x14], 0x10");
                				goto 0x3f0647ab;
                				asm("lock or dword [ecx+0x14], 0x1");
                				if (( *(__rcx + 0x14) & 0x000004c0) != 0) goto 0x3f0646d1;
                				E0000000113F06BA18( *(__rcx + 0x14) & 0x000004c0, __rax, __rbx, __rcx);
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(__rcx + 8));
                				_t55 = E0000000113F0628A4(__rax, __rcx);
                				r8d =  *((intOrPtr*)(__rcx + 0x20));
                				_t56 = E0000000113F0640E8(__ebx, _t55, _t76,  *((intOrPtr*)(__rcx + 8)),  *((intOrPtr*)(__rcx + 8)), __rcx, __r12); // executed
                				_t115[2] = _t56;
                				_t19 = _t95 + 1; // 0x1
                				if (_t19 - 1 <= 0) goto 0x3f064799;
                				_t78 = __esi | 0xffffffff;
                				if ((_t115[2] & 0x00000006) != 0) goto 0x3f064764;
                				if (E0000000113F0628A4(_t95, _t115) == _t78) goto 0x3f06474f;
                				if (E0000000113F0628A4(_t95, _t115) == 0xfffffffe) goto 0x3f06474f;
                				E0000000113F0628A4(_t95, _t115);
                				E0000000113F0628A4(_t95, _t115);
                				goto 0x3f064756;
                				if (( *0x13F0822A8 & 0x00000082) != 0x82) goto 0x3f064764;
                				asm("lock or dword [edi+0x14], 0x20");
                				if (_t115[4] != 0x200) goto 0x3f064788;
                				if ((_t115[2] >> 0x00000006 & 0x00000001) == 0) goto 0x3f064788;
                				if ((_t115[2] >> 0x00000008 & 0x00000001) != 0) goto 0x3f064788;
                				_t115[4] = 0x1000;
                				_t115[2] =  &(_t115[2][_t78]);
                				_t97 =  *_t115;
                				 *_t115 =  &(_t97[1]);
                				goto 0x3f0647ae;
                				asm("sbb eax, eax");
                				asm("lock or [edi+0x14], eax");
                				_t115[2] = _t115[2] & 0x00000000;
                				return  *_t97 & 0x000000ff | 0xffffffff;
                			}










                0x13f06465c
                0x13f06465c
                0x13f06465c
                0x13f064661
                0x13f064666
                0x13f064671
                0x13f064677
                0x13f064679
                0x13f06467e
                0x13f064684
                0x13f064689
                0x13f064696
                0x13f0646a4
                0x13f0646b1
                0x13f0646b3
                0x13f0646b8
                0x13f0646bd
                0x13f0646ca
                0x13f0646cc
                0x13f0646d8
                0x13f0646db
                0x13f0646e0
                0x13f0646e9
                0x13f0646ee
                0x13f0646f1
                0x13f0646f7
                0x13f064700
                0x13f064705
                0x13f064711
                0x13f06471e
                0x13f064723
                0x13f064739
                0x13f06474d
                0x13f06475d
                0x13f06475f
                0x13f06476b
                0x13f064775
                0x13f06477f
                0x13f064781
                0x13f064788
                0x13f06478b
                0x13f064794
                0x13f064797
                0x13f06479b
                0x13f0647a3
                0x13f0647a7
                0x13f0647c5

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 4244ad875760342c4100683810c7ec801059967c090cb9e901b964c8b0113e2c
                • Instruction ID: 56cac348fb6702a6b22e88cdba881cab2740bc81491a606f70907a57557b50e9
                • Opcode Fuzzy Hash: 4244ad875760342c4100683810c7ec801059967c090cb9e901b964c8b0113e2c
                • Instruction Fuzzy Hash: 5D41D03AA1160497EE2CDB1CDA407EC37A2F786BA4F240229FB4587792CB34D663C740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 52%
                			E0000000113F05AC10(void* __esi, signed int __rax, long long __rbx, signed int __rcx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                				void* _t50;
                				void* _t56;
                				signed long long _t74;
                				intOrPtr _t80;
                				intOrPtr* _t81;
                				signed long long _t88;
                				void* _t92;
                				signed long long _t93;
                				signed long long _t94;
                				signed long long _t98;
                				signed long long _t100;
                				void* _t102;
                				void* _t108;
                				void* _t110;
                
                				_t92 = __rdx;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				if (__rcx != 0) goto 0x3f05ac40;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				_t74 = __rax | 0xffffffff;
                				goto 0x3f05ad2f;
                				_t100 = E0000000113F0628A4(_t74, __rcx);
                				if ( *(__rcx + 0x10) >= 0) goto 0x3f05ac52;
                				 *(__rcx + 0x10) =  *(__rcx + 0x10) & 0x00000000;
                				_t6 = _t92 + 1; // 0x1, executed
                				r8d = _t6;
                				0x3f064954(); // executed
                				if (_t74 < 0) goto 0x3f05ac37;
                				if (( *(__rcx + 0x14) & 0x000000c0) != 0) goto 0x3f05ac7d;
                				_t98 = _t74 -  *(__rcx + 0x10);
                				goto 0x3f05ad2f;
                				_t88 = _t100 >> 6;
                				_t110 =  *__rcx -  *((intOrPtr*)(__rcx + 8));
                				_t93 = _t100 + _t100 * 8;
                				sil =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t88 * 8)) + 0x39 + _t93 * 8));
                				if (( *(__rcx + 0x14) & 0x00000003) == 0) goto 0x3f05acf1;
                				if (sil != 1) goto 0x3f05acca;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t88 * 8)) + 0x3d + _t93 * 8) & 0x00000002) == 0) goto 0x3f05acca;
                				_t94 = _t98;
                				_t50 = E0000000113F05AE8C(__esi,  *((intOrPtr*)(0x3f0917a0 + _t88 * 8)), __rcx, __rcx, _t94, _t100, _t102, _t108, _t110);
                				goto 0x3f05ad2f;
                				_t80 =  *((intOrPtr*)(0x3f0917a0 + __rcx * 8));
                				if ( *((char*)(_t80 + 0x38 + _t94 * 8)) >= 0) goto 0x3f05ace7;
                				r8b = sil;
                				E0000000113F05B008(_t50,  *((intOrPtr*)(__rcx + 8)),  *__rcx, 0x3f0917a0, _t108);
                				if (_t98 != 0) goto 0x3f05ad0b;
                				_t81 = _t110 + _t80;
                				goto 0x3f05ad2f;
                				if (( *(__rcx + 0x14) >> 0x00000002 & 0x00000001) != 0) goto 0x3f05ace7;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 0x16;
                				goto 0x3f05ac37;
                				if (( *(__rcx + 0x14) & 0x00000001) == 0) goto 0x3f05ad22;
                				_t56 = E0000000113F05AD40(__esi, __rcx, __rcx, _t98, _t110 + _t80);
                				goto 0x3f05ad2f;
                				if (sil != 1) goto 0x3f05ad2b;
                				return _t56;
                			}

















                0x13f05ac10
                0x13f05ac10
                0x13f05ac15
                0x13f05ac25
                0x13f05ac27
                0x13f05ac2c
                0x13f05ac32
                0x13f05ac37
                0x13f05ac3b
                0x13f05ac49
                0x13f05ac4c
                0x13f05ac4e
                0x13f05ac56
                0x13f05ac56
                0x13f05ac5a
                0x13f05ac65
                0x13f05ac6c
                0x13f05ac72
                0x13f05ac78
                0x13f05ac90
                0x13f05ac94
                0x13f05ac98
                0x13f05aca0
                0x13f05acaa
                0x13f05acb0
                0x13f05acbb
                0x13f05acbd
                0x13f05acc3
                0x13f05acc8
                0x13f05acca
                0x13f05acd3
                0x13f05acd8
                0x13f05acdf
                0x13f05acea
                0x13f05acec
                0x13f05acef
                0x13f05acf9
                0x13f05acfb
                0x13f05ad00
                0x13f05ad06
                0x13f05ad10
                0x13f05ad1b
                0x13f05ad20
                0x13f05ad26
                0x13f05ad3e

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 1af53d1f7e59a9d11f33a225be346b3d5a6844df69b3366722f3e679c06060e1
                • Instruction ID: 8e49222d33ba03a0aa8ca14566918f8696f05cd18ce31147da14bfdfb6c85803
                • Opcode Fuzzy Hash: 1af53d1f7e59a9d11f33a225be346b3d5a6844df69b3366722f3e679c06060e1
                • Instruction Fuzzy Hash: 9B31C472A08644C6EF58EA2DD4183E86792EB44FE8F404139F91E177D7DAB4CA43C310
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E0000000113F0640E8(signed int __ebx, signed int __ecx, void* __edi, signed int __rbx, void* __rdx, signed int __rdi, signed int __r12, void* _a16, void* _a24, void* _a32) {
                				void* _t44;
                				void* _t47;
                				signed int* _t52;
                				signed int* _t54;
                				signed int* _t56;
                				signed int* _t65;
                				void* _t68;
                				signed long long _t73;
                				void* _t75;
                				void* _t77;
                				signed long long _t79;
                
                				_t44 = __edi;
                				_t52 = _t65;
                				_t52[4] = __rbx;
                				_t52[6] = __rdi;
                				_t52[8] = __r12;
                				_t52[2] = __ecx;
                				r14d = r8d;
                				if (__edi != 0xfffffffe) goto 0x3f06412a;
                				E0000000113F05DE94(_t52);
                				 *_t52 =  *_t52 & 0x00000000;
                				E0000000113F05DEB4(_t52);
                				 *_t52 = 9;
                				goto 0x3f0641e4;
                				if (__ecx < 0) goto 0x3f0641cc;
                				_t47 = _t44 -  *0x3f091ba0; // 0x40
                				if (_t47 >= 0) goto 0x3f0641cc;
                				_t79 = __ecx >> 6;
                				_t73 = __ecx + __ecx * 8;
                				_t54 =  *((intOrPtr*)(0x3f0917a0 + _t79 * 8));
                				if (( *(_t54 + 0x38 + _t73 * 8) & 0x00000001) == 0) goto 0x3f0641cc;
                				if (r14d - 0x7fffffff <= 0) goto 0x3f064180;
                				E0000000113F05DE94(_t54);
                				 *_t54 =  *_t54 & 0x00000000;
                				E0000000113F05DEB4(_t54);
                				 *_t54 = 0x16;
                				goto 0x3f0641df;
                				E0000000113F0602D4();
                				_t56 =  *((intOrPtr*)(0x3f0917a0 + _t79 * 8));
                				if (( *(0x3f0917a0 + 0x38 + _t73 * 8) & 0x00000001) != 0) goto 0x3f0641b2;
                				E0000000113F05DEB4(_t56);
                				 *0x3f0917a0 = 9;
                				E0000000113F05DE94(_t56);
                				 *0x3f0917a0 =  *0x3f0917a0 & 0x00000000;
                				goto 0x3f0641c1;
                				r8d = r14d;
                				E0000000113F064204(__ebx | 0xffffffff, __edi, _t56, __rbx, __rdx, _t68, _t77, _t75); // executed
                				E0000000113F0603BC();
                				goto 0x3f0641e7;
                				E0000000113F05DE94(_t56);
                				 *0x3f0917a0 =  *0x3f0917a0 & 0x00000000;
                				E0000000113F05DEB4(_t56);
                				 *_t56 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}














                0x13f0640e8
                0x13f0640e8
                0x13f0640eb
                0x13f0640ef
                0x13f0640f3
                0x13f0640f7
                0x13f064104
                0x13f064110
                0x13f064112
                0x13f064117
                0x13f06411a
                0x13f06411f
                0x13f064125
                0x13f06412c
                0x13f064132
                0x13f064138
                0x13f064144
                0x13f064152
                0x13f064156
                0x13f064160
                0x13f064169
                0x13f06416b
                0x13f064170
                0x13f064173
                0x13f064178
                0x13f06417e
                0x13f064182
                0x13f064191
                0x13f06419b
                0x13f06419d
                0x13f0641a2
                0x13f0641a8
                0x13f0641ad
                0x13f0641b0
                0x13f0641b2
                0x13f0641ba
                0x13f0641c3
                0x13f0641ca
                0x13f0641cc
                0x13f0641d1
                0x13f0641d4
                0x13f0641d9
                0x13f064200

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 4977609802220c77958fcbd3692edb3fa6271fa71f28f519ce4552e3dbef245d
                • Instruction ID: 11a1496a8d28bd9748ca49c50118b6eaa429933e8c15dd85fc7974796203022b
                • Opcode Fuzzy Hash: 4977609802220c77958fcbd3692edb3fa6271fa71f28f519ce4552e3dbef245d
                • Instruction Fuzzy Hash: D731A435E0560085F719AB5DC8417ED2A63E7A0BB5F61022EFA29073D3DBB88A428710
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 77%
                			E0000000113F0647C8(void* __ebx, signed int __ecx, signed int* __rax, long long __rbx, void* __rdx, long long __rsi, signed int _a8, long long _a16, long long _a24) {
                				void* _t36;
                				void* _t39;
                				signed int* _t46;
                				signed int* _t47;
                				signed long long _t59;
                				signed long long _t64;
                
                				_t31 = __ebx;
                				_a16 = __rbx;
                				_a24 = __rsi;
                				_a8 = __ecx;
                				r14d = r8d;
                				if (__ebx != 0xfffffffe) goto 0x3f064809;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f06489b;
                				if (__ecx < 0) goto 0x3f064883;
                				_t39 = _t31 -  *0x3f091ba0; // 0x40
                				if (_t39 >= 0) goto 0x3f064883;
                				_t59 = __ecx >> 6;
                				_t64 = __ecx + __ecx * 8;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t59 * 8)) + 0x38 + _t64 * 8) & 0x00000001) == 0) goto 0x3f064883;
                				E0000000113F0602D4();
                				_t46 =  *((intOrPtr*)(0x3f0917a0 + _t59 * 8));
                				if (( *(_t46 + 0x38 + _t64 * 8) & 0x00000001) != 0) goto 0x3f064867;
                				E0000000113F05DEB4(_t46);
                				 *_t46 = 9;
                				E0000000113F05DE94(_t46);
                				 *_t46 =  *_t46 & 0x00000000;
                				goto 0x3f064877;
                				r8d = r14d;
                				E0000000113F0648B8(__ebx, __ebx, _t36,  *(_t46 + 0x38 + _t64 * 8) & 0x00000001, _t46, __ecx, __rdx, _t59); // executed
                				E0000000113F0603BC();
                				_t47 = _t46;
                				goto 0x3f06489f;
                				E0000000113F05DE94(_t47);
                				 *_t47 =  *_t47 & 0x00000000;
                				E0000000113F05DEB4(_t47);
                				 *_t47 = 9;
                				return E0000000113F063618();
                			}









                0x13f0647c8
                0x13f0647c8
                0x13f0647cd
                0x13f0647d2
                0x13f0647e3
                0x13f0647ef
                0x13f0647f1
                0x13f0647f6
                0x13f0647f9
                0x13f0647fe
                0x13f064804
                0x13f06480b
                0x13f06480d
                0x13f064813
                0x13f06481b
                0x13f064829
                0x13f064838
                0x13f06483c
                0x13f064845
                0x13f064850
                0x13f064852
                0x13f064857
                0x13f06485d
                0x13f064862
                0x13f064865
                0x13f064867
                0x13f06486f
                0x13f064879
                0x13f06487e
                0x13f064881
                0x13f064883
                0x13f064888
                0x13f06488b
                0x13f064890
                0x13f0648b6

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 41d14df0cf39d0762983fa5336a71e560962de6775d4bb3ab1ce58456a5dbab7
                • Instruction ID: abe8fc0f767cc3eb8e16f2712fe7dd4a7af550dbaaed89e28b1a2dcadaf5a880
                • Opcode Fuzzy Hash: 41d14df0cf39d0762983fa5336a71e560962de6775d4bb3ab1ce58456a5dbab7
                • Instruction Fuzzy Hash: 6721D032E092908AF74DAF5A984179D2663E740BB1F64463EBD39073D3C7B8CA438740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 91%
                			E0000000113F06543C(signed long long __ebx, signed int __ecx, signed int __edi, signed int* __rax, long long __rbx, void* __rdx, long long __rsi, signed int _a8, long long _a16, long long _a24) {
                				signed long long _t33;
                				void* _t41;
                				void* _t44;
                				signed int* _t51;
                				signed long long _t59;
                				void* _t64;
                				void* _t65;
                				signed long long _t66;
                
                				_t33 = __ebx;
                				_a16 = __rbx;
                				_a24 = __rsi;
                				_a8 = __ecx;
                				r14d = r8d;
                				if (__ebx != 0xfffffffe) goto 0x3f06547d;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f06550c;
                				if (__ecx < 0) goto 0x3f0654f4;
                				_t44 = _t33 -  *0x3f091ba0; // 0x40
                				if (_t44 >= 0) goto 0x3f0654f4;
                				_t59 = __ecx >> 6;
                				_t66 = __ecx + __ecx * 8;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t59 * 8)) + 0x38 + _t66 * 8) & 0x00000001) == 0) goto 0x3f0654f4;
                				E0000000113F0602D4();
                				_t51 =  *((intOrPtr*)(0x3f0917a0 + _t59 * 8));
                				if (( *(_t51 + 0x38 + _t66 * 8) & 0x00000001) != 0) goto 0x3f0654da;
                				E0000000113F05DEB4(_t51);
                				 *_t51 = 9;
                				E0000000113F05DE94(_t51);
                				 *_t51 =  *_t51 & 0x00000000;
                				goto 0x3f0654e9;
                				r8d = r14d;
                				E0000000113F065528(__ebx, __edi | 0xffffffff, _t41, _t51, __ecx, __rdx, _t64, _t65); // executed
                				E0000000113F0603BC();
                				goto 0x3f06550f;
                				E0000000113F05DE94(_t51);
                				 *_t51 =  *_t51 & 0x00000000;
                				E0000000113F05DEB4(_t51);
                				 *_t51 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}











                0x13f06543c
                0x13f06543c
                0x13f065441
                0x13f065446
                0x13f065457
                0x13f065463
                0x13f065465
                0x13f06546a
                0x13f06546d
                0x13f065472
                0x13f065478
                0x13f06547f
                0x13f065481
                0x13f065487
                0x13f06548f
                0x13f06549d
                0x13f0654ac
                0x13f0654b0
                0x13f0654b8
                0x13f0654c3
                0x13f0654c5
                0x13f0654ca
                0x13f0654d0
                0x13f0654d5
                0x13f0654d8
                0x13f0654da
                0x13f0654e2
                0x13f0654eb
                0x13f0654f2
                0x13f0654f4
                0x13f0654f9
                0x13f0654fc
                0x13f065501
                0x13f065526

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f0af1fb771f0d57ac143c2b0c8eb7b381dd81084c08ae54e0e8a351931e21bca
                • Instruction ID: 726913fc125e423c9b26f9a4a700863802d01c715cbf4239d05125da7116c18a
                • Opcode Fuzzy Hash: f0af1fb771f0d57ac143c2b0c8eb7b381dd81084c08ae54e0e8a351931e21bca
                • Instruction Fuzzy Hash: 5221D332E0429086F749AF5D98453AD2663EB80BB6F64453EB929073D3CBB8CA43C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 90%
                			E0000000113F05EED8(void* __esi, signed int __rax, long long __rbx, signed int* __rcx, long long __rdx, long long __rsi, void* __r8, void* __r9, signed int* _a8, void* _a16, long long _a24, long long _a32) {
                				void* _v40;
                				intOrPtr _v48;
                				intOrPtr* _v64;
                				char _v72;
                				intOrPtr _v80;
                				signed int* _v88;
                				void* __rbp;
                				signed int _t44;
                				signed int _t46;
                				void* _t47;
                				void* _t48;
                				intOrPtr _t49;
                				intOrPtr* _t82;
                				intOrPtr* _t83;
                				intOrPtr* _t84;
                				intOrPtr _t87;
                				intOrPtr _t98;
                				signed int* _t109;
                				signed char* _t112;
                				signed int* _t131;
                				void* _t136;
                
                				_t86 = __rbx;
                				r8d = 0x40;
                				goto 0x3f05ee0c;
                				asm("int3");
                				_a24 = __rbx;
                				_a32 = __rsi;
                				_a16 = __rdx;
                				_push(_t131);
                				r12d = 0;
                				_t49 = r12d;
                				if (__rcx == 0) goto 0x3f05ef23;
                				if (__r8 != 0) goto 0x3f05ef1f;
                				goto 0x3f05f0cb;
                				 *__rcx = r12w;
                				if (__rdx != 0) goto 0x3f05ef41;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05f0cb;
                				E0000000113F05BE30(__rax | 0xffffffff, __rbx,  &_v72, __r9, __rsi, _t136);
                				_t82 = _v64;
                				if ( *((intOrPtr*)(_t82 + 0xc)) != 0xfde9) goto 0x3f05ef7b;
                				_a8 = _t131;
                				E0000000113F0688A8(_t82, _t86, __rcx,  &_a16, __r8,  &_a8);
                				_t87 = _t82;
                				goto 0x3f05f0b7;
                				if (__rcx == 0) goto 0x3f05f068;
                				if ( *((intOrPtr*)(_t82 + 0x138)) != _t131) goto 0x3f05efbc;
                				if (__r8 == 0) goto 0x3f05f0b7;
                				_t98 = _a16;
                				_t44 =  *(_t87 + _t98) & 0x000000ff;
                				 *__rcx = _t44;
                				if ( *(_t87 + _t98) == r12b) goto 0x3f05f0b7;
                				_t109 =  &(__rcx[0]);
                				if (_t87 + 1 - __r8 < 0) goto 0x3f05ef9a;
                				goto 0x3f05f0b7;
                				_v80 = r14d;
                				r9d = _t49;
                				_v88 = _t109;
                				E0000000113F067C10();
                				if (_t44 != 0) goto 0x3f05f0b3;
                				if (GetLastError() != 0x7a) goto 0x3f05f052;
                				r15d = r14d;
                				_t112 = _a16;
                				if (r14d == 0) goto 0x3f05f02a;
                				r15d = r15d - 1;
                				if ( *_t112 == r12b) goto 0x3f05f026;
                				_t46 = E0000000113F068820( *_t112 & 0x000000ff,  *_t112 - r12b, _t82);
                				if (_t46 == 0) goto 0x3f05f01e;
                				if (_t112[1] == r12b) goto 0x3f05f052;
                				if (r15d != 0) goto 0x3f05effe;
                				_t83 = _v64;
                				_v80 = r14d;
                				r9d = __esi - r8d;
                				_v88 = _t109;
                				E0000000113F067C10();
                				if (_t46 != 0) goto 0x3f05f063;
                				_t47 = E0000000113F05DEB4(_t83);
                				 *_t83 = 0x2a;
                				 *_t109 = r12w;
                				goto 0x3f05f0b7;
                				goto 0x3f05f0b7;
                				if ( *((intOrPtr*)(_t83 + 0x138)) != _t131) goto 0x3f05f084;
                				_t84 = _a16;
                				if ( *((intOrPtr*)(_t84 + (_t46 | 0xffffffff) + 1)) != r12b) goto 0x3f05f079;
                				goto 0x3f05f0b7;
                				r9d = _t49;
                				_v80 = r12d;
                				_v88 = _t131;
                				E0000000113F067C10();
                				if (_t47 != 0) goto 0x3f05f0b3;
                				_t48 = E0000000113F05DEB4(_t84);
                				 *_t84 = 0x2a;
                				goto 0x3f05f0b7;
                				if (_v48 == r12b) goto 0x3f05f0c8;
                				 *(_v72 + 0x3a8) =  *(_v72 + 0x3a8) & 0xfffffffd;
                				return _t48;
                			}
























                0x13f05eed8
                0x13f05eed8
                0x13f05eede
                0x13f05eee3
                0x13f05eee4
                0x13f05eee9
                0x13f05eeee
                0x13f05eef5
                0x13f05ef02
                0x13f05ef0b
                0x13f05ef11
                0x13f05ef16
                0x13f05ef1a
                0x13f05ef1f
                0x13f05ef26
                0x13f05ef28
                0x13f05ef2d
                0x13f05ef33
                0x13f05ef3c
                0x13f05ef48
                0x13f05ef4d
                0x13f05ef5a
                0x13f05ef60
                0x13f05ef6e
                0x13f05ef73
                0x13f05ef76
                0x13f05ef7e
                0x13f05ef8b
                0x13f05ef90
                0x13f05ef96
                0x13f05ef9a
                0x13f05ef9e
                0x13f05efa5
                0x13f05efae
                0x13f05efb5
                0x13f05efb7
                0x13f05efc4
                0x13f05efc9
                0x13f05efcc
                0x13f05efd4
                0x13f05efde
                0x13f05efed
                0x13f05eff3
                0x13f05eff6
                0x13f05effc
                0x13f05effe
                0x13f05f004
                0x13f05f00d
                0x13f05f014
                0x13f05f01c
                0x13f05f024
                0x13f05f02a
                0x13f05f031
                0x13f05f036
                0x13f05f03e
                0x13f05f046
                0x13f05f050
                0x13f05f052
                0x13f05f057
                0x13f05f05d
                0x13f05f061
                0x13f05f066
                0x13f05f073
                0x13f05f075
                0x13f05f080
                0x13f05f082
                0x13f05f088
                0x13f05f08b
                0x13f05f095
                0x13f05f09a
                0x13f05f0a4
                0x13f05f0a6
                0x13f05f0ab
                0x13f05f0b1
                0x13f05f0bb
                0x13f05f0c1
                0x13f05f0e3

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 7df556c0d348d1beda6807f23c8e79ba11cfd1c186763496cc31a09365199704
                • Instruction ID: 3a79b87e4f11b509aa93496ff3748245321c75d8ece1e5f81863d9934e85e413
                • Opcode Fuzzy Hash: 7df556c0d348d1beda6807f23c8e79ba11cfd1c186763496cc31a09365199704
                • Instruction Fuzzy Hash: A0119331A2D690C1FE689F1994043E9A2A3F788B84F184439FACC47787CBFCCA028744
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06E2EC(intOrPtr* __rax, long long __rbx, long long _a8, intOrPtr _a40) {
                
                				_a8 = __rbx;
                				if (_a40 != 0) goto 0x3f06e321;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				return 0x16;
                			}



                0x13f06e2ec
                0x13f06e301
                0x13f06e303
                0x13f06e30d
                0x13f06e30f
                0x13f06e320

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 40ce2b9f8d7f1843f3634450a6ce58fbba5b5d9cb33207c58e91754079f57d88
                • Instruction ID: 72c7f81eca507cbc56da13bcf85eb021ecc8cb8f44a58c213cbe0a991bbb1a20
                • Opcode Fuzzy Hash: 40ce2b9f8d7f1843f3634450a6ce58fbba5b5d9cb33207c58e91754079f57d88
                • Instruction Fuzzy Hash: A8219632A1478087EB698F1CD5447A977A2F784B64F644239FA99476DBDB3DC6028B00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 54%
                			E0000000113F061F5C(void* __ecx, char __edx, intOrPtr* __rax, long long __rbx, long long _a8, char _a16, char _a24, char _a32) {
                				long long _v24;
                				long long _v32;
                				char _v40;
                				char _v48;
                				char _v52;
                				void* _v56;
                				void* _t27;
                				intOrPtr* _t49;
                
                				_a8 = __rbx;
                				_a24 = r8d;
                				_a16 = __edx;
                				if (r8d != 0) goto 0x3f061fc3;
                				GetModuleHandleW(??);
                				if (__rax == 0) goto 0x3f061fc3;
                				if ( *__rax != 0x5a4d) goto 0x3f061fc3;
                				_t49 =  *((intOrPtr*)(__rax + 0x3c)) + __rax;
                				if ( *_t49 != 0x4550) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0x18)) != 0x20b) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0x84)) - 0xe <= 0) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0xf8)) == 0) goto 0x3f061fc3;
                				E0000000113F062064(0x20b, __ecx, __rax);
                				_a32 = 0;
                				_v40 =  &_a16;
                				_v32 =  &_a24;
                				_v24 =  &_a32;
                				_v52 = 2;
                				_v48 = 2;
                				_t27 = E0000000113F061E54(__rbx,  &_v48,  &_v40,  &_v52);
                				if (_a24 == 0) goto 0x3f062010;
                				return _t27;
                			}











                0x13f061f5c
                0x13f061f61
                0x13f061f66
                0x13f061f77
                0x13f061f7b
                0x13f061f84
                0x13f061f8e
                0x13f061f94
                0x13f061f9d
                0x13f061fa8
                0x13f061fb1
                0x13f061fba
                0x13f061fbe
                0x13f061fc7
                0x13f061fcb
                0x13f061fd7
                0x13f061fe3
                0x13f061ff4
                0x13f061ff7
                0x13f061ffa
                0x13f062003
                0x13f06200f

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: HandleModule$AddressFreeLibraryProc
                • String ID:
                • API String ID: 3947729631-0
                • Opcode ID: 96c8622230f8d0a29d8ebf61705925c0eebb8d9b7dd56cf7d700869a6918ff5f
                • Instruction ID: eb8d9009ad883ca6edca1a2f2ce1c51f808c5e4a4b38d88717a6cf10558d7d36
                • Opcode Fuzzy Hash: 96c8622230f8d0a29d8ebf61705925c0eebb8d9b7dd56cf7d700869a6918ff5f
                • Instruction Fuzzy Hash: 67215E32F00B048AEB19DF68C4447ED37E1E744B58F64453AF64942A86DB78C696CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A904(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, void* __r8, void* __r9, long long __r14, void* _a8, void* _a16, void* _a24, void* _a32, intOrPtr _a40) {
                				void* _t10;
                				intOrPtr* _t21;
                				intOrPtr* _t33;
                
                				_t21 = _t33;
                				 *((long long*)(_t21 + 8)) = __rbx;
                				 *((long long*)(_t21 + 0x10)) = __rsi;
                				 *((long long*)(_t21 + 0x18)) = __rdi;
                				 *((long long*)(_t21 + 0x20)) = __r14;
                				if (__r8 == 0) goto 0x3f05a95d;
                				if (__r9 == 0) goto 0x3f05a95d;
                				if (_a40 != 0) goto 0x3f05a97a;
                				if (__rdx == 0xffffffff) goto 0x3f05a94d;
                				E0000000113F0597D0(_t10, 0, __rcx, __rdx, __rdx);
                				E0000000113F05DEB4(_t21);
                				 *_t21 = 0x16;
                				E0000000113F063618();
                				return 0;
                			}






                0x13f05a904
                0x13f05a907
                0x13f05a90b
                0x13f05a90f
                0x13f05a913
                0x13f05a92c
                0x13f05a931
                0x13f05a93b
                0x13f05a941
                0x13f05a948
                0x13f05a94d
                0x13f05a952
                0x13f05a958
                0x13f05a979

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 3b19a35de722f54a59c54440c76d5920a2459c1532597614150d4e04d015219f
                • Instruction ID: 61af9ee3f5630537aff99ef00fe1ce6fc10c63ef9dd9e030eeed152d631052a0
                • Opcode Fuzzy Hash: 3b19a35de722f54a59c54440c76d5920a2459c1532597614150d4e04d015219f
                • Instruction Fuzzy Hash: A401DB71A08750C1E90CDB5A98053D9A792BB99FE0F484639BE6C53BD7DAB8C6038700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06022C(void* __ecx, intOrPtr* __rax, long long __rbx, long long __rdi, long long __rsi, long long _a8, long long _a16, long long _a24) {
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_a24 = __rdi;
                				if (__ecx - 0x2000 < 0) goto 0x3f060274;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				E0000000113F063618();
                				return 9;
                			}



                0x13f06022c
                0x13f060231
                0x13f060236
                0x13f060249
                0x13f06024b
                0x13f060255
                0x13f060257
                0x13f060273

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: c4bb4eedc5c79a63ec1b8a6b24d731bcc6c6bba80e5bb120582e4ad56882732c
                • Instruction ID: d6496c5ebcee155660ebd25d75bdebe6ccd1efcb74af19d62b0c842e99456b68
                • Opcode Fuzzy Hash: c4bb4eedc5c79a63ec1b8a6b24d731bcc6c6bba80e5bb120582e4ad56882732c
                • Instruction Fuzzy Hash: 4C11BC32A4664186F3089B1CE58039AA7A3FB40794F65053CFA59477B3EB38DA52CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 77%
                			E0000000113F06380C(signed int __ecx, char __edx, signed int* __rax, void* __rbx, char _a8, void* _a16, char _a24, char _a32) {
                				signed int* _v24;
                				void* _t31;
                				signed int* _t38;
                
                				_t28 = __edx;
                				_a8 = __ecx;
                				if (__edx != 0xfffffffe) goto 0x3f063831;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f0638a5;
                				if (__ecx < 0) goto 0x3f06388d;
                				_t31 = _t28 -  *0x3f091ba0; // 0x40
                				if (_t31 >= 0) goto 0x3f06388d;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + (__ecx >> 6) * 8)) + 0x38 + (__ecx + __ecx * 8) * 8) & 0x00000001) == 0) goto 0x3f06388d;
                				_t38 =  &_a8;
                				_a24 = __edx;
                				_a32 = __edx;
                				_v24 = _t38;
                				E0000000113F063798(__edx, __rbx,  &_a32,  &_v24,  &_a24); // executed
                				goto 0x3f0638a8;
                				E0000000113F05DE94(_t38);
                				 *_t38 =  *_t38 & 0x00000000;
                				E0000000113F05DEB4(_t38);
                				 *_t38 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}






                0x13f06380c
                0x13f06380c
                0x13f06381a
                0x13f06381c
                0x13f063821
                0x13f063824
                0x13f063829
                0x13f06382f
                0x13f063833
                0x13f063835
                0x13f06383b
                0x13f06385e
                0x13f063860
                0x13f063865
                0x13f063869
                0x13f063877
                0x13f063886
                0x13f06388b
                0x13f06388d
                0x13f063892
                0x13f063895
                0x13f06389a
                0x13f0638ac

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: baa15f1439ff166155ec0188a7d574a9c1398128c9aa2f8b05e9bd1ad3ef2240
                • Instruction ID: a8f3d14ecec724ca21dfdf4c3b4fc856a1278137379330a4decb38a81608d5c3
                • Opcode Fuzzy Hash: baa15f1439ff166155ec0188a7d574a9c1398128c9aa2f8b05e9bd1ad3ef2240
                • Instruction Fuzzy Hash: F3118F7290978099EA1CAF68D4403DD7762EB90761FA0423BF659063E7D7B9C646CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E0000000113F05A514(void* __edi, signed int* __rax, long long __rbx, void* __rcx, long long _a8) {
                				signed int _t14;
                				void* _t17;
                				char _t22;
                				void* _t34;
                				void* _t41;
                
                				_t32 = __rax;
                				_a8 = __rbx;
                				_t34 = __rcx;
                				if (__rcx != 0) goto 0x3f05a53b;
                				E0000000113F05DEB4(__rax);
                				 *((intOrPtr*)(__rax)) = 0x16;
                				E0000000113F063618();
                				goto 0x3f05a58c;
                				if (( *(__rcx + 0x14) >> 0x0000000d & 0x00000001) == 0) goto 0x3f05a582; // executed
                				_t14 = E0000000113F05F570(__rcx, __rcx, _t41); // executed
                				E0000000113F063AD0(__rax, _t34); // executed
                				_t17 = E0000000113F06380C(E0000000113F0628A4(__rax, _t34), _t22, _t32, _t34); // executed
                				if (_t17 >= 0) goto 0x3f05a56f;
                				goto 0x3f05a582;
                				if ( *(_t34 + 0x28) == 0) goto 0x3f05a582;
                				E0000000113F0636F8(_t32,  *(_t34 + 0x28));
                				 *(_t34 + 0x28) =  *(_t34 + 0x28) & 0x00000000;
                				E0000000113F0639C8(_t32, _t34);
                				return _t14 | 0xffffffff;
                			}








                0x13f05a514
                0x13f05a514
                0x13f05a51e
                0x13f05a524
                0x13f05a526
                0x13f05a52b
                0x13f05a531
                0x13f05a539
                0x13f05a546
                0x13f05a548
                0x13f05a552
                0x13f05a561
                0x13f05a568
                0x13f05a56d
                0x13f05a576
                0x13f05a578
                0x13f05a57d
                0x13f05a585
                0x13f05a596

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: d0ef11a1daf5c77af135c3ef1d0547c8555dea96a0c19ce3a97a362f6e4c738b
                • Instruction ID: dbe684ae9495f9d0183a2047bd902e24c33615fef150e9167047c4f69d523e01
                • Opcode Fuzzy Hash: d0ef11a1daf5c77af135c3ef1d0547c8555dea96a0c19ce3a97a362f6e4c738b
                • Instruction Fuzzy Hash: 45016231E0950181FE1CAA7DA8557ED1652DF867B4F750339B92A973D3DEA8CA038281
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05B2EC(long long __rcx, long long __rdx, long long __r8, long long __r9) {
                				intOrPtr* _t12;
                				intOrPtr* _t18;
                
                				_t12 = _t18;
                				 *((long long*)(_t12 + 0x20)) = __r9;
                				 *((long long*)(_t12 + 0x18)) = __r8;
                				 *((long long*)(_t12 + 0x10)) = __rdx;
                				 *((long long*)(_t12 + 8)) = __rcx;
                				if (__rdx == 0) goto 0x3f05b326;
                				if (__r8 == 0) goto 0x3f05b326;
                				if (__r9 != 0) goto 0x3f05b32e;
                				E0000000113F05DEB4(_t12);
                				 *_t12 = 0x16;
                				E0000000113F063618();
                				return 0;
                			}





                0x13f05b2ec
                0x13f05b2ef
                0x13f05b2f3
                0x13f05b2f7
                0x13f05b2fb
                0x13f05b30a
                0x13f05b30f
                0x13f05b314
                0x13f05b316
                0x13f05b31b
                0x13f05b321
                0x13f05b32d

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: a80c62e6ada2565d58023ce361e1c5d2d97b8cf4090e962c4af15217242b68a7
                • Instruction ID: f17414dd6f2f18afb27223a2d3432baf09b9f430708cce08f946575a8e7d363c
                • Opcode Fuzzy Hash: a80c62e6ada2565d58023ce361e1c5d2d97b8cf4090e962c4af15217242b68a7
                • Instruction Fuzzy Hash: 54015B76E00B15D8EB04DFA4D4416EC37B9F724358F904129EE4C1375ADB70D2A6C390
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F063680(void* __eax, signed int __rcx, signed int __rdx) {
                				intOrPtr* _t22;
                				signed int _t29;
                
                				_t29 = __rdx;
                				if (__rcx == 0) goto 0x3f06369f;
                				_t1 = _t29 - 0x20; // -32
                				_t22 = _t1;
                				if (_t22 - __rdx < 0) goto 0x3f0636e2;
                				_t25 =  ==  ? _t22 : __rcx * __rdx;
                				goto 0x3f0636c6;
                				if (E0000000113F062254() == 0) goto 0x3f0636e2;
                				if (E0000000113F06B7DC(_t22,  ==  ? _t22 : __rcx * __rdx) == 0) goto 0x3f0636e2;
                				RtlAllocateHeap(??, ??, ??); // executed
                				if (_t22 == 0) goto 0x3f0636b1;
                				goto 0x3f0636ef;
                				E0000000113F05DEB4(_t22);
                				 *_t22 = 0xc;
                				return 0;
                			}





                0x13f063680
                0x13f06368f
                0x13f063693
                0x13f063693
                0x13f06369d
                0x13f0636ab
                0x13f0636af
                0x13f0636b8
                0x13f0636c4
                0x13f0636d5
                0x13f0636de
                0x13f0636e0
                0x13f0636e2
                0x13f0636e7
                0x13f0636f4

                APIs
                • RtlAllocateHeap.NTDLL(?,?,00000000,000000013F066B75,?,?,00000000,000000013F05DEBD,?,?,?,?,000000013F06371D), ref: 000000013F0636D5
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 22fdccc01b6c5cd9d7faacf021f2115726698ea6659f548e9be8320ebb690d82
                • Instruction ID: 23e12640c6b0a0b8af8c2ba6e90397b6eb5a47e99105ebc5487d5962e5aacd6a
                • Opcode Fuzzy Hash: 22fdccc01b6c5cd9d7faacf021f2115726698ea6659f548e9be8320ebb690d82
                • Instruction Fuzzy Hash: 89F09074B0920241FE5C677E98143E54283AB84BA0F2C9039790A863D3DE2CC74B8250
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A9AC(intOrPtr* __rax, long long __rbx, long long __rcx, void* __rdx, long long __rsi, long long _a8, long long _a16, long long _a24) {
                
                				_a16 = __rbx;
                				_a24 = __rsi;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05a9f1;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618() | 0xffffffff;
                			}



                0x13f05a9ac
                0x13f05a9b1
                0x13f05a9b6
                0x13f05a9cc
                0x13f05a9ce
                0x13f05a9d3
                0x13f05a9f0

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 1c4f546164ca18eae1802da82eedabbf0edbc4d1040e53119b7d29f856b21f91
                • Instruction ID: 335f1a3b7bda16d0b987b3be193bce286eaf119711d25d5b598f4b3c66d45b28
                • Opcode Fuzzy Hash: 1c4f546164ca18eae1802da82eedabbf0edbc4d1040e53119b7d29f856b21f91
                • Instruction Fuzzy Hash: 29F05031B0C690C0FA0CFB6DA4053DD62539B84BE0F284538B919477C7DAB4C9438740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A598(intOrPtr* __rax, long long __rbx, long long __rcx, long long _a8, long long _a16) {
                
                				_a16 = __rbx;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05a5cd;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618() | 0xffffffff;
                			}



                0x13f05a598
                0x13f05a59d
                0x13f05a5ad
                0x13f05a5af
                0x13f05a5b4
                0x13f05a5cc

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: fc7da8ec63c9c5b682ca52e1ccd79e569d800c3ce5658d96a493e4382fd44d1d
                • Instruction ID: b45f07b30eee2dc7e326084c365ca0b807199ef5370f6a072a01b30f2155f44f
                • Opcode Fuzzy Hash: fc7da8ec63c9c5b682ca52e1ccd79e569d800c3ce5658d96a493e4382fd44d1d
                • Instruction Fuzzy Hash: E9F0A771A0C640C1FD1CFB7DA4197ED22929B467A0F281538BA5A573C7DAB4CA43C760
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F063738(intOrPtr* __rax, void* __rcx) {
                
                				if (__rcx - 0xffffffe0 > 0) goto 0x3f063783;
                				_t16 =  ==  ? __rax : __rcx;
                				goto 0x3f06376a;
                				if (E0000000113F062254() == 0) goto 0x3f063783;
                				if (E0000000113F06B7DC(__rax,  ==  ? __rax : __rcx) == 0) goto 0x3f063783;
                				RtlAllocateHeap(??, ??, ??); // executed
                				if (__rax == 0) goto 0x3f063755;
                				goto 0x3f063790;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0xc;
                				return 0;
                			}



                0x13f063745
                0x13f06374f
                0x13f063753
                0x13f06375c
                0x13f063768
                0x13f063776
                0x13f06377f
                0x13f063781
                0x13f063783
                0x13f063788
                0x13f063795

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 855555bc9c6b2c79e1fca54c008a68dcd0ef600c7b511f7160d1a3476ce6a968
                • Instruction ID: 658f22cbc25a16959517ba0c56c77799befbc1bc2f4a365129d84b1ef1137fb6
                • Opcode Fuzzy Hash: 855555bc9c6b2c79e1fca54c008a68dcd0ef600c7b511f7160d1a3476ce6a968
                • Instruction Fuzzy Hash: 7CF01CB5F0520545FE7C6B7D9D153E91293DB847B0F28463C7D26863C3DA6CC6478190
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05ABBC(intOrPtr* __rax, long long __rbx, long long __rcx, long long _a8, long long _a16) {
                
                				_a16 = __rbx;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05abf2;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618();
                			}



                0x13f05abbc
                0x13f05abc1
                0x13f05abd1
                0x13f05abd3
                0x13f05abd8
                0x13f05abf1

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 8ca066f28509e4cbb3c6e40597d390f45de9b8431ff5c17b9964ba57cc5e951d
                • Instruction ID: 8399b5e7182da84bfa16a431f19c29abb7f90593a9b19cc23e17efec41f59ca4
                • Opcode Fuzzy Hash: 8ca066f28509e4cbb3c6e40597d390f45de9b8431ff5c17b9964ba57cc5e951d
                • Instruction Fuzzy Hash: EFE09230A0D640C4FD0CBB6DA8093EA22139B447F0F185B38BA3D077C3DAB8C6928740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F066BE4(intOrPtr __eax, void* __ecx, void* __rax) {
                				void* _t13;
                				void* _t15;
                				void* _t16;
                				void* _t17;
                
                				E0000000113F065E9C(); // executed
                				 *0x3f0822b8 = __eax;
                				if (__eax != 0xffffffff) goto 0x3f066c03;
                				goto 0x3f066c18;
                				E0000000113F066B18(__rax, _t13, 0x13f06681c, _t15, _t16, _t17);
                				if (__rax != 0) goto 0x3f066c16;
                				E0000000113F066C20();
                				goto 0x3f066bff;
                				return 1;
                			}







                0x13f066bef
                0x13f066bf4
                0x13f066bfd
                0x13f066c01
                0x13f066c03
                0x13f066c0b
                0x13f066c0f
                0x13f066c14
                0x13f066c1c

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: __vcrt_uninitialize_ptdtry_get_function
                • String ID:
                • API String ID: 4056716597-0
                • Opcode ID: beb66c14742b2adbb37354a522f89f272634b3a2c3c382bf3c8d097eeb669d58
                • Instruction ID: e7b8ebdab3663dff1b00968086fa9662a2367be2786f05108035b010da65cc6f
                • Opcode Fuzzy Hash: beb66c14742b2adbb37354a522f89f272634b3a2c3c382bf3c8d097eeb669d58
                • Instruction Fuzzy Hash: BCE0E270E05A00E0FE5C7B3D59623FC5283EB6A330FB01A3DF01A4A2E3E52947835640
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F0636F8(intOrPtr* __rax, void* __rcx) {
                				int _t1;
                				intOrPtr _t4;
                				void* _t10;
                				intOrPtr _t14;
                
                				if (__rcx == 0) goto 0x3f063734;
                				_t14 =  *0x3f091ff0; // 0x430000, executed
                				_t1 = HeapFree(_t10, ??); // executed
                				if (_t1 != 0) goto 0x3f06372f;
                				E0000000113F05DEB4(__rax);
                				_t4 = E0000000113F05DDFC(GetLastError(), __rax, _t14, __rcx);
                				 *__rax = _t4;
                				return _t4;
                			}







                0x13f0636fb
                0x13f063707
                0x13f06370e
                0x13f063716
                0x13f063718
                0x13f063728
                0x13f06372d
                0x13f063734

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: a9c3a04f92d78bd22edb1084f7c596e78490b11044c3f0e8eeefbb67fa4a8c59
                • Instruction ID: 74bff72fb526fc90e1543345c0bda49d9238c34a150ec59508788689c86601b1
                • Opcode Fuzzy Hash: a9c3a04f92d78bd22edb1084f7c596e78490b11044c3f0e8eeefbb67fa4a8c59
                • Instruction Fuzzy Hash: B2D022B1F07044C2FE3CA3FB98803F602939FA4780F08003CB91840363EE108B831280
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressProc
                • String ID: Failed to get address for PyDict_GetItemString$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyList_New$Failed to get address for PyLong_AsLong$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyRun_SimpleString$Failed to get address for PySys_AddWarnOption$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetArgvEx$Failed to get address for PySys_SetObject$Failed to get address for PySys_SetPath$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for Py_BuildValue$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_DontWriteBytecodeFlag$Failed to get address for Py_FileSystemDefaultEncoding$Failed to get address for Py_Finalize$Failed to get address for Py_FrozenFlag$Failed to get address for Py_GetPath$Failed to get address for Py_IgnoreEnvironmentFlag$Failed to get address for Py_IncRef$Failed to get address for Py_Initialize$Failed to get address for Py_NoSiteFlag$Failed to get address for Py_NoUserSiteDirectory$Failed to get address for Py_OptimizeFlag$Failed to get address for Py_SetPath$Failed to get address for Py_SetProgramName$Failed to get address for Py_SetPythonHome$Failed to get address for Py_UnbufferedStdioFlag$Failed to get address for Py_VerboseFlag$GetProcAddress$PyDict_GetItemString$PyErr_Clear$PyErr_Fetch$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyList_New$PyLong_AsLong$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyRun_SimpleString$PySys_AddWarnOption$PySys_GetObject$PySys_SetArgvEx$PySys_SetObject$PySys_SetPath$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$Py_BuildValue$Py_DecRef$Py_DecodeLocale$Py_DontWriteBytecodeFlag$Py_FileSystemDefaultEncoding$Py_Finalize$Py_FrozenFlag$Py_GetPath$Py_IgnoreEnvironmentFlag$Py_IncRef$Py_Initialize$Py_NoSiteFlag$Py_NoUserSiteDirectory$Py_OptimizeFlag$Py_SetPath$Py_SetProgramName$Py_SetPythonHome$Py_UnbufferedStdioFlag$Py_VerboseFlag
                • API String ID: 190572456-223677313
                • Opcode ID: 441201153760758a4a232ac8bdcb5c66e9e7ed8267697bc55fc78af3bb1f5ddc
                • Instruction ID: 05ce9d4ff266d8a45fd3259558df83f13e5f8433b6674999afc1fbbd6c4c4b22
                • Opcode Fuzzy Hash: 441201153760758a4a232ac8bdcb5c66e9e7ed8267697bc55fc78af3bb1f5ddc
                • Instruction Fuzzy Hash: A7323FB4A06B01D1FA6DCB2DE8983D463A3BB04780F94547DE80E06267EFB8D75AD650
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressProc$ByteCharErrorFormatLastLibraryLoadMessageMultiWide
                • String ID: 8$ActivateActCtx$CreateActCtxW$Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$kernel32$win32_utils_from_utf8
                • API String ID: 476984482-1231727188
                • Opcode ID: d161a56525f8f7ae18cd287bb217fa4d96b651665fadfcecb71260ee62b8af71
                • Instruction ID: 75aa9acc26664c6809158947388aeeaa506ff9c16b9c218bae4e0b75357eeac2
                • Opcode Fuzzy Hash: d161a56525f8f7ae18cd287bb217fa4d96b651665fadfcecb71260ee62b8af71
                • Instruction Fuzzy Hash: E1417A31A14B8081FA18CB2AE81839963A3F7847A4F544379F96D437E6EF78C64AC740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 77%
                			E0000000113F06C13C(void* __edx, signed int __rcx, long long __r8, signed int __r9, void* __r11) {
                				void* __rbx;
                				void* __rsi;
                				void* __r13;
                				void* _t507;
                				void* _t519;
                				void* _t527;
                				signed long long _t536;
                				signed int _t561;
                				intOrPtr _t568;
                				void* _t573;
                				void* _t588;
                				signed long long _t598;
                				signed int _t606;
                				intOrPtr _t614;
                				void* _t619;
                				void* _t634;
                				signed long long _t643;
                				void* _t651;
                				signed int _t675;
                				intOrPtr _t679;
                				signed int _t726;
                				signed int _t734;
                				intOrPtr _t736;
                				signed int _t741;
                				signed long long _t743;
                				signed long long _t749;
                				signed long long _t755;
                				intOrPtr _t784;
                				signed int _t809;
                				signed int _t811;
                				signed int _t814;
                				signed int _t815;
                				void* _t819;
                				void* _t821;
                				void* _t826;
                				void* _t856;
                				void* _t862;
                				signed long long _t972;
                				signed long long _t974;
                				intOrPtr _t979;
                				signed long long _t980;
                				void* _t982;
                				signed long long _t984;
                				signed long long _t985;
                				signed long long _t986;
                				signed long long _t987;
                				signed long long _t989;
                				void* _t992;
                				intOrPtr* _t993;
                				signed long long _t1004;
                				void* _t1007;
                				signed long long _t1014;
                				long long _t1035;
                				void* _t1051;
                				signed long long _t1059;
                				signed long long _t1060;
                				signed long long _t1067;
                				signed long long _t1071;
                				signed long long _t1081;
                				signed long long _t1085;
                				signed long long _t1089;
                				void* _t1090;
                				signed long long _t1091;
                				signed long long _t1096;
                				signed long long _t1097;
                				char* _t1098;
                				void* _t1099;
                				signed long long _t1100;
                				signed long long _t1101;
                				void* _t1103;
                				void* _t1104;
                				signed long long _t1105;
                				signed long long _t1110;
                				signed long long _t1111;
                				signed long long _t1112;
                				signed long long _t1123;
                				signed long long _t1124;
                				signed long long _t1139;
                				signed long long _t1140;
                				signed long long _t1151;
                				signed long long _t1152;
                				long long _t1166;
                				void* _t1167;
                
                				_t1152 = __r9;
                				_t1103 = _t1104 - 0x6d8;
                				_t1105 = _t1104 - 0x7d8;
                				_t972 =  *0x3f082018; // 0x3bece1c8a3ca
                				 *(_t1103 + 0x6c0) = _t972 ^ _t1105;
                				 *(_t1105 + 0x38) = __rcx;
                				_t1100 = __r9;
                				 *((long long*)(_t1105 + 0x68)) = __r9;
                				_t1166 = __r8;
                				 *((long long*)(_t1105 + 0x78)) = __r8;
                				E0000000113F06FCF8(_t1105 + 0x58);
                				r12d = 0;
                				if (( *(_t1105 + 0x58) & 0x0000001f) != 0x1f) goto 0x3f06c19f;
                				 *((intOrPtr*)(_t1105 + 0x60)) = r12b;
                				goto 0x3f06c1ae;
                				_t507 = E0000000113F06FD64(( *(_t1105 + 0x58) & 0x0000001f) - 0x1f, _t1105 + 0x58);
                				 *((char*)(_t1105 + 0x60)) = 1;
                				_t974 =  *(_t1105 + 0x38);
                				 *((long long*)(__r8 + 8)) = __r9;
                				r9d = 0x7ff;
                				_t13 = _t984 + 0xd; // 0x2d
                				_t741 = _t13;
                				_t683 =  <  ? _t741 : 0x20;
                				 *((intOrPtr*)(__r8)) =  <  ? _t741 : 0x20;
                				if (_t974 != 0) goto 0x3f06c1fb;
                				if ((0xffffffff & _t974) != 0) goto 0x3f06c1fb;
                				 *(__r8 + 4) = r12d;
                				goto 0x3f06d33a;
                				_t819 = (_t974 >> 0x00000034 & __r9) - __r9;
                				if (_t819 == 0) goto 0x3f06c205;
                				goto 0x3f06c246;
                				if (_t819 != 0) goto 0x3f06c214;
                				goto 0x3f06c23e;
                				if (_t974 >= 0) goto 0x3f06c22f;
                				_t821 = (_t974 & 0xffffffff) - 0;
                				if (_t821 != 0) goto 0x3f06c22f;
                				goto 0x3f06c23e;
                				 *(__r8 + 4) = 1;
                				if (_t821 == 0) goto 0x3f06d34f;
                				if (_t821 == 0) goto 0x3f06d333;
                				if (_t821 == 0) goto 0x3f06d32a;
                				if (0 == 1) goto 0x3f06d321;
                				 *(_t1105 + 0x38) = _t974 & 0xffffffff;
                				_t784 = __edx + 1;
                				asm("movsd xmm0, [esp+0x38]");
                				 *((intOrPtr*)(_t1105 + 0x50)) = _t784;
                				asm("movsd [esp+0x48], xmm0");
                				_t1059 =  *(_t1105 + 0x48);
                				_t1110 = _t1059 >> 0x34;
                				asm("dec eax");
                				_t1060 = _t1059 & 0xffffffff;
                				_t1004 =  ~(_t1110 & __r9);
                				asm("sbb eax, eax");
                				r8d = r8d & r9d;
                				r15d = __r9 + 0;
                				r15d = r15d + r8d;
                				0x3f06fe80();
                				E0000000113F06FDB4(_t507, _t1110);
                				asm("cvttsd2si ecx, xmm0");
                				 *((intOrPtr*)(_t1103 - 0x7c)) = _t784;
                				asm("inc ebp");
                				r13d = r13d & 0;
                				 *((intOrPtr*)(_t1103 - 0x78)) = _t784;
                				 *(_t1105 + 0x40) = r13d;
                				asm("sbb edx, edx");
                				_t743 =  ~_t741 + 1;
                				 *(_t1103 - 0x80) = _t743;
                				if (r15d - 0x434 < 0) goto 0x3f06c59d;
                				 *(_t1103 + 0x328) = 0x100000;
                				 *((intOrPtr*)(_t1103 + 0x324)) = 0;
                				 *(_t1103 + 0x320) = 2;
                				if (_t784 == 0) goto 0x3f06c47a;
                				r8d = r12d;
                				if ( *((intOrPtr*)(_t1103 + 0x324 + _t1004 * 4)) !=  *(_t1103 + _t1004 * 4 - 0x7c)) goto 0x3f06c47a;
                				r8d = r8d + 1;
                				_t826 = r8d - 2;
                				if (_t826 != 0) goto 0x3f06c33b;
                				r11d = _t1167 - 0x432;
                				 *(_t1105 + 0x38) = r12d;
                				r8d = r11d;
                				r11d = r11d & 0x0000001f;
                				r8d = r8d >> 5;
                				asm("bsr eax, [ebp+eax*4-0x7c]");
                				r15d = 1;
                				r15d =  !r15d;
                				if (_t826 == 0) goto 0x3f06c395;
                				goto 0x3f06c398;
                				_t519 = _t1060 + _t1110;
                				if (_t519 != 0x73) goto 0x3f06c3aa;
                				if (r11d - 0x20 > 0) goto 0x3f06c3ad;
                				r12d = r12d | 0xffffffff;
                				if (_t519 - 0x73 > 0) goto 0x3f06c446;
                				if (r12b != 0) goto 0x3f06c446;
                				r14d = 0x72;
                				r14d =  <  ? _t519 : r14d;
                				r10d = r14d;
                				if (r14d == r12d) goto 0x3f06c426;
                				if (r10d - r8d < 0) goto 0x3f06c426;
                				if (r10d - r8d - _t743 >= 0) goto 0x3f06c3f0;
                				r9d =  *(_t1103 + 0x3fffffffffff84);
                				goto 0x3f06c3f3;
                				r9d = 0;
                				if (0xfffffffffffff - _t743 >= 0) goto 0x3f06c3fd;
                				goto 0x3f06c3ff;
                				r9d = r9d & 0;
                				r10d = r10d + r12d;
                				r9d = r9d << r11d;
                				 *(_t1103 + 0x3fffffffffff84) = (0 & r15d) >> 0x00000020 - r11d | r9d;
                				if (r10d == r12d) goto 0x3f06c426;
                				_t749 =  *(_t1103 - 0x80);
                				goto 0x3f06c3d7;
                				if (r8d == 0) goto 0x3f06c439;
                				 *(_t1103 + _t1004 * 4 - 0x7c) =  *(_t1103 + _t1004 * 4 - 0x7c) & 0x00000000;
                				if (1 != r8d) goto 0x3f06c42d;
                				r14d =  >  ? __r8 + 1 : r14d;
                				goto 0x3f06c449;
                				r14d = 0;
                				 *(_t1103 + 0x328) =  *(_t1103 + 0x328) & 0x00000000;
                				r15d = 1;
                				 *(_t1103 + 0x150) = r15d;
                				 *(_t1103 - 0x80) = r14d;
                				 *(_t1103 + 0x320) = 1;
                				 *(_t1103 + 0x154) = 4;
                				goto 0x3f06c79c;
                				r11d = _t1167 - 0x433;
                				 *(_t1105 + 0x38) = r12d;
                				r8d = r11d;
                				r11d = r11d & 0x0000001f;
                				r8d = r8d >> 5;
                				_t1096 = (_t1091 & 0x00000000) + _t1060 >> 0x20 << 0x20 << 0x20;
                				asm("bsr eax, [ebp+eax*4-0x7c]");
                				r15d = 1;
                				r15d =  !r15d;
                				if (r11d == 0x20) goto 0x3f06c4b8;
                				goto 0x3f06c4bb;
                				_t527 = _t1060 + _t1110;
                				if (_t527 != 0x73) goto 0x3f06c4cd;
                				if (r11d - 0x20 > 0) goto 0x3f06c4d0;
                				r12d = r12d | 0xffffffff;
                				if (_t527 - 0x73 > 0) goto 0x3f06c569;
                				if (r12b != 0) goto 0x3f06c569;
                				r14d = 0x72;
                				r14d =  <  ? _t527 : r14d;
                				r10d = r14d;
                				if (r14d == r12d) goto 0x3f06c549;
                				if (r10d - r8d < 0) goto 0x3f06c549;
                				if (r10d - r8d - _t749 >= 0) goto 0x3f06c513;
                				r9d =  *(_t1103 + 0x3fffffffffff84);
                				goto 0x3f06c516;
                				r9d = 0;
                				if (0xfffffffffffff - _t749 >= 0) goto 0x3f06c520;
                				goto 0x3f06c522;
                				r9d = r9d & 0x00000001;
                				r10d = r10d + r12d;
                				r9d = r9d << r11d;
                				 *(_t1103 + 0x3fffffffffff84) = (0 & r15d) >> 0x00000020 | r9d;
                				if (r10d == r12d) goto 0x3f06c549;
                				_t755 =  *(_t1103 - 0x80);
                				goto 0x3f06c4fa;
                				if (r8d == 0) goto 0x3f06c55c;
                				 *(_t1103 + _t1004 * 4 - 0x7c) =  *(_t1103 + _t1004 * 4 - 0x7c) & 0x00000000;
                				if (1 != r8d) goto 0x3f06c550;
                				r14d =  >  ? __r8 + 1 : r14d;
                				goto 0x3f06c56c;
                				r14d = 0;
                				 *(_t1103 + 0x328) =  *(_t1103 + 0x328) & 0x00000000;
                				r15d = 1;
                				 *(_t1103 + 0x150) = r15d;
                				 *(_t1103 - 0x80) = r14d;
                				 *(_t1103 + 0x320) = 1;
                				 *(_t1103 + 0x154) = 2;
                				goto 0x3f06c79c;
                				if (r15d == 0x36) goto 0x3f06c6d0;
                				 *(_t1103 + 0x328) = 0x100000;
                				 *((intOrPtr*)(_t1103 + 0x324)) = 0;
                				 *(_t1103 + 0x320) = 0x20;
                				if (0 == 0) goto 0x3f06c6d0;
                				r8d = r12d;
                				if ( *((intOrPtr*)(_t1103 + 0x324 + _t1004 * 4)) !=  *(_t1103 + _t1004 * 4 - 0x7c)) goto 0x3f06c6d0;
                				r8d = r8d + 1;
                				_t856 = r8d - 0x20;
                				if (_t856 != 0) goto 0x3f06c5ca;
                				asm("bsr eax, edi");
                				 *(_t1105 + 0x38) = r12d;
                				if (_t856 == 0) goto 0x3f06c5f4;
                				goto 0x3f06c5f7;
                				r14d = _t755;
                				r12d = r12d | 0xffffffff;
                				_t536 = _t755;
                				r10d = _t536;
                				r8d = 0xfffffffffffff;
                				if (_t536 - _t755 >= 0) goto 0x3f06c614;
                				r9d =  *(_t1103 + 0x3fffffffffff80);
                				goto 0x3f06c617;
                				r9d = 0;
                				if (r8d - _t755 >= 0) goto 0x3f06c623;
                				goto 0x3f06c625;
                				 *(_t1103 + 0x3fffffffffff80) = 0 >> 0x0000001e | r9d << 0x00000002;
                				if (r8d == r12d) goto 0x3f06c642;
                				goto 0x3f06c602;
                				r14d =  <  ? __r8 + 1 : r14d;
                				 *(_t1103 - 0x80) = r14d;
                				_t985 = _t984 << 2;
                				_t1111 = _t985;
                				E0000000113F0597D0(__r8 + 1, 0, _t1103 + 0x324, _t1060, _t1111);
                				 *(_t1103 + _t985 + 0x324) = 1;
                				_t118 = _t1096 + 1; // 0x437
                				r15d = _t118;
                				r8d = r15d;
                				_t1112 = _t1111 << 2;
                				 *(_t1103 + 0x320) = r15d;
                				 *(_t1103 + 0x150) = r15d;
                				if (_t1112 == 0) goto 0x3f06c79c;
                				_t862 = _t1112 - _t985;
                				if (_t862 > 0) goto 0x3f06c77b;
                				E0000000113F0593C0(1 << sil, _t1103 + 0x154, _t1103 + 0x324, _t1112);
                				goto 0x3f06c795;
                				 *(_t1105 + 0x38) = r12d;
                				asm("bsr eax, [ebp+eax*4-0x7c]");
                				if (_t862 == 0) goto 0x3f06c6e3;
                				goto 0x3f06c6e6;
                				r14d = 0;
                				r12d = r12d | 0xffffffff;
                				r10d = 0;
                				r8d = 0xfffffffffffff;
                				if (0 >= 0) goto 0x3f06c703;
                				r9d =  *(_t1103 + 0x3fffffffffff80);
                				goto 0x3f06c706;
                				r9d = 0;
                				if (r8d >= 0) goto 0x3f06c712;
                				goto 0x3f06c714;
                				 *(_t1103 + 0x3fffffffffff80) = 0 >> 0x0000001f | _t1152 + _t1152;
                				if (r8d == r12d) goto 0x3f06c72f;
                				goto 0x3f06c6f1;
                				_t1007 = _t1103 + 0x324;
                				r14d =  <  ? __r8 + 1 : r14d;
                				 *(_t1103 - 0x80) = r14d;
                				_t986 = _t985 << 2;
                				E0000000113F0597D0(__r8 + 1, 0, _t1007, _t1103 + 0x324, _t986);
                				 *(_t1103 + _t986 + 0x324) = 1;
                				goto 0x3f06c688;
                				E0000000113F0597D0(1 << sil, 0, _t1007, _t1103 + 0x324, _t986);
                				E0000000113F05DEB4(0);
                				 *0 = 0x22;
                				E0000000113F063618();
                				r15d =  *(_t1103 + 0x150);
                				if (r13d < 0) goto 0x3f06cc9a;
                				_t561 = 0xcccccccd * r13d >> 0x20 >> 3;
                				 *(_t1105 + 0x38) = _t561;
                				r12d = _t561;
                				 *(_t1105 + 0x30) = _t561;
                				if (_t561 == 0) goto 0x3f06cb9d;
                				r13d = r12d;
                				r13d =  >  ? 0x26 : r13d;
                				 *(_t1105 + 0x44) = r13d;
                				_t987 = _t986 << 2;
                				 *(_t1103 + 0x320) = _t1100 + _t1007;
                				E0000000113F0597D0(_t1100 + _t1007, 0, _t1103 + 0x324, 0x13f050000, _t987);
                				_t1101 = _t1100 << 2;
                				E0000000113F0593C0( *(0x13f050000 + 0x2d7c0 + _t1096 * 4) & 0x0000ffff, _t1103 + 0x324 + _t987, 0x4000013f07ceb0, _t1101);
                				r10d =  *(_t1103 + 0x320);
                				if (r10d - 1 > 0) goto 0x3f06c8f9;
                				_t568 =  *((intOrPtr*)(_t1103 + 0x324));
                				if (_t568 != 0) goto 0x3f06c870;
                				r15d = 0;
                				 *(_t1103 + 0x150) = r15d;
                				goto 0x3f06cb70;
                				if (_t568 == 1) goto 0x3f06cb70;
                				if (r15d == 0) goto 0x3f06cb70;
                				r8d = 0;
                				r9d = 0;
                				r9d = r9d + 1;
                				if (r9d != r15d) goto 0x3f06c88b;
                				if (r8d == 0) goto 0x3f06c8ed;
                				if ( *(_t1103 + 0x150) - 0x73 >= 0) goto 0x3f06c8dc;
                				 *(_t1103 + 0x40000000000154) = r8d;
                				r15d =  *(_t1103 + 0x150);
                				r15d = r15d + 1;
                				goto 0x3f06c864;
                				r15d = 0;
                				 *(_t1103 + 0x150) = r15d;
                				goto 0x3f06cb72;
                				r15d =  *(_t1103 + 0x150);
                				goto 0x3f06cb70;
                				if (r15d - 1 > 0) goto 0x3f06c9b0;
                				_t675 =  *(_t1103 + 0x154);
                				r15d = r10d;
                				 *(_t1103 + 0x150) = r10d;
                				if (0 << 2 == 0) goto 0x3f06c95f;
                				_t1014 = _t1103 + 0x154;
                				if (0 << 2 - 0 > 0) goto 0x3f06c93e;
                				_t573 = E0000000113F0593C0(0x1cc, _t1014, _t1103 + 0x324, 0 << 2);
                				goto 0x3f06c958;
                				E0000000113F0597D0(_t573, 0, _t1014, _t1103 + 0x324, 0);
                				E0000000113F05DEB4(0);
                				 *0 = 0x22;
                				E0000000113F063618();
                				r15d =  *(_t1103 + 0x150);
                				if (_t675 == 0) goto 0x3f06c861;
                				if (_t675 == 1) goto 0x3f06cb70;
                				if (r15d == 0) goto 0x3f06cb70;
                				r8d = 0;
                				r9d = 0;
                				_t1123 = _t1014 * _t987 + 0 >> 0x20;
                				r9d = r9d + 1;
                				if (r9d != r15d) goto 0x3f06c982;
                				goto 0x3f06c8b4;
                				r12d = r15d;
                				_t1165 =  >=  ? _t1103 + 0x154 : _t1103 + 0x324;
                				r12d =  <  ? r10d : r12d;
                				_t1067 =  >=  ? _t1103 + 0x324 : _t1103 + 0x154;
                				 *(_t1105 + 0x48) = _t1067;
                				r10d =  !=  ? r15d : r10d;
                				r15d = 0;
                				r9d = 0;
                				 *(_t1103 + 0x4f0) = r15d;
                				if (r12d == 0) goto 0x3f06cb13;
                				_t809 =  *(( >=  ? _t1103 + 0x154 : _t1103 + 0x324) + _t1152 * 4);
                				if (_t809 != 0) goto 0x3f06ca2f;
                				if (r9d != r15d) goto 0x3f06cb07;
                				 *(_t1103 + 0x4f4 + _t1152 * 4) =  *(_t1103 + 0x4f4 + _t1152 * 4) & _t809;
                				_t213 = _t1152 + 1; // 0x1
                				r15d = _t213;
                				 *(_t1103 + 0x4f0) = r15d;
                				goto 0x3f06cb07;
                				r11d = 0;
                				r8d = r9d;
                				if (r10d == 0) goto 0x3f06caf8;
                				if (r8d == 0x73) goto 0x3f06caa6;
                				if (r8d != r15d) goto 0x3f06ca63;
                				 *(_t1103 + 0x4f4 + _t1096 * 4) =  *(_t1103 + 0x4f4 + _t1096 * 4) & 0x00000000;
                				_t221 = _t1123 + 1; // 0x1
                				 *(_t1103 + 0x4f0) = _t221;
                				r8d = r8d + 1;
                				 *(_t1103 + 0x4f4 + _t1096 * 4) =  *(_t1067 + 0x40000000000000);
                				r15d =  *(_t1103 + 0x4f0);
                				if (_t1123 + _t987 == r10d) goto 0x3f06caa6;
                				_t1071 =  *(_t1105 + 0x48);
                				goto 0x3f06ca43;
                				if (r11d == 0) goto 0x3f06caf8;
                				if (r8d == 0x73) goto 0x3f06cc8e;
                				if (r8d != r15d) goto 0x3f06cacf;
                				 *(_t1103 + 0x4f4 + _t1071 * 4) =  *(_t1103 + 0x4f4 + _t1071 * 4) & 0x00000000;
                				_t241 = _t1123 + 1; // 0x1
                				 *(_t1103 + 0x4f0) = _t241;
                				r8d = r8d + 1;
                				_t726 = r11d;
                				 *(_t1103 + 0x4f4 + _t1071 * 4) = _t726;
                				r15d =  *(_t1103 + 0x4f0);
                				r11d = _t726;
                				if (_t726 != 0) goto 0x3f06caab;
                				if (r8d == 0x73) goto 0x3f06cc8e;
                				r9d = r9d + 1;
                				if (r9d != r12d) goto 0x3f06ca02;
                				r8d = r15d;
                				_t1124 = _t1123 << 2;
                				 *(_t1103 + 0x150) = r15d;
                				if (_t1124 == 0) goto 0x3f06cb66;
                				if (_t1124 - 0 > 0) goto 0x3f06cb45;
                				_t588 = E0000000113F0593C0(0x1cc, _t1103 + 0x154, _t1103 + 0x4f4, _t1124);
                				goto 0x3f06cb5f;
                				E0000000113F0597D0(_t588, 0, _t1103 + 0x154, _t1103 + 0x4f4, 0);
                				E0000000113F05DEB4(0);
                				 *0 = 0x22;
                				E0000000113F063618();
                				r15d =  *(_t1103 + 0x150);
                				r12d =  *(_t1105 + 0x30);
                				r13d =  *(_t1105 + 0x44);
                				if (1 == 0) goto 0x3f06cc8e;
                				r12d = r12d - r13d;
                				 *(_t1105 + 0x30) = r12d;
                				if (1 != 0) goto 0x3f06c7d1;
                				r13d =  *(_t1105 + 0x40);
                				if (1 == 0) goto 0x3f06cc2e;
                				_t598 =  *0x4000013F07D858;
                				if (_t598 == 0) goto 0x3f06cc8e;
                				if (_t598 == 1) goto 0x3f06cc2e;
                				if (r15d == 0) goto 0x3f06cc2e;
                				r8d = 0;
                				r10d = _t598;
                				r9d = 0;
                				r9d = r9d + 1;
                				if (r9d != r15d) goto 0x3f06cbd2;
                				if (r8d == 0) goto 0x3f06cc27;
                				if ( *(_t1103 + 0x150) - 0x73 >= 0) goto 0x3f06cc8e;
                				 *(_t1103 + 0x40000000000154) = r8d;
                				r15d =  *(_t1103 + 0x150);
                				r15d = r15d + 1;
                				goto 0x3f06cc91;
                				r15d =  *(_t1103 + 0x150);
                				_t1097 =  *((intOrPtr*)(_t1105 + 0x68));
                				r12d = 0;
                				if (r14d == 0) goto 0x3f06d10c;
                				r8d = r12d;
                				r9d = r12d;
                				r9d = r9d + 1;
                				 *(_t1103 + 0x4fc13ff84) = r8d;
                				if (r9d != r14d) goto 0x3f06cc48;
                				if (r8d == 0) goto 0x3f06d10c;
                				if ( *(_t1103 - 0x80) - 0x73 >= 0) goto 0x3f06d0e9;
                				 *(_t1103 + 0x3fffffffffff84) = r8d;
                				 *(_t1103 - 0x80) =  *(_t1103 - 0x80) + 1;
                				goto 0x3f06d10c;
                				r15d = 0;
                				 *(_t1103 + 0x150) = r15d;
                				goto 0x3f06cc2e;
                				r13d =  ~r13d;
                				_t606 =  *(_t1103 - 0x80) * r13d >> 0x20 >> 3;
                				 *(_t1105 + 0x44) = _t606;
                				r12d = _t606;
                				 *(_t1105 + 0x30) = _t606;
                				if (_t606 == 0) goto 0x3f06d051;
                				_t608 =  >  ? 0x26 : r12d;
                				 *(_t1105 + 0x38) =  >  ? 0x26 : r12d;
                				_t989 = _t1097 << 2;
                				 *(_t1103 + 0x320) = _t1101 + 0x50000000000000;
                				E0000000113F0597D0(_t1101 + 0x50000000000000, 0, _t1103 + 0x324, 0x13f050000, _t989);
                				_t1102 = _t1101 << 2;
                				E0000000113F0593C0( *(0x13f050000 + 0x2d7c0 + _t1097 * 4) & 0x0000ffff, _t1103 + 0x324 + _t989, 0x4000013f07ceb0, _t1101 << 2);
                				r10d =  *(_t1103 + 0x320);
                				if (r10d - 1 > 0) goto 0x3f06cdcd;
                				_t614 =  *((intOrPtr*)(_t1103 + 0x324));
                				if (_t614 != 0) goto 0x3f06cd5c;
                				r14d = 0;
                				 *(_t1103 - 0x80) = r14d;
                				goto 0x3f06d027;
                				if (_t614 == 1) goto 0x3f06d027;
                				if (r14d == 0) goto 0x3f06d027;
                				r8d = 0;
                				r9d = 0;
                				r9d = r9d + 1;
                				if (r9d != r14d) goto 0x3f06cd77;
                				if (r8d == 0) goto 0x3f06cdc4;
                				if ( *(_t1103 - 0x80) - 0x73 >= 0) goto 0x3f06cdb6;
                				 *(_t1103 + 0x3fffffffffff84) = r8d;
                				r14d =  *(_t1103 - 0x80);
                				r14d = r14d + 1;
                				goto 0x3f06cd53;
                				r14d = 0;
                				 *(_t1103 - 0x80) = r14d;
                				goto 0x3f06d029;
                				r14d =  *(_t1103 - 0x80);
                				goto 0x3f06d027;
                				if (r14d - 1 > 0) goto 0x3f06ce72;
                				_t679 =  *((intOrPtr*)(_t1103 - 0x7c));
                				r14d = r10d;
                				 *(_t1103 - 0x80) = r10d;
                				if (0 << 2 == 0) goto 0x3f06ce27;
                				if (0 << 2 - 0 > 0) goto 0x3f06ce09;
                				_t619 = E0000000113F0593C0(0x1cc, _t1103 - 0x7c, _t1103 + 0x324, 0 << 2);
                				goto 0x3f06ce23;
                				E0000000113F0597D0(_t619, 0, _t1103 - 0x7c, _t1103 + 0x324, 0);
                				E0000000113F05DEB4(0);
                				 *0 = 0x22;
                				E0000000113F063618();
                				r14d =  *(_t1103 - 0x80);
                				if (_t679 == 0) goto 0x3f06cd50;
                				if (_t679 == 1) goto 0x3f06d027;
                				if (r14d == 0) goto 0x3f06d027;
                				r8d = 0;
                				r9d = 0;
                				r9d = r9d + 1;
                				if (r9d != r14d) goto 0x3f06ce4a;
                				goto 0x3f06cd9a;
                				r12d = r14d;
                				_t1035 =  >=  ? _t1103 - 0x7c : _t1103 + 0x324;
                				_t1139 = _t1103 + 0x324;
                				r12d =  <  ? r10d : r12d;
                				 *((long long*)(_t1105 + 0x70)) = _t1035;
                				_t1081 =  >=  ? _t1139 : _t1103 - 0x7c;
                				 *(_t1105 + 0x48) = _t1081;
                				r10d =  !=  ? r14d : r10d;
                				r14d = 0;
                				r9d = 0;
                				 *(_t1103 + 0x4f0) = r14d;
                				if (r12d == 0) goto 0x3f06cfd8;
                				_t811 =  *(_t1035 + _t1152 * 4);
                				if (_t811 != 0) goto 0x3f06ceef;
                				if (r9d != r14d) goto 0x3f06cfcc;
                				 *(_t1103 + 0x4f4 + _t1152 * 4) =  *(_t1103 + 0x4f4 + _t1152 * 4) & _t811;
                				_t369 = _t1152 + 1; // 0x1
                				r14d = _t369;
                				 *(_t1103 + 0x4f0) = r14d;
                				goto 0x3f06cfcc;
                				r11d = 0;
                				r8d = r9d;
                				if (r10d == 0) goto 0x3f06cfb8;
                				if (r8d == 0x73) goto 0x3f06cf66;
                				if (r8d != r14d) goto 0x3f06cf23;
                				 *(_t1103 + 0x4f4 + _t1097 * 4) =  *(_t1103 + 0x4f4 + _t1097 * 4) & 0x00000000;
                				_t377 = _t1139 + 1; // 0x1
                				 *(_t1103 + 0x4f0) = _t377;
                				r8d = r8d + 1;
                				 *(_t1103 + 0x4f4 + _t1097 * 4) =  *(_t1081 + 0x40000000000000);
                				r14d =  *(_t1103 + 0x4f0);
                				if (_t989 + _t1139 == r10d) goto 0x3f06cf66;
                				_t1085 =  *(_t1105 + 0x48);
                				goto 0x3f06cf03;
                				if (r11d == 0) goto 0x3f06cfb8;
                				if (r8d == 0x73) goto 0x3f06d0d8;
                				if (r8d != r14d) goto 0x3f06cf8f;
                				 *(_t1103 + 0x4f4 + _t1085 * 4) =  *(_t1103 + 0x4f4 + _t1085 * 4) & 0x00000000;
                				_t397 = _t1139 + 1; // 0x1
                				 *(_t1103 + 0x4f0) = _t397;
                				_t734 =  *(_t1103 + 0x4f4 + _t1085 * 4);
                				r8d = r8d + 1;
                				 *(_t1103 + 0x4f4 + _t1085 * 4) = _t734;
                				r14d =  *(_t1103 + 0x4f0);
                				r11d = _t734;
                				if (_t734 != 0) goto 0x3f06cf6b;
                				if (r8d == 0x73) goto 0x3f06d0d8;
                				r9d = r9d + 1;
                				if (r9d != r12d) goto 0x3f06cec3;
                				r8d = r14d;
                				_t1140 = _t1139 << 2;
                				 *(_t1103 - 0x80) = r14d;
                				if (_t1140 == 0) goto 0x3f06d022;
                				if (_t1140 - 0 > 0) goto 0x3f06d004;
                				_t634 = E0000000113F0593C0(0x1cc, _t1103 - 0x7c, _t1103 + 0x4f4, _t1140);
                				goto 0x3f06d01e;
                				E0000000113F0597D0(_t634, 0, _t1103 - 0x7c, _t1103 + 0x4f4, 0);
                				E0000000113F05DEB4(0);
                				 *0 = 0x22;
                				E0000000113F063618();
                				r14d =  *(_t1103 - 0x80);
                				r12d =  *(_t1105 + 0x30);
                				if (1 == 0) goto 0x3f06d0d8;
                				r12d = r12d -  *(_t1105 + 0x38);
                				 *(_t1105 + 0x30) = r12d;
                				if (1 != 0) goto 0x3f06ccc4;
                				r13d = r13d - 0xa0000000000000;
                				if (1 == 0) goto 0x3f06cc2e;
                				_t643 =  *0x4000013F07D858;
                				if (_t643 == 0) goto 0x3f06d0d8;
                				if (_t643 == 1) goto 0x3f06cc2e;
                				if (r14d == 0) goto 0x3f06cc2e;
                				r8d = 0;
                				r10d = _t643;
                				r9d = 0;
                				_t736 =  *((intOrPtr*)(_t1103 + _t1152 * 4 - 0x7c));
                				 *((intOrPtr*)(_t1103 + _t1152 * 4 - 0x7c)) = _t736;
                				r9d = r9d + 1;
                				if (r9d != r14d) goto 0x3f06d089;
                				if (r8d == 0) goto 0x3f06d0cf;
                				if ( *(_t1103 - 0x80) - 0x73 >= 0) goto 0x3f06d0d8;
                				 *(_t1103 + 0x3fffffffffff84) = r8d;
                				r14d =  *(_t1103 - 0x80);
                				r14d = r14d + 1;
                				 *(_t1103 - 0x80) = r14d;
                				goto 0x3f06cc2e;
                				r14d =  *(_t1103 - 0x80);
                				goto 0x3f06cc2e;
                				 *(_t1103 - 0x80) =  *(_t1103 - 0x80) & 0x00000000;
                				_t1098 =  *((intOrPtr*)(_t1105 + 0x68));
                				r12d = 0;
                				goto 0x3f06d10c;
                				r9d = 0;
                				 *(_t1103 + 0x320) = r12d;
                				 *(_t1103 - 0x80) = r12d;
                				E0000000113F06D370(0, _t1098, _t1103 - 0x7c, 0x13f050000, _t1101 << 2, _t1103 + 0x324, _t1152, _t1081 * _t1102 + 0x20000000000000 >> 0x20);
                				_t1089 = _t1103 + 0x150;
                				if (E0000000113F06BD10(_t736, 0, _t1103 - 0x80, _t1089, _t989,  >=  ? _t1103 + 0x154 : _t1103 + 0x324) != 0xa) goto 0x3f06d1b9;
                				 *_t1098 = 0x31;
                				if (r15d == 0) goto 0x3f06d1c9;
                				r8d = r12d;
                				r9d = r12d;
                				r9d = r9d + 1;
                				 *(_t1103 + 0x154 + _t1089 * 4) = r8d;
                				if (r9d != r15d) goto 0x3f06d141;
                				if (r8d == 0) goto 0x3f06d1c9;
                				if ( *(_t1103 + 0x150) - 0x73 >= 0) goto 0x3f06d18e;
                				 *(_t1103 + 0x40000000000154) = r8d;
                				 *(_t1103 + 0x150) =  *(_t1103 + 0x150) + 1;
                				goto 0x3f06d1c9;
                				r9d = 0;
                				 *(_t1103 + 0x320) = r12d;
                				 *(_t1103 + 0x150) = r12d;
                				_t651 = E0000000113F06D370(0, _t1098 + 1, _t1103 + 0x154, _t1089, _t1102, _t1103 + 0x324, _t1152, _t1081 * _t1102 + 0x20000000000000 >> 0x20);
                				goto 0x3f06d1c9;
                				if (_t651 != 0) goto 0x3f06d1c1;
                				_t814 =  *(_t1105 + 0x40) + 1 - 1;
                				goto 0x3f06d1c9;
                				_t992 = _t1098 + 1;
                				 *_t1098 = 1;
                				_t979 =  *((intOrPtr*)(_t1105 + 0x78));
                				 *(_t979 + 4) = _t814;
                				if (_t814 < 0) goto 0x3f06d1e3;
                				if ( *((intOrPtr*)(_t1105 + 0x50)) - 0x7fffffff > 0) goto 0x3f06d1e3;
                				_t980 =  <  ?  *((intOrPtr*)(_t1103 + 0x740)) - 1 : _t979;
                				_t1099 = _t1098 + _t980;
                				if (_t992 == _t1099) goto 0x3f06d2ea;
                				r14d = 9;
                				_t815 = _t814 | 0xffffffff;
                				r10d =  *(_t1103 - 0x80);
                				if (r10d == 0) goto 0x3f06d2ea;
                				r8d = r12d;
                				r9d = r12d;
                				r9d = r9d + 1;
                				 *((intOrPtr*)(_t1103 + _t1089 * 4 - 0x7c)) = _t736;
                				if (r9d != r10d) goto 0x3f06d21e;
                				if (r8d == 0) goto 0x3f06d280;
                				if ( *(_t1103 - 0x80) - 0x73 >= 0) goto 0x3f06d25d;
                				 *(_t1103 + _t980 * 4 - 0x7c) = r8d;
                				 *(_t1103 - 0x80) =  *(_t1103 - 0x80) + 1;
                				goto 0x3f06d280;
                				r9d = 0;
                				 *(_t1103 + 0x320) = r12d;
                				 *(_t1103 - 0x80) = r12d;
                				E0000000113F06D370(_t980, _t992, _t1103 - 0x7c, _t1089, _t1102, _t1103 + 0x324, _t1152, _t1081 * _t1102 + 0x20000000000000 >> 0x20);
                				_t1090 = _t1103 + 0x150;
                				_t1051 = _t1103 - 0x80;
                				E0000000113F06BD10(_t736, _t980, _t1051, _t1090, _t989,  >=  ? _t1103 + 0x154 : _t1103 + 0x324);
                				r10d = r8d;
                				_t1151 = _t980;
                				r10d = r10d -  ~r9d;
                				r9d = 8;
                				r8b = r8b - _t1051 + _t1090 + _t1051 + _t1090;
                				_t499 = _t1151 + 0x30; // 0x30
                				r8d = 0xcccccccd * r8d >> 0x20 >> 3;
                				if (r10d - r9d < 0) goto 0x3f06d2c9;
                				 *((char*)(_t980 + _t992)) = _t499;
                				r9d = r9d + _t815;
                				if (r9d != _t815) goto 0x3f06d29f;
                				_t982 = _t1099 - _t992;
                				_t983 =  >  ? _t1166 : _t982;
                				_t993 = _t992 + ( >  ? _t1166 : _t982);
                				if (_t993 != _t1099) goto 0x3f06d20b;
                				 *_t993 = r12b;
                				if ( *((intOrPtr*)(_t1105 + 0x60)) == r12b) goto 0x3f06d2fe;
                				E0000000113F06FD18( *((intOrPtr*)(_t1105 + 0x60)) - r12b, _t1105 + 0x58);
                				return E0000000113F058680(_t499,  >  ? _t1166 : _t982,  *(_t1103 + 0x6c0) ^ _t1105);
                			}






















































































                0x13f06c13c
                0x13f06c149
                0x13f06c151
                0x13f06c158
                0x13f06c162
                0x13f06c169
                0x13f06c16e
                0x13f06c176
                0x13f06c17b
                0x13f06c17e
                0x13f06c185
                0x13f06c18e
                0x13f06c196
                0x13f06c198
                0x13f06c19d
                0x13f06c1a4
                0x13f06c1a9
                0x13f06c1ae
                0x13f06c1bb
                0x13f06c1c1
                0x13f06c1d1
                0x13f06c1d1
                0x13f06c1d4
                0x13f06c1de
                0x13f06c1e4
                0x13f06c1e9
                0x13f06c1eb
                0x13f06c1f6
                0x13f06c1fb
                0x13f06c1fe
                0x13f06c203
                0x13f06c20b
                0x13f06c212
                0x13f06c217
                0x13f06c223
                0x13f06c226
                0x13f06c22d
                0x13f06c23e
                0x13f06c249
                0x13f06c252
                0x13f06c25b
                0x13f06c264
                0x13f06c27c
                0x13f06c281
                0x13f06c283
                0x13f06c289
                0x13f06c28d
                0x13f06c293
                0x13f06c29b
                0x13f06c2b5
                0x13f06c2b8
                0x13f06c2c1
                0x13f06c2c4
                0x13f06c2c6
                0x13f06c2c9
                0x13f06c2cd
                0x13f06c2d0
                0x13f06c2d5
                0x13f06c2da
                0x13f06c2de
                0x13f06c2ec
                0x13f06c2f3
                0x13f06c2f6
                0x13f06c2fb
                0x13f06c302
                0x13f06c306
                0x13f06c308
                0x13f06c312
                0x13f06c31a
                0x13f06c324
                0x13f06c32a
                0x13f06c332
                0x13f06c338
                0x13f06c349
                0x13f06c34f
                0x13f06c352
                0x13f06c355
                0x13f06c357
                0x13f06c35e
                0x13f06c363
                0x13f06c369
                0x13f06c36d
                0x13f06c384
                0x13f06c389
                0x13f06c38c
                0x13f06c38f
                0x13f06c393
                0x13f06c39a
                0x13f06c3a1
                0x13f06c3a8
                0x13f06c3ad
                0x13f06c3b4
                0x13f06c3bc
                0x13f06c3c2
                0x13f06c3cb
                0x13f06c3cf
                0x13f06c3d5
                0x13f06c3da
                0x13f06c3e7
                0x13f06c3e9
                0x13f06c3ee
                0x13f06c3f0
                0x13f06c3f5
                0x13f06c3fb
                0x13f06c407
                0x13f06c40c
                0x13f06c412
                0x13f06c418
                0x13f06c41f
                0x13f06c421
                0x13f06c424
                0x13f06c42b
                0x13f06c42d
                0x13f06c437
                0x13f06c440
                0x13f06c444
                0x13f06c446
                0x13f06c449
                0x13f06c450
                0x13f06c456
                0x13f06c45d
                0x13f06c461
                0x13f06c46b
                0x13f06c475
                0x13f06c47a
                0x13f06c481
                0x13f06c486
                0x13f06c48c
                0x13f06c490
                0x13f06c4a0
                0x13f06c4a7
                0x13f06c4ac
                0x13f06c4af
                0x13f06c4b2
                0x13f06c4b6
                0x13f06c4bd
                0x13f06c4c4
                0x13f06c4cb
                0x13f06c4d0
                0x13f06c4d7
                0x13f06c4df
                0x13f06c4e5
                0x13f06c4ee
                0x13f06c4f2
                0x13f06c4f8
                0x13f06c4fd
                0x13f06c50a
                0x13f06c50c
                0x13f06c511
                0x13f06c513
                0x13f06c518
                0x13f06c51e
                0x13f06c52a
                0x13f06c52f
                0x13f06c535
                0x13f06c53b
                0x13f06c542
                0x13f06c544
                0x13f06c547
                0x13f06c54e
                0x13f06c550
                0x13f06c55a
                0x13f06c563
                0x13f06c567
                0x13f06c569
                0x13f06c56c
                0x13f06c573
                0x13f06c579
                0x13f06c580
                0x13f06c584
                0x13f06c58e
                0x13f06c598
                0x13f06c5a1
                0x13f06c5a9
                0x13f06c5b3
                0x13f06c5b9
                0x13f06c5c1
                0x13f06c5c7
                0x13f06c5d8
                0x13f06c5de
                0x13f06c5e1
                0x13f06c5e4
                0x13f06c5e6
                0x13f06c5e9
                0x13f06c5ee
                0x13f06c5f2
                0x13f06c5f9
                0x13f06c5fc
                0x13f06c600
                0x13f06c602
                0x13f06c605
                0x13f06c60b
                0x13f06c60d
                0x13f06c612
                0x13f06c614
                0x13f06c61a
                0x13f06c621
                0x13f06c633
                0x13f06c63b
                0x13f06c640
                0x13f06c654
                0x13f06c65d
                0x13f06c668
                0x13f06c66c
                0x13f06c66f
                0x13f06c681
                0x13f06c688
                0x13f06c688
                0x13f06c68c
                0x13f06c68f
                0x13f06c693
                0x13f06c69a
                0x13f06c6a4
                0x13f06c6b6
                0x13f06c6b9
                0x13f06c6c6
                0x13f06c6cb
                0x13f06c6d3
                0x13f06c6d8
                0x13f06c6dd
                0x13f06c6e1
                0x13f06c6e8
                0x13f06c6eb
                0x13f06c6f1
                0x13f06c6f4
                0x13f06c6fa
                0x13f06c6fc
                0x13f06c701
                0x13f06c703
                0x13f06c709
                0x13f06c710
                0x13f06c720
                0x13f06c728
                0x13f06c72d
                0x13f06c73b
                0x13f06c742
                0x13f06c74b
                0x13f06c756
                0x13f06c75d
                0x13f06c76f
                0x13f06c776
                0x13f06c780
                0x13f06c785
                0x13f06c78a
                0x13f06c790
                0x13f06c795
                0x13f06c7a4
                0x13f06c7b6
                0x13f06c7b9
                0x13f06c7bd
                0x13f06c7c0
                0x13f06c7c6
                0x13f06c7d4
                0x13f06c7d7
                0x13f06c7db
                0x13f06c7fa
                0x13f06c80b
                0x13f06c811
                0x13f06c81d
                0x13f06c841
                0x13f06c846
                0x13f06c851
                0x13f06c857
                0x13f06c85f
                0x13f06c861
                0x13f06c864
                0x13f06c86b
                0x13f06c873
                0x13f06c87c
                0x13f06c882
                0x13f06c888
                0x13f06c8ac
                0x13f06c8b2
                0x13f06c8b7
                0x13f06c8c0
                0x13f06c8c8
                0x13f06c8d0
                0x13f06c8d7
                0x13f06c8da
                0x13f06c8dc
                0x13f06c8df
                0x13f06c8e8
                0x13f06c8ed
                0x13f06c8f4
                0x13f06c8fd
                0x13f06c903
                0x13f06c910
                0x13f06c913
                0x13f06c91d
                0x13f06c924
                0x13f06c92e
                0x13f06c937
                0x13f06c93c
                0x13f06c943
                0x13f06c948
                0x13f06c94d
                0x13f06c953
                0x13f06c958
                0x13f06c961
                0x13f06c96a
                0x13f06c973
                0x13f06c979
                0x13f06c97f
                0x13f06c99f
                0x13f06c9a3
                0x13f06c9a9
                0x13f06c9ab
                0x13f06c9ba
                0x13f06c9c4
                0x13f06c9cf
                0x13f06c9da
                0x13f06c9e3
                0x13f06c9e8
                0x13f06c9ec
                0x13f06c9ef
                0x13f06c9f2
                0x13f06c9fc
                0x13f06ca02
                0x13f06ca0c
                0x13f06ca11
                0x13f06ca17
                0x13f06ca1f
                0x13f06ca1f
                0x13f06ca23
                0x13f06ca2a
                0x13f06ca2f
                0x13f06ca32
                0x13f06ca38
                0x13f06ca47
                0x13f06ca4f
                0x13f06ca51
                0x13f06ca59
                0x13f06ca5d
                0x13f06ca67
                0x13f06ca88
                0x13f06ca8f
                0x13f06ca9d
                0x13f06ca9f
                0x13f06caa4
                0x13f06caa9
                0x13f06caaf
                0x13f06cabb
                0x13f06cabd
                0x13f06cac5
                0x13f06cac9
                0x13f06cad6
                0x13f06cad9
                0x13f06cadf
                0x13f06cae6
                0x13f06caf1
                0x13f06caf6
                0x13f06cafc
                0x13f06cb07
                0x13f06cb0d
                0x13f06cb13
                0x13f06cb16
                0x13f06cb1a
                0x13f06cb24
                0x13f06cb35
                0x13f06cb3e
                0x13f06cb43
                0x13f06cb4a
                0x13f06cb4f
                0x13f06cb54
                0x13f06cb5a
                0x13f06cb5f
                0x13f06cb66
                0x13f06cb6b
                0x13f06cb74
                0x13f06cb7a
                0x13f06cb84
                0x13f06cb8e
                0x13f06cb98
                0x13f06cba7
                0x13f06cbb0
                0x13f06cbb9
                0x13f06cbc2
                0x13f06cbc7
                0x13f06cbc9
                0x13f06cbcc
                0x13f06cbcf
                0x13f06cbf3
                0x13f06cbf9
                0x13f06cbfe
                0x13f06cc07
                0x13f06cc13
                0x13f06cc1b
                0x13f06cc22
                0x13f06cc25
                0x13f06cc27
                0x13f06cc2e
                0x13f06cc33
                0x13f06cc3c
                0x13f06cc42
                0x13f06cc45
                0x13f06cc4b
                0x13f06cc5d
                0x13f06cc69
                0x13f06cc6e
                0x13f06cc78
                0x13f06cc81
                0x13f06cc86
                0x13f06cc89
                0x13f06cc8e
                0x13f06cc91
                0x13f06cc98
                0x13f06cc9a
                0x13f06cca9
                0x13f06ccac
                0x13f06ccb0
                0x13f06ccb3
                0x13f06ccb9
                0x13f06ccca
                0x13f06cccd
                0x13f06cce7
                0x13f06ccfa
                0x13f06cd00
                0x13f06cd0c
                0x13f06cd30
                0x13f06cd35
                0x13f06cd40
                0x13f06cd46
                0x13f06cd4e
                0x13f06cd50
                0x13f06cd53
                0x13f06cd57
                0x13f06cd5f
                0x13f06cd68
                0x13f06cd6e
                0x13f06cd74
                0x13f06cd92
                0x13f06cd98
                0x13f06cd9d
                0x13f06cda3
                0x13f06cda8
                0x13f06cdad
                0x13f06cdb1
                0x13f06cdb4
                0x13f06cdb6
                0x13f06cdb9
                0x13f06cdbf
                0x13f06cdc4
                0x13f06cdc8
                0x13f06cdd1
                0x13f06cdd7
                0x13f06cde1
                0x13f06cde4
                0x13f06cdeb
                0x13f06cdf9
                0x13f06ce02
                0x13f06ce07
                0x13f06ce0e
                0x13f06ce13
                0x13f06ce18
                0x13f06ce1e
                0x13f06ce23
                0x13f06ce29
                0x13f06ce32
                0x13f06ce3b
                0x13f06ce41
                0x13f06ce47
                0x13f06ce65
                0x13f06ce6b
                0x13f06ce6d
                0x13f06ce79
                0x13f06ce83
                0x13f06ce87
                0x13f06ce8e
                0x13f06ce92
                0x13f06ce9e
                0x13f06cea4
                0x13f06cea9
                0x13f06cead
                0x13f06ceb0
                0x13f06ceb3
                0x13f06cebd
                0x13f06cec3
                0x13f06cecc
                0x13f06ced1
                0x13f06ced7
                0x13f06cedf
                0x13f06cedf
                0x13f06cee3
                0x13f06ceea
                0x13f06ceef
                0x13f06cef2
                0x13f06cef8
                0x13f06cf07
                0x13f06cf0f
                0x13f06cf11
                0x13f06cf19
                0x13f06cf1d
                0x13f06cf27
                0x13f06cf48
                0x13f06cf4f
                0x13f06cf5d
                0x13f06cf5f
                0x13f06cf64
                0x13f06cf69
                0x13f06cf6f
                0x13f06cf7b
                0x13f06cf7d
                0x13f06cf85
                0x13f06cf89
                0x13f06cf8f
                0x13f06cf96
                0x13f06cf9f
                0x13f06cfa6
                0x13f06cfb1
                0x13f06cfb6
                0x13f06cfbc
                0x13f06cfcc
                0x13f06cfd2
                0x13f06cfd8
                0x13f06cfdb
                0x13f06cfdf
                0x13f06cfe6
                0x13f06cff4
                0x13f06cffd
                0x13f06d002
                0x13f06d009
                0x13f06d00e
                0x13f06d013
                0x13f06d019
                0x13f06d01e
                0x13f06d022
                0x13f06d02b
                0x13f06d031
                0x13f06d03d
                0x13f06d047
                0x13f06d056
                0x13f06d059
                0x13f06d063
                0x13f06d06c
                0x13f06d071
                0x13f06d07a
                0x13f06d080
                0x13f06d083
                0x13f06d086
                0x13f06d089
                0x13f06d09b
                0x13f06d0a4
                0x13f06d0aa
                0x13f06d0af
                0x13f06d0b5
                0x13f06d0ba
                0x13f06d0bf
                0x13f06d0c3
                0x13f06d0c6
                0x13f06d0ca
                0x13f06d0cf
                0x13f06d0d3
                0x13f06d0d8
                0x13f06d0dc
                0x13f06d0e1
                0x13f06d0e7
                0x13f06d0e9
                0x13f06d0ec
                0x13f06d0fa
                0x13f06d107
                0x13f06d10c
                0x13f06d123
                0x13f06d12b
                0x13f06d135
                0x13f06d13b
                0x13f06d13e
                0x13f06d144
                0x13f06d159
                0x13f06d168
                0x13f06d16d
                0x13f06d176
                0x13f06d17e
                0x13f06d186
                0x13f06d18c
                0x13f06d18e
                0x13f06d191
                0x13f06d19f
                0x13f06d1b2
                0x13f06d1b7
                0x13f06d1bb
                0x13f06d1bd
                0x13f06d1bf
                0x13f06d1c3
                0x13f06d1c7
                0x13f06d1c9
                0x13f06d1d2
                0x13f06d1d7
                0x13f06d1df
                0x13f06d1f2
                0x13f06d1f6
                0x13f06d1fc
                0x13f06d202
                0x13f06d208
                0x13f06d20b
                0x13f06d212
                0x13f06d218
                0x13f06d21b
                0x13f06d221
                0x13f06d238
                0x13f06d243
                0x13f06d248
                0x13f06d24e
                0x13f06d253
                0x13f06d258
                0x13f06d25b
                0x13f06d25d
                0x13f06d260
                0x13f06d26e
                0x13f06d27b
                0x13f06d280
                0x13f06d287
                0x13f06d28b
                0x13f06d290
                0x13f06d293
                0x13f06d296
                0x13f06d299
                0x13f06d2b4
                0x13f06d2b7
                0x13f06d2bb
                0x13f06d2c1
                0x13f06d2c6
                0x13f06d2c9
                0x13f06d2cf
                0x13f06d2d4
                0x13f06d2da
                0x13f06d2de
                0x13f06d2e4
                0x13f06d2ea
                0x13f06d2f2
                0x13f06d2f9
                0x13f06d320

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                • API String ID: 808467561-2761157908
                • Opcode ID: 4d457abffb055b8747f2b562019bc7f464170bd0596f427c907115a88a53d4fb
                • Instruction ID: 36e53067ac09b1cdb7e6e7b864eb63c80f9df3a78263d9caf5206139a861319c
                • Opcode Fuzzy Hash: 4d457abffb055b8747f2b562019bc7f464170bd0596f427c907115a88a53d4fb
                • Instruction Fuzzy Hash: CDB20672A102918AE77DCE6DD5447ED37A2F384399F60913DEA1667B86D734CB02CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 16%
                			E0000000113F055030(void* __ecx, void* __rax, void* __r8, long long _a24, intOrPtr _a32, long long _a40, long long _a48, char _a56, signed int _a8248) {
                				long _t15;
                				void* _t22;
                				signed long long _t32;
                				long long _t37;
                				void* _t39;
                				void* _t47;
                				void* _t52;
                				void* _t53;
                				void* _t54;
                
                				_t22 = __ecx;
                				E0000000113F058610(__ecx, __rax, _t39, _t53, _t54);
                				_t32 =  *0x3f082018; // 0x3bece1c8a3ca
                				_a8248 = _t32 ^ _t47 - __rax;
                				if (_t22 != 0) goto 0x3f05505d;
                				_t15 = GetLastError();
                				_a40 = _t37;
                				r9d = 0x400;
                				_a32 = 0x1000;
                				r8d = _t15;
                				_a24 =  &_a56;
                				if (FormatMessageW(??, ??, ??, ??, ??, ??, ??) != 0) goto 0x3f0550ac;
                				E0000000113F051C80(_t32 ^ _t47 - __rax, "FormatMessageW", "No error messages generated.\n", __r8, _t52);
                				goto 0x3f055105;
                				_a48 = _t37;
                				_a40 = _t37;
                				r9d = 0xffffffff;
                				_a32 = 0x1000;
                				_a24 = 0x3f08fd30;
                				if (WideCharToMultiByte(??, ??, ??, ??, ??, ??, ??, ??) != 0) goto 0x3f055102;
                				E0000000113F051C80("PyInstaller: FormatMessageW failed.", "WideCharToMultiByte", "Failed to encode wchar_t as UTF-8.\n",  &_a56, _t52);
                				goto 0x3f055105;
                				return E0000000113F058680(0xfde9, 0x3f08fd30, _a8248 ^ _t47 - __rax);
                			}












                0x13f055030
                0x13f055037
                0x13f05503f
                0x13f055049
                0x13f055055
                0x13f055057
                0x13f055064
                0x13f055069
                0x13f05506f
                0x13f055077
                0x13f05507a
                0x13f05508e
                0x13f05509e
                0x13f0550aa
                0x13f0550ac
                0x13f0550b6
                0x13f0550bb
                0x13f0550c8
                0x13f0550d2
                0x13f0550e4
                0x13f0550f4
                0x13f055100
                0x13f05511d

                APIs
                • GetLastError.KERNEL32(00000000,000000013F051D00), ref: 000000013F055057
                • FormatMessageW.KERNEL32 ref: 000000013F055086
                • WideCharToMultiByte.KERNEL32 ref: 000000013F0550DC
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                • API String ID: 2920928814-2573406579
                • Opcode ID: 6f9cf6ef38cb02bbbe07a7b6086d2cde28332afdb5be69e0f199820025f43c41
                • Instruction ID: 4973b5f2d89f3819e102118dd613cd7edabfcd48ecd61caf572a314f54abb255
                • Opcode Fuzzy Hash: 6f9cf6ef38cb02bbbe07a7b6086d2cde28332afdb5be69e0f199820025f43c41
                • Instruction Fuzzy Hash: C1213371A14A41D2FB689B69EC493D567A7F748384F84013DF54D826A7EB78C74BCB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 84%
                			E0000000113F069BE4(void* __ecx, long long __rbx, intOrPtr* __rcx, void** __rdx) {
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				void* __r15;
                				signed int _t63;
                				signed int _t73;
                				int _t78;
                				void* _t100;
                				signed long long _t127;
                				signed long long _t128;
                				intOrPtr _t129;
                				signed short* _t130;
                				signed long long _t134;
                				signed long long _t136;
                				signed long long _t146;
                				void* _t151;
                				signed short* _t156;
                				signed short* _t157;
                				signed short* _t158;
                				void* _t171;
                				signed long long _t173;
                				void* _t193;
                				void* _t196;
                				intOrPtr _t198;
                				intOrPtr _t202;
                				void* _t204;
                				void* _t205;
                				void* _t207;
                				signed long long _t208;
                				void* _t210;
                				void* _t225;
                				void* _t234;
                				signed short* _t235;
                				signed long long _t236;
                				union _FINDEX_INFO_LEVELS _t239;
                				intOrPtr* _t243;
                				WCHAR* _t245;
                				signed long long _t250;
                				intOrPtr* _t251;
                
                				 *((long long*)(_t207 + 0x18)) = __rbx;
                				_t205 = _t207 - 0x1c0;
                				_t208 = _t207 - 0x2c0;
                				_t127 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t128 = _t127 ^ _t208;
                				 *(_t205 + 0x1b8) = _t128;
                				 *(_t208 + 0x58) = __rdx;
                				if (__rdx != 0) goto 0x3f069c39;
                				E0000000113F05DEB4(_t128);
                				_t5 = _t193 + 0x16; // 0x16
                				 *_t128 = _t5;
                				E0000000113F063618();
                				goto 0x3f069f6f;
                				asm("xorps xmm0, xmm0");
                				 *__rdx = _t193;
                				_t129 =  *((intOrPtr*)(__rcx));
                				asm("movdqu [esp+0x30], xmm0");
                				 *(_t208 + 0x40) = _t193;
                				if (_t129 == 0) goto 0x3f069e30;
                				 *(_t205 + 0x1b0) = 0x3f002a;
                				 *((short*)(_t205 + 0x1b4)) = 0;
                				E0000000113F067A2C(_t129, _t205 + 0x1b0);
                				_t235 =  *((intOrPtr*)(__rcx));
                				if (_t129 != 0) goto 0x3f069cbc;
                				r8d = 0;
                				_t156 = _t235;
                				_t63 = E0000000113F069FB0(0x801, _t156, _t205 + 0x1b0,  *((intOrPtr*)(_t208 + 0x38)), _t210, _t208 + 0x30);
                				_t198 =  *((intOrPtr*)(_t208 + 0x38));
                				r15d = _t63;
                				goto 0x3f069e1d;
                				if (_t129 == _t235) goto 0x3f069ce0;
                				_t100 = ( *_t156 & 0x0000ffff) - 0x2f - 0x2d;
                				if (_t100 > 0) goto 0x3f069cd7;
                				asm("dec eax");
                				if (_t100 < 0) goto 0x3f069ce0;
                				_t157 = _t156 - 2;
                				if (_t157 != _t235) goto 0x3f069cc1;
                				if (( *_t157 & 0x0000ffff) != 0x3a) goto 0x3f069d0c;
                				_t130 =  &(_t235[1]);
                				if (_t157 == _t130) goto 0x3f069d0c;
                				r8d = 0;
                				_t158 = _t235;
                				r15d = E0000000113F069FB0(0x801, _t158, _t205 + 0x1b0, _t198, _t210, _t208 + 0x30);
                				goto 0x3f069e10;
                				if (0xffffffffffffffd1 - 0x2d > 0) goto 0x3f069d21;
                				asm("dec eax");
                				if (0xffffffffffffffd1 - 0x2d < 0) goto 0x3f069d24;
                				 *((intOrPtr*)(_t208 + 0x28)) = 0;
                				 *(_t208 + 0x20) = _t193;
                				asm("dec ebp");
                				r9d = 0;
                				_t246 = _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001;
                				 *(_t208 + 0x48) = _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001;
                				FindFirstFileExW(_t245, _t239, _t234);
                				if (_t130 == 0xffffffff) goto 0x3f069cf2;
                				 *(_t208 + 0x50) = _t198 -  *((intOrPtr*)(_t208 + 0x30)) >> 3;
                				if ( *((short*)(_t205 - 0x74)) != 0x2e) goto 0x3f069d85;
                				if ( *((intOrPtr*)(_t205 - 0x72)) == 0) goto 0x3f069da5;
                				if ( *((short*)(_t205 - 0x72)) != 0x2e) goto 0x3f069d85;
                				if ( *((intOrPtr*)(_t205 - 0x70)) == 0) goto 0x3f069da5;
                				_t73 = E0000000113F069FB0(_t130, _t205 - 0x74, _t235, _t198 -  *((intOrPtr*)(_t208 + 0x30)) >> 3, _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001, _t208 + 0x30);
                				r15d = _t73;
                				if (_t73 != 0) goto 0x3f069e07;
                				if (FindNextFileW(_t225) != 0) goto 0x3f069d6b;
                				if ( *(_t208 + 0x50) !=  *((intOrPtr*)(_t208 + 0x38)) -  *((intOrPtr*)(_t208 + 0x30)) >> 3) goto 0x3f069de0;
                				FindClose(_t193);
                				goto 0x3f069e23;
                				r8d = 8;
                				E0000000113F06F390(_t130,  *((intOrPtr*)(_t208 + 0x30)) +  *(_t208 + 0x50) * 8, ( *((intOrPtr*)(_t208 + 0x38)) -  *((intOrPtr*)(_t208 + 0x30)) >> 3) -  *(_t208 + 0x50), _t193,  *((intOrPtr*)(_t208 + 0x38)), _t205, _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001, 0x13f069bd0,  *(_t208 + 0x48));
                				FindClose(_t196);
                				r15d = 0;
                				goto 0x3f069e1a;
                				_t78 = FindClose(_t204);
                				_t202 =  *((intOrPtr*)(_t208 + 0x38));
                				_t243 =  *((intOrPtr*)(_t208 + 0x30));
                				if (r15d != 0) goto 0x3f069f31;
                				goto 0x3f069c57;
                				 *(_t205 + 0x1b0) = _t193;
                				_t134 = _t202 - _t243;
                				_t250 = (_t134 >> 3) + 1;
                				_t171 =  >  ? _t193 : _t134 + 7 >> 3;
                				if (_t171 == 0) goto 0x3f069e8e;
                				_t136 = (_t134 | 0xffffffff) + 1;
                				if ( *((intOrPtr*)( *_t243 + _t136 * 2)) != 0) goto 0x3f069e6b;
                				if (_t193 + 1 != _t171) goto 0x3f069e64;
                				 *(_t205 + 0x1b0) = _t193 + 1 + _t136;
                				r8d = 2;
                				E0000000113F0615CC(_t78, _t250, _t193 + 1 + _t136, _t246);
                				_t146 = _t136;
                				if (_t136 != 0) goto 0x3f069ead;
                				r15d = r15d | 0xffffffff;
                				goto 0x3f069f2a;
                				_t173 = _t136 + _t250 * 8;
                				_t251 = _t243;
                				 *(_t208 + 0x48) = _t173;
                				_t236 = _t173;
                				if (_t243 == _t202) goto 0x3f069f1f;
                				 *(_t208 + 0x50) = _t136 - _t243;
                				if ( *((intOrPtr*)( *_t251 + ((__rcx + 0x00000008 | 0xffffffff) + 1) * 2)) != 0) goto 0x3f069ed0;
                				if (E0000000113F069AEC(_t236 - _t173 >> 1, _t146, _t236,  *(_t205 + 0x1b0) - (_t236 - _t173 >> 1),  *_t251, (__rcx + 0x00000008 | 0xffffffff) + 2) != 0) goto 0x3f069f99;
                				 *( *(_t208 + 0x50) + _t251) = _t236;
                				if (_t251 + 8 != _t202) goto 0x3f069ec9;
                				r15d = 0;
                				 *( *(_t208 + 0x58)) = _t146;
                				E0000000113F0636F8( *(_t208 + 0x58),  *(_t208 + 0x48));
                				_t151 =  >  ? _t193 : _t202 - _t243 + 7 >> 3;
                				if (_t151 == 0) goto 0x3f069f64;
                				E0000000113F0636F8( *(_t208 + 0x58),  *_t243);
                				if (_t193 + 1 != _t151) goto 0x3f069f4e;
                				E0000000113F0636F8( *(_t208 + 0x58), _t243);
                				return E0000000113F058680(0,  *(_t208 + 0x58),  *(_t205 + 0x1b8) ^ _t208);
                			}










































                0x13f069be4
                0x13f069bf4
                0x13f069bfc
                0x13f069c03
                0x13f069c0a
                0x13f069c0d
                0x13f069c16
                0x13f069c21
                0x13f069c23
                0x13f069c28
                0x13f069c2b
                0x13f069c2d
                0x13f069c34
                0x13f069c39
                0x13f069c3c
                0x13f069c3f
                0x13f069c42
                0x13f069c52
                0x13f069c5a
                0x13f069c67
                0x13f069c74
                0x13f069c85
                0x13f069c8a
                0x13f069c94
                0x13f069c9b
                0x13f069ca0
                0x13f069ca3
                0x13f069ca8
                0x13f069cad
                0x13f069cb7
                0x13f069cbf
                0x13f069cc8
                0x13f069ccc
                0x13f069cd1
                0x13f069cd5
                0x13f069cd7
                0x13f069cde
                0x13f069ce7
                0x13f069ce9
                0x13f069cf0
                0x13f069cf7
                0x13f069cfc
                0x13f069d04
                0x13f069d07
                0x13f069d14
                0x13f069d19
                0x13f069d1f
                0x13f069d27
                0x13f069d36
                0x13f069d3d
                0x13f069d40
                0x13f069d43
                0x13f069d4b
                0x13f069d50
                0x13f069d5d
                0x13f069d66
                0x13f069d70
                0x13f069d76
                0x13f069d7d
                0x13f069d83
                0x13f069d94
                0x13f069d99
                0x13f069d9e
                0x13f069db5
                0x13f069dd3
                0x13f069dd8
                0x13f069dde
                0x13f069dee
                0x13f069df4
                0x13f069dfc
                0x13f069e02
                0x13f069e05
                0x13f069e0a
                0x13f069e10
                0x13f069e15
                0x13f069e1d
                0x13f069e2b
                0x13f069e33
                0x13f069e3a
                0x13f069e4d
                0x13f069e5b
                0x13f069e62
                0x13f069e6b
                0x13f069e73
                0x13f069e85
                0x13f069e87
                0x13f069e8e
                0x13f069e9a
                0x13f069e9f
                0x13f069ea5
                0x13f069ea7
                0x13f069eab
                0x13f069ead
                0x13f069eb1
                0x13f069eb4
                0x13f069eb9
                0x13f069ebf
                0x13f069ec4
                0x13f069ed8
                0x13f069efd
                0x13f069f0d
                0x13f069f1d
                0x13f069f24
                0x13f069f27
                0x13f069f2c
                0x13f069f45
                0x13f069f4c
                0x13f069f52
                0x13f069f62
                0x13f069f67
                0x13f069f98

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 7903db976743ed0a00e368eba96f49867ff0a4606c01445dc59a3ff3aa746318
                • Instruction ID: 84f4bf70fe616a4129f29427b833d3432ad60b741ba032a1582bf884cd596542
                • Opcode Fuzzy Hash: 7903db976743ed0a00e368eba96f49867ff0a4606c01445dc59a3ff3aa746318
                • Instruction Fuzzy Hash: F8A1D872B1469481EE68CF2AA4003DAA3A2F744BF4F654539FE9947FC6DB78C646C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E0000000113F063404(void* __ecx, intOrPtr __edx, long long __rbx, void* __rdx, long long __rsi, void* __r8) {
                				void* _t36;
                				void* _t37;
                				void* _t38;
                				int _t40;
                				signed long long _t62;
                				long long _t65;
                				_Unknown_base(*)()* _t85;
                				void* _t89;
                				void* _t90;
                				void* _t92;
                				signed long long _t93;
                				struct _EXCEPTION_POINTERS* _t99;
                
                				 *((long long*)(_t92 + 0x10)) = __rbx;
                				 *((long long*)(_t92 + 0x18)) = __rsi;
                				_t90 = _t92 - 0x4f0;
                				_t93 = _t92 - 0x5f0;
                				_t62 =  *0x3f082018; // 0x3bece1c8a3ca
                				 *(_t90 + 0x4e0) = _t62 ^ _t93;
                				if (__ecx == 0xffffffff) goto 0x3f063443;
                				_t37 = E0000000113F058F0C(_t36);
                				r8d = 0x98;
                				_t38 = E0000000113F0597D0(_t37, 0, _t93 + 0x70, __rdx, __r8);
                				r8d = 0x4d0;
                				E0000000113F0597D0(_t38, 0, _t90 + 0x10, __rdx, __r8);
                				 *((long long*)(_t93 + 0x48)) = _t93 + 0x70;
                				_t65 = _t90 + 0x10;
                				 *((long long*)(_t93 + 0x50)) = _t65;
                				__imp__RtlCaptureContext();
                				r8d = 0;
                				__imp__RtlLookupFunctionEntry();
                				if (_t65 == 0) goto 0x3f0634d6;
                				 *(_t93 + 0x38) =  *(_t93 + 0x38) & 0x00000000;
                				 *((long long*)(_t93 + 0x30)) = _t93 + 0x58;
                				 *((long long*)(_t93 + 0x28)) = _t93 + 0x60;
                				 *((long long*)(_t93 + 0x20)) = _t90 + 0x10;
                				__imp__RtlVirtualUnwind();
                				 *((long long*)(_t90 + 0x108)) =  *((intOrPtr*)(_t90 + 0x508));
                				 *((intOrPtr*)(_t93 + 0x70)) = __edx;
                				 *((long long*)(_t90 + 0xa8)) = _t90 + 0x510;
                				 *((long long*)(_t90 - 0x80)) =  *((intOrPtr*)(_t90 + 0x508));
                				 *((intOrPtr*)(_t93 + 0x74)) = r8d;
                				_t40 = IsDebuggerPresent();
                				SetUnhandledExceptionFilter(_t85, _t89);
                				if (UnhandledExceptionFilter(_t99) != 0) goto 0x3f063538;
                				if (_t40 != 0) goto 0x3f063538;
                				if (__ecx == 0xffffffff) goto 0x3f063538;
                				E0000000113F058F0C(_t42);
                				return E0000000113F058680(__ecx,  *((intOrPtr*)(_t90 + 0x508)),  *(_t90 + 0x4e0) ^ _t93);
                			}















                0x13f063404
                0x13f063409
                0x13f063412
                0x13f06341a
                0x13f063421
                0x13f06342b
                0x13f06343c
                0x13f06343e
                0x13f06344a
                0x13f063450
                0x13f06345b
                0x13f063461
                0x13f06346b
                0x13f063474
                0x13f063478
                0x13f06347d
                0x13f063492
                0x13f063495
                0x13f06349e
                0x13f0634a0
                0x13f0634b3
                0x13f0634c0
                0x13f0634c9
                0x13f0634d0
                0x13f0634dd
                0x13f0634ef
                0x13f0634f3
                0x13f063501
                0x13f063505
                0x13f063509
                0x13f063513
                0x13f063526
                0x13f06352a
                0x13f06352f
                0x13f063533
                0x13f06355e

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                • String ID:
                • API String ID: 1239891234-0
                • Opcode ID: 7ef58020e378e2f6d85fc3d7abf6102e8b1291f707a80e84eda760416955bece
                • Instruction ID: d1c65eaf22aa48e10cf5b323abde0b583b12e2e42484b76550988bd18951d1f8
                • Opcode Fuzzy Hash: 7ef58020e378e2f6d85fc3d7abf6102e8b1291f707a80e84eda760416955bece
                • Instruction Fuzzy Hash: 8A314F36614B8086EB64CF29E8443DE73A5F798794F54012AFA9D43B56DF38C25ACB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 71%
                			E0000000113F064BDC(void* __eax, signed int __edx, void* __esi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, long long __r8, void* __r10) {
                				void* __rsi;
                				void* __rbp;
                				char _t159;
                				char _t165;
                				char _t170;
                				int _t171;
                				int _t173;
                				intOrPtr _t179;
                				void* _t185;
                				signed char _t186;
                				intOrPtr _t194;
                				signed long long _t236;
                				signed long long _t242;
                				long long _t246;
                				void* _t247;
                				intOrPtr _t261;
                				signed long long _t269;
                				long long _t282;
                				intOrPtr _t288;
                				void* _t289;
                				void* _t293;
                				void* _t296;
                				char _t299;
                				void* _t301;
                				void* _t305;
                				void* _t307;
                				void* _t310;
                				void* _t311;
                				void* _t313;
                				signed long long _t314;
                				void* _t322;
                				intOrPtr _t323;
                				long long _t330;
                				void* _t332;
                				signed long long _t334;
                				void* _t336;
                				long long _t337;
                				intOrPtr _t338;
                				void* _t340;
                				signed long long _t341;
                				long long _t343;
                				long long _t345;
                
                				 *((long long*)(_t313 + 8)) = __rbx;
                				_t311 = _t313 - 0x27;
                				_t314 = _t313 - 0x100;
                				_t236 =  *0x3f082018; // 0x3bece1c8a3ca
                				 *(_t311 + 0x1f) = _t236 ^ _t314;
                				 *((long long*)(_t311 - 1)) = __rcx;
                				r13d = r9d;
                				 *((long long*)(_t311 - 0x19)) = __r8;
                				_t337 = _t336 + __r8;
                				 *((long long*)(_t311 - 9)) = __edx;
                				 *((long long*)(_t311 - 0x49)) = _t337;
                				_t341 = __edx + __edx * 8;
                				_t334 = __edx >> 6;
                				 *((long long*)(_t311 - 0x41)) =  *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + 0x28 + _t341 * 8));
                				 *((intOrPtr*)(_t311 - 0x59)) = GetConsoleCP();
                				E0000000113F05BE30( *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + 0x28 + _t341 * 8)), __edx, _t314 + 0x50, __rdx, _t305, _t343);
                				_t261 =  *((intOrPtr*)(_t314 + 0x58));
                				r15d = 0;
                				r10d = 0;
                				 *((long long*)(_t311 - 0x51)) = _t343;
                				 *((long long*)(_t311 - 0x69)) = _t343;
                				_t194 =  *((intOrPtr*)(_t261 + 0xc));
                				 *((intOrPtr*)(_t311 - 0x55)) = _t194;
                				if (__r8 - _t337 >= 0) goto 0x3f064fba;
                				_t242 = __edx >> 6;
                				 *(_t311 - 0x11) = _t242;
                				r15d = 1;
                				 *((char*)(_t314 + 0x40)) =  *((intOrPtr*)(__r8));
                				 *(_t314 + 0x44) = r10d;
                				if (_t194 != 0xfde9) goto 0x3f064e2e;
                				_t323 =  *((intOrPtr*)(0x13f050000 + 0x417a0 + _t242 * 8));
                				if ( *((intOrPtr*)(_t323 + _t341 * 8 + __r10 + 0x3e)) == r10b) goto 0x3f064cdb;
                				_t296 = __r10 + 1;
                				if (_t296 - 5 < 0) goto 0x3f064cc9;
                				if (_t296 <= 0) goto 0x3f064dd1;
                				r15d =  *((char*)(_t261 + 0x13f082170));
                				r15d = r15d + 1;
                				r13d = r15d;
                				r13d = r13d - r10d + 1;
                				if (r13d -  *((intOrPtr*)(_t311 - 0x49)) - __r8 > 0) goto 0x3f064f7f;
                				if (_t296 <= 0) goto 0x3f064d43;
                				_t330 = _t323 - _t311 + 7 + _t341 * 8;
                				 *((char*)(_t311 + 7 + __r10)) =  *((intOrPtr*)(_t311 + 7 + __r10 + _t330 + 0x3e));
                				if (__r10 + 1 - _t296 < 0) goto 0x3f064d2a;
                				r10d = 0;
                				if (r13d <= 0) goto 0x3f064d5d;
                				E0000000113F0593C0( *((intOrPtr*)(_t311 + 7 + __r10 + _t330 + 0x3e)), _t311 + 7 + _t296, __r8, r13d);
                				r10d = 0;
                				_t282 = _t330;
                				if (_t296 <= 0) goto 0x3f064d84;
                				 *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + _t282 + 0x3e + _t341 * 8)) = r10b;
                				if (_t282 + 1 - _t296 < 0) goto 0x3f064d6c;
                				_t246 = _t311 + 7;
                				 *((long long*)(_t311 - 0x39)) = _t330;
                				 *((long long*)(_t311 - 0x31)) = _t246;
                				_t159 = (r10d & 0xffffff00 | r15d == 0x00000004) + 1;
                				r8d = _t159;
                				r15d = _t159;
                				E0000000113F0688A8(_t246, __edx, _t314 + 0x44, _t311 - 0x31, 0x13f050000, _t311 - 0x39);
                				if (_t246 == 0xffffffff) goto 0x3f065092;
                				_t338 =  *((intOrPtr*)(_t311 - 0x49));
                				goto 0x3f064ea3;
                				_t299 =  *((char*)(_t246 + 0x13f082170));
                				_t185 = _t299 + 1;
                				_t247 = _t185;
                				if (_t247 - _t338 - __r8 > 0) goto 0x3f065007;
                				 *((long long*)(_t311 - 0x29)) = _t330;
                				 *((long long*)(_t311 - 0x21)) = __r8;
                				_t165 = (r10d & 0xffffff00 | _t185 == 0x00000004) + 1;
                				r8d = _t165;
                				_t269 = _t314 + 0x44;
                				E0000000113F0688A8(_t247, __edx, _t269, _t311 - 0x21, 0x13f050000, _t311 - 0x29);
                				if (_t247 == 0xffffffff) goto 0x3f065092;
                				r15d = _t165;
                				goto 0x3f064ea3;
                				_t288 =  *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8));
                				_t186 =  *(_t288 + 0x3d + _t341 * 8);
                				if ((_t186 & 0x00000004) == 0) goto 0x3f064e68;
                				 *((char*)(_t311 + 0xf)) =  *((intOrPtr*)(_t288 + 0x3e + _t341 * 8));
                				r8d = 2;
                				 *(_t288 + 0x3d + _t341 * 8) = _t186 & 0x000000fb;
                				_t289 = _t311 + 0xf;
                				 *((char*)(_t311 + 0x10)) =  *((intOrPtr*)(__r8));
                				goto 0x3f064e90;
                				E0000000113F06B090(_t186 & 0x000000fb, 0x13f050000, __edx, _t269, _t289, __r8, _t311 - 0x29);
                				if ( *((intOrPtr*)(0x13f050000 + _t269 * 2)) >= 0) goto 0x3f064e8a;
                				_t301 = _t299 + __r8 + 1;
                				if (_t301 - _t338 >= 0) goto 0x3f065058;
                				_t100 = _t289 + 2; // 0x2
                				r8d = _t100;
                				goto 0x3f064e8d;
                				_t170 = E0000000113F06646C(0, 0x13f050000, __edx, _t314 + 0x44, __r8, 0x13f050000, _t340, _t336, _t332);
                				if (_t170 == 0xffffffff) goto 0x3f065092;
                				_t322 = _t314 + 0x44;
                				 *((long long*)(_t314 + 0x38)) = __edx;
                				_t106 = _t301 + 1; // 0x2
                				_t307 = _t106;
                				 *((long long*)(_t314 + 0x30)) = __edx;
                				r9d = r15d;
                				 *((intOrPtr*)(_t314 + 0x28)) = 5;
                				 *((long long*)(_t314 + 0x20)) = _t311 + 0x17;
                				E0000000113F0683EC(_t293);
                				if (_t170 == 0) goto 0x3f0650a4;
                				r8d = _t170;
                				 *((long long*)(_t314 + 0x20)) = __edx;
                				_t171 = WriteFile(_t305, _t310, ??);
                				r10d = 0;
                				if (_t171 == 0) goto 0x3f06509b;
                				_t345 =  *((intOrPtr*)(_t311 - 0x51));
                				_t179 =  *((intOrPtr*)(_t311 - 0x41)) + _t345;
                				 *((intOrPtr*)(_t311 - 0x65)) = _t179;
                				if ( *((intOrPtr*)(_t314 + 0x48)) - _t170 < 0) goto 0x3f064fba;
                				if ( *((char*)(_t314 + 0x40)) != 0xa) goto 0x3f064f6b;
                				_t121 = _t330 + 0xd; // 0xd
                				 *((short*)(_t314 + 0x40)) = _t121;
                				_t124 = _t330 + 1; // 0x1
                				r8d = _t124;
                				 *((long long*)(_t314 + 0x20)) = _t330;
                				_t173 = WriteFile(??, ??, ??, ??, ??);
                				r10d = 0;
                				if (_t173 == 0) goto 0x3f065089;
                				if ( *((intOrPtr*)(_t314 + 0x48)) - 1 < 0) goto 0x3f064fba;
                				r15d = r15d + 1;
                				 *((long long*)(_t311 - 0x51)) = _t345;
                				 *((intOrPtr*)(_t311 - 0x65)) = _t179 + 1;
                				if (_t307 - _t338 >= 0) goto 0x3f064fba;
                				goto 0x3f064c93;
                				if (_t322 <= 0) goto 0x3f064fb4;
                				 *((char*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + _t307 + 0x3e + _t341 * 8)) =  *((intOrPtr*)(_t307 - _t307 + _t307));
                				if (r10d + 1 - _t322 < 0) goto 0x3f064f91;
                				 *((intOrPtr*)(_t311 - 0x65)) =  *((intOrPtr*)(_t311 - 0x65)) + r8d;
                				if ( *((intOrPtr*)(_t311 - 0x71)) == r10b) goto 0x3f064fcc;
                				 *( *((intOrPtr*)(_t314 + 0x50)) + 0x3a8) =  *( *((intOrPtr*)(_t314 + 0x50)) + 0x3a8) & 0xfffffffd;
                				asm("movsd xmm0, [ebp-0x69]");
                				asm("movsd [eax], xmm0");
                				 *((intOrPtr*)( *((intOrPtr*)(_t311 - 1)) + 8)) = __esi -  *((intOrPtr*)(_t311 - 0x19));
                				return E0000000113F058680(__esi -  *((intOrPtr*)(_t311 - 0x19)),  *((intOrPtr*)(_t311 - 1)),  *(_t311 + 0x1f) ^ _t314);
                			}













































                0x13f064bdc
                0x13f064bec
                0x13f064bf1
                0x13f064bf8
                0x13f064c02
                0x13f064c0f
                0x13f064c16
                0x13f064c20
                0x13f064c24
                0x13f064c27
                0x13f064c2e
                0x13f064c32
                0x13f064c36
                0x13f064c47
                0x13f064c58
                0x13f064c5b
                0x13f064c60
                0x13f064c65
                0x13f064c68
                0x13f064c6b
                0x13f064c6f
                0x13f064c76
                0x13f064c79
                0x13f064c7f
                0x13f064c8b
                0x13f064c8f
                0x13f064c95
                0x13f064c9b
                0x13f064c9f
                0x13f064caa
                0x13f064cba
                0x13f064cce
                0x13f064cd2
                0x13f064cd9
                0x13f064cde
                0x13f064cf9
                0x13f064d02
                0x13f064d05
                0x13f064d08
                0x13f064d11
                0x13f064d1d
                0x13f064d26
                0x13f064d39
                0x13f064d3e
                0x13f064d40
                0x13f064d46
                0x13f064d55
                0x13f064d5a
                0x13f064d5d
                0x13f064d63
                0x13f064d7a
                0x13f064d82
                0x13f064d84
                0x13f064d88
                0x13f064d8c
                0x13f064da7
                0x13f064da9
                0x13f064dac
                0x13f064daf
                0x13f064db8
                0x13f064dc2
                0x13f064dcc
                0x13f064dda
                0x13f064de3
                0x13f064de6
                0x13f064dec
                0x13f064df5
                0x13f064dfc
                0x13f064e07
                0x13f064e0d
                0x13f064e10
                0x13f064e17
                0x13f064e20
                0x13f064e29
                0x13f064e2c
                0x13f064e35
                0x13f064e3d
                0x13f064e45
                0x13f064e4f
                0x13f064e52
                0x13f064e5a
                0x13f064e5f
                0x13f064e63
                0x13f064e66
                0x13f064e68
                0x13f064e76
                0x13f064e78
                0x13f064e7e
                0x13f064e84
                0x13f064e84
                0x13f064e88
                0x13f064e95
                0x13f064e9d
                0x13f064eac
                0x13f064eb1
                0x13f064eb6
                0x13f064eb6
                0x13f064eba
                0x13f064ebf
                0x13f064ec2
                0x13f064ecc
                0x13f064ed1
                0x13f064eda
                0x13f064ee9
                0x13f064eec
                0x13f064ef5
                0x13f064efb
                0x13f064f00
                0x13f064f06
                0x13f064f0f
                0x13f064f13
                0x13f064f1a
                0x13f064f25
                0x13f064f2b
                0x13f064f34
                0x13f064f39
                0x13f064f39
                0x13f064f3d
                0x13f064f47
                0x13f064f4d
                0x13f064f52
                0x13f064f5d
                0x13f064f5f
                0x13f064f64
                0x13f064f68
                0x13f064f71
                0x13f064f7a
                0x13f064f85
                0x13f064fa4
                0x13f064faf
                0x13f064fb7
                0x13f064fbe
                0x13f064fc5
                0x13f064fd0
                0x13f064fd9
                0x13f064fdd
                0x13f065006

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite$Console
                • String ID:
                • API String ID: 786612050-0
                • Opcode ID: ea2b47583d3eba2a351e053b359a93f4ef48024dbd9af04be46d39f3fa6f7787
                • Instruction ID: d2776d3848bb5310eff608a02238da49705bee4b7297f7c554ab98db6dfb0696
                • Opcode Fuzzy Hash: ea2b47583d3eba2a351e053b359a93f4ef48024dbd9af04be46d39f3fa6f7787
                • Instruction Fuzzy Hash: 28D1F376B08A809AE704CF68D5447DD7BB2F7457E8F64412AEE4E47B9ADA34C25BC300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 73%
                			E0000000113F06BD10(signed int __ecx, signed int __rax, signed int* __rcx, unsigned int __rdx, void* __r10, long long __r13, signed int _a8, long long _a16, signed char _a24, signed int _a32) {
                				long long _v64;
                				char _v532;
                				signed int _v536;
                				signed long long _v544;
                				signed long long _v552;
                				signed int _v556;
                				signed int _v560;
                				signed int _v568;
                				void* __rbx;
                				void* __rsi;
                				void* _t124;
                				signed int _t140;
                				signed char _t161;
                				signed char _t164;
                				signed int _t173;
                				signed char _t181;
                				signed int _t185;
                				signed int _t186;
                				void* _t187;
                				signed int _t190;
                				signed int _t191;
                				signed int _t208;
                				void* _t225;
                				signed long long _t236;
                				signed int _t239;
                				void* _t247;
                				signed long long _t248;
                				signed int* _t254;
                				intOrPtr* _t261;
                				signed long long _t266;
                				signed long long _t268;
                				signed long long _t270;
                				signed long long _t272;
                				void* _t273;
                				void* _t276;
                				signed long long _t278;
                				char* _t284;
                				signed int _t287;
                				signed long long _t288;
                				void* _t294;
                				signed long long _t296;
                				signed long long _t297;
                				void* _t304;
                				void* _t305;
                				signed long long _t308;
                				long long _t315;
                				signed long long _t321;
                
                				_t315 = __r13;
                				_a16 = __rdx;
                				r10d =  *__rcx;
                				if (r10d == 0) goto 0x3f06c125;
                				_t187 =  *__rdx;
                				if (_t187 == 0) goto 0x3f06c125;
                				r10d = r10d - 1;
                				if (_t273 - 1 != 0) goto 0x3f06be32;
                				r12d =  *(__rdx + 4);
                				if (r12d != 1) goto 0x3f06bd82;
                				_t254 =  &(__rcx[1]);
                				 *__rcx = 0;
                				r9d = 0;
                				_v536 = 0;
                				E0000000113F06D370(__rax, _t247, _t254, __rdx, __rcx,  &_v532, _t294, _t305);
                				goto 0x3f06c127;
                				if (r10d != 0) goto 0x3f06bdbd;
                				 *_t254 = 0;
                				r9d = 0;
                				_v536 = 0;
                				E0000000113F06D370(__rax, _t247,  &(_t254[1]), __rdx, __rcx,  &_v532, _t294, _t305);
                				_t173 = _t254[1] % r12d;
                				__rcx[1] = _t173;
                				bpl = _t173 != 0;
                				 *__rcx = 0;
                				goto 0x3f06c127;
                				r15d = 0xffffffff;
                				if (r10d == r15d) goto 0x3f06bdf6;
                				r10d = r10d + r15d;
                				_t276 = (_t278 << 0x20) + (__rax | _t278 << 0x00000020);
                				if (r10d != r15d) goto 0x3f06bdd1;
                				r9d = 0;
                				_v536 = 0;
                				_t284 =  &_v532;
                				 *__rcx = 0;
                				_t124 = E0000000113F06D370(__rax | _t278 << 0x00000020, _t247,  &(__rcx[1]), __rdx, __rcx, _t284, _t294, _t305);
                				__rcx[1] = r14d;
                				__rcx[2] = __ecx;
                				bpl = __ecx != 0;
                				 *__rcx = 1;
                				goto 0x3f06c127;
                				if (_t124 - r10d > 0) goto 0x3f06c125;
                				r8d = r10d;
                				_t268 = r10d;
                				r8d = r8d - _t124;
                				r9d = r10d;
                				_t248 = r8d;
                				if (_t268 - _t248 < 0) goto 0x3f06be98;
                				_t308 = __rdx - _t248 * 4 - __rcx;
                				_t261 = (__rdx >> 0x20) + 4 + _t268 * 4;
                				if ( *((intOrPtr*)(_t308 + _t261)) !=  *_t261) goto 0x3f06be81;
                				r9d = r9d - 1;
                				if (_t268 - 1 - _t248 >= 0) goto 0x3f06be68;
                				goto 0x3f06be98;
                				_t270 = r9d - r8d;
                				_t236 = r9d;
                				if ( *((intOrPtr*)(__rdx + 4 + _t270 * 4)) -  *(__rcx + 4 + _t236 * 4) >= 0) goto 0x3f06be9b;
                				r8d = r8d + 1;
                				_t208 = r8d;
                				if (_t208 == 0) goto 0x3f06c125;
                				r9d =  *(__rdx + 4 + _t236 * 4);
                				_t190 =  *(__rdx + 4 + _t236 * 4);
                				asm("inc ecx");
                				_a8 = _t190;
                				if (_t208 == 0) goto 0x3f06bed1;
                				r11d = 0x1f;
                				r11d = r11d - _t276 - 2;
                				goto 0x3f06bed4;
                				r11d = 0x20;
                				_a24 = r11d;
                				_v568 = 0x20;
                				if (r11d == 0) goto 0x3f06bf1f;
                				_t161 = r11d;
                				r9d = _t190 >> 0x20;
                				_t191 = _t190 << _t161;
                				r9d = r9d | r9d << _t161;
                				_a8 = _t191;
                				if (_t187 - 2 <= 0) goto 0x3f06bf1f;
                				_a8 = _t191 |  *(__rdx + 4 + _t236 * 4) >> 0x00000020;
                				r14d = _t284 - 1;
                				r12d = 0;
                				if (r14d < 0) goto 0x3f06c0f0;
                				r15d = 0xffffffff;
                				_v64 = __r13;
                				r13d = __rdx + _t276;
                				_v544 = _t248;
                				_v552 = _t236;
                				if (r13d - r10d > 0) goto 0x3f06bf5e;
                				goto 0x3f06bf60;
                				_a32 = 0;
                				r11d =  *(__rcx + 4 + _t236 * 4);
                				_v560 = _t261 - 4;
                				_v556 = 0;
                				_t181 = _a24;
                				if (_t181 == 0) goto 0x3f06bfc0;
                				r8d = r11d;
                				_t164 = _t181;
                				r11d = r11d << _t164;
                				if (r13d - 3 < 0) goto 0x3f06bfc5;
                				_t140 =  *(__rcx + 4 + (_v560 << _t164) * 4) >> _v568;
                				r11d = r11d | _t140;
                				goto 0x3f06bfc5;
                				_t287 = _v560;
                				_t239 = _t287;
                				r8d = _t140 % _t248;
                				if (_t239 - _t321 <= 0) goto 0x3f06bfef;
                				_t296 = _t321;
                				_t288 = _t287 + 0x1;
                				if (_t288 - _t321 > 0) goto 0x3f06c01e;
                				_t266 = _t288 << 0x00000020 | _t308;
                				if (0x1 - _t266 <= 0) goto 0x3f06c01e;
                				_t297 = _t296 - 1;
                				if (_t288 + _t248 - _t321 <= 0) goto 0x3f06c001;
                				if (_t297 == 0) goto 0x3f06c0d1;
                				r11d = 0;
                				if (_t187 == 0) goto 0x3f06c07f;
                				r8d = r10d;
                				_t304 =  >=  ? _t278 + 0x1 >> 0x20 : (_t278 + 0x1 >> 0x20) + 1;
                				r11d = r11d + 1;
                				 *((intOrPtr*)(__rcx + 4 + _t266 * 4)) = __rcx[0xffffffff00000002] - r8d;
                				if (r11d - _t187 < 0) goto 0x3f06c040;
                				if (0x1 - _t304 >= 0) goto 0x3f06c0cd;
                				r10d = 0;
                				if (_t187 == 0) goto 0x3f06c0ca;
                				r10d = r10d + 1;
                				_t272 =  &(__rcx[0xffffffff00000001]);
                				 *(_t272 + 4) = r8d;
                				_t225 = r10d - _t187;
                				if (_t225 < 0) goto 0x3f06c0a1;
                				_t107 = _t315 - 1; // -1
                				r10d = _t107;
                				r13d = r13d - 1;
                				r14d = r14d - 1;
                				if (_t225 >= 0) goto 0x3f06bf52;
                				_t185 = _t304 + 1;
                				if (_t185 -  *__rcx >= 0) goto 0x3f06c10c;
                				asm("o16 nop [eax+eax]");
                				 *((intOrPtr*)(__rcx + 4 + ((0x1 + _t239) * _t248 * _t296 - _t270) * _t297 * 4)) = 0;
                				if (_t185 + 1 -  *__rcx < 0) goto 0x3f06c100;
                				 *__rcx = _t185;
                				if (_t185 == 0) goto 0x3f06c120;
                				_t186 = _t185 - 1;
                				if ( *((intOrPtr*)(__rcx + 4 + _t272 * 4)) != 0) goto 0x3f06c120;
                				 *__rcx = _t186;
                				if (_t186 != 0) goto 0x3f06c112;
                				goto 0x3f06c127;
                				return 0;
                			}


















































                0x13f06bd10
                0x13f06bd10
                0x13f06bd26
                0x13f06bd32
                0x13f06bd38
                0x13f06bd3c
                0x13f06bd42
                0x13f06bd4a
                0x13f06bd50
                0x13f06bd5a
                0x13f06bd64
                0x13f06bd68
                0x13f06bd6a
                0x13f06bd6d
                0x13f06bd76
                0x13f06bd7d
                0x13f06bd85
                0x13f06bd8f
                0x13f06bd91
                0x13f06bd98
                0x13f06bda1
                0x13f06bdaa
                0x13f06bdaf
                0x13f06bdb2
                0x13f06bdb6
                0x13f06bdb8
                0x13f06bdbd
                0x13f06bdcc
                0x13f06bddc
                0x13f06bdee
                0x13f06bdf4
                0x13f06bdf6
                0x13f06bdf9
                0x13f06bdfd
                0x13f06be02
                0x13f06be0d
                0x13f06be15
                0x13f06be22
                0x13f06be25
                0x13f06be2b
                0x13f06be2d
                0x13f06be35
                0x13f06be3b
                0x13f06be3e
                0x13f06be41
                0x13f06be44
                0x13f06be47
                0x13f06be4d
                0x13f06be61
                0x13f06be64
                0x13f06be6e
                0x13f06be70
                0x13f06be7d
                0x13f06be7f
                0x13f06be87
                0x13f06be8a
                0x13f06be96
                0x13f06be98
                0x13f06be9b
                0x13f06be9e
                0x13f06beac
                0x13f06beb4
                0x13f06beb9
                0x13f06bebd
                0x13f06bec4
                0x13f06bec6
                0x13f06becc
                0x13f06becf
                0x13f06bed1
                0x13f06bed7
                0x13f06bedf
                0x13f06bee6
                0x13f06bef1
                0x13f06bef6
                0x13f06bef9
                0x13f06befb
                0x13f06befe
                0x13f06bf08
                0x13f06bf18
                0x13f06bf21
                0x13f06bf25
                0x13f06bf2b
                0x13f06bf33
                0x13f06bf3c
                0x13f06bf44
                0x13f06bf48
                0x13f06bf4d
                0x13f06bf55
                0x13f06bf5c
                0x13f06bf64
                0x13f06bf73
                0x13f06bf78
                0x13f06bf7d
                0x13f06bf81
                0x13f06bf8a
                0x13f06bf91
                0x13f06bf9c
                0x13f06bfa4
                0x13f06bfab
                0x13f06bfb9
                0x13f06bfbb
                0x13f06bfbe
                0x13f06bfc0
                0x13f06bfc7
                0x13f06bfcd
                0x13f06bfd6
                0x13f06bfe5
                0x13f06bfec
                0x13f06bff2
                0x13f06c008
                0x13f06c00e
                0x13f06c010
                0x13f06c01c
                0x13f06c021
                0x13f06c02a
                0x13f06c02f
                0x13f06c051
                0x13f06c067
                0x13f06c06e
                0x13f06c071
                0x13f06c078
                0x13f06c089
                0x13f06c08b
                0x13f06c090
                0x13f06c0a5
                0x13f06c0ac
                0x13f06c0bd
                0x13f06c0c5
                0x13f06c0c8
                0x13f06c0cd
                0x13f06c0cd
                0x13f06c0d5
                0x13f06c0de
                0x13f06c0e2
                0x13f06c0f0
                0x13f06c0f8
                0x13f06c0fa
                0x13f06c104
                0x13f06c10a
                0x13f06c10c
                0x13f06c110
                0x13f06c112
                0x13f06c118
                0x13f06c11a
                0x13f06c11e
                0x13f06c123
                0x13f06c138

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: memcpy_s
                • String ID:
                • API String ID: 1502251526-0
                • Opcode ID: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                • Instruction ID: 7bd3265bc40d5e931cfe2be6740ee60e6687a4bf6eed72ca82782124d8bd3363
                • Opcode Fuzzy Hash: 4ea583caa57715286bcbaff0c0c248d65fdcd68c244adb70adfc071040c02cb8
                • Instruction Fuzzy Hash: 8FC128B2B1428987EB38CF1DE144B9AB792F394794F248139EB4A47745D73DDA42CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 98%
                			E0000000113F058080(void* __edx, void* __esi, void* __rax, signed int __rcx, void* __r10, void* __r11, void* _a8, unsigned int _a16, intOrPtr _a24, intOrPtr _a32) {
                				signed long long _v88;
                				signed long long _v96;
                				long long _v104;
                				long long _v112;
                				unsigned int _t114;
                				signed char _t116;
                				signed char _t129;
                				signed char _t131;
                				signed int _t142;
                				signed int _t159;
                				intOrPtr _t161;
                				unsigned int _t167;
                				unsigned int _t174;
                				signed char _t184;
                				signed char _t188;
                				signed char _t190;
                				signed char _t196;
                				signed char _t200;
                				signed char _t203;
                				void* _t210;
                				signed char _t222;
                				signed char _t229;
                				signed char _t230;
                				signed int _t236;
                				signed char _t237;
                				signed char _t258;
                				void* _t270;
                				void* _t272;
                				void* _t273;
                				void* _t274;
                				void* _t275;
                				signed long long _t286;
                				long long _t289;
                				signed long long _t292;
                				signed char* _t297;
                				signed long long _t298;
                				signed long long _t300;
                				long long* _t304;
                				void* _t305;
                				signed char* _t311;
                				signed char* _t312;
                				signed char* _t313;
                				signed char* _t314;
                				signed char* _t315;
                				signed char* _t316;
                				void* _t319;
                				signed int* _t320;
                				char* _t322;
                				char* _t323;
                				char* _t324;
                				signed int* _t325;
                				signed int* _t326;
                				signed int* _t327;
                				signed int* _t328;
                				signed int* _t329;
                				signed int* _t330;
                				signed int* _t331;
                				signed int* _t332;
                				signed int* _t333;
                				long long _t334;
                				signed char* _t335;
                				signed char* _t339;
                				signed char* _t344;
                				signed char* _t345;
                				intOrPtr _t350;
                				intOrPtr _t351;
                				signed char* _t352;
                
                				_a8 = __rcx;
                				_t320 = _t319 - 0x38;
                				_t351 =  *((intOrPtr*)(__rcx + 0x28));
                				_t322 =  *((intOrPtr*)(__rcx + 0x10));
                				_t311 =  *__rcx;
                				_t286 = __rax + _t311;
                				_t334 =  *((intOrPtr*)(_t351 + 0x68));
                				r14d =  *((intOrPtr*)(_t351 + 0x3c));
                				_t352 =  *((intOrPtr*)(_t351 + 0x40));
                				r11d =  *(_t351 + 0x4c);
                				_t350 =  *((intOrPtr*)(_t351 + 0x60));
                				_v96 = _t286;
                				_t300 = _t322 - _t286;
                				_v104 = _t305 + _t322;
                				_a16 =  *((intOrPtr*)(_t351 + 0x34));
                				_v88 = _t300;
                				_a32 =  *((intOrPtr*)(_t351 + 0x38));
                				_v112 = _t334;
                				_a24 = (1 <<  *(_t351 + 0x74)) - 1;
                				 *_t320 = 1;
                				if (r11d - 0xf >= 0) goto 0x3f058148;
                				_t312 =  &(_t311[2]);
                				r11d = r11d + 0x10;
                				_t292 = __rcx & _t286;
                				_t114 =  *(_t350 + _t292 * 4);
                				_t184 = _t114 >> 0x00000008 & 0x000000ff;
                				r11d = r11d - _t184;
                				_t222 = _t114 & 0x000000ff;
                				if (_t114 == 0) goto 0x3f0581ac;
                				r10d = _t114;
                				r10d = r10d >> 0x10;
                				if ((_t222 & 0x00000010) != 0) goto 0x3f0581ba;
                				if ((_t222 & 0x00000040) != 0) goto 0x3f05849f;
                				_t116 =  *(_t350 + _t300 * 4);
                				r10d = _t116;
                				_t188 = _t116 >> 0x00000008 & 0x000000ff;
                				r11d = r11d - _t188;
                				r10d = r10d >> 0x10;
                				_t258 = _t116;
                				if (_t258 != 0) goto 0x3f058170;
                				 *_t322 = _t116 >> 0x10;
                				_t323 = _t322 + 1;
                				goto 0x3f05848b;
                				_t229 = _t116 & 0xf;
                				if (_t258 == 0) goto 0x3f0581e7;
                				if (r11d - _t229 >= 0) goto 0x3f0581d5;
                				_t313 =  &(_t312[1]);
                				_t167 = ( *(_t351 + 0x48) + (( *_t311 & 0x000000ff) << r11d) + ((_t311[1] & 0x000000ff) << __r11 + 8) >> _t184 >> _t188) + (( *_t312 & 0x000000ff) << r11d);
                				r11d = r11d + 8;
                				_t190 = _t229;
                				r10d = r10d + ((0x00000001 << _t190) - 0x00000001 & _t167);
                				r11d = r11d - _t229;
                				if (r11d - 0xf >= 0) goto 0x3f05820b;
                				_t314 =  &(_t313[2]);
                				r11d = r11d + 0x10;
                				_t129 =  *(_t334 + (_t292 & _t286) * 4);
                				r9d = _t129;
                				_t196 = _t129 >> 0x00000008 & 0x000000ff;
                				r11d = r11d - _t196;
                				_t230 = _t129 & 0x000000ff;
                				r9d = r9d >> 0x10;
                				if ((_t230 & 0x00000010) != 0) goto 0x3f058273;
                				if ((_t230 & 0x00000040) != 0) goto 0x3f0584cb;
                				_t131 =  *(_v112 + _t300 * 4);
                				r9d = _t131;
                				_t200 = _t131 >> 0x00000008 & 0x000000ff;
                				r11d = r11d - _t200;
                				_t236 = _t131 & 0x000000ff;
                				r9d = r9d >> 0x10;
                				if ((_t236 & 0x00000010) == 0) goto 0x3f058237;
                				_t237 = _t236 & 0x0000000f;
                				if (r11d - _t237 >= 0) goto 0x3f0582a2;
                				r11d = r11d + 8;
                				_t315 =  &(_t314[1]);
                				if (r11d - _t237 >= 0) goto 0x3f0582a2;
                				_t174 = ((_t167 >> _t190) + (( *_t313 & 0x000000ff) << r11d) + ((_t313[1] & 0x000000ff) << __r11 + 8) >> _t196 >> _t200) + (( *_t314 & 0x000000ff) << r11d) + (( *_t315 & 0x000000ff) << r11d);
                				_t316 =  &(_t315[1]);
                				r11d = r11d + 8;
                				_t203 = _t237;
                				r11d = r11d - _t237;
                				if (1 - r8d - _v88 <= 0) goto 0x3f058424;
                				if (1 - _a32 <= 0) goto 0x3f0582de;
                				if ( *((intOrPtr*)(_t351 + 0x1be0)) != 0) goto 0x3f0584e8;
                				if (r14d != 0) goto 0x3f058318;
                				r9d = _a16;
                				r9d = r9d - 1;
                				_t335 = _t334 + _t352;
                				_t270 = 1 - r10d;
                				if (_t270 >= 0) goto 0x3f0583ab;
                				r10d = r10d - 1;
                				 *_t323 =  *_t335 & 0x000000ff;
                				_t324 = _t323 + 1;
                				if (_t270 != 0) goto 0x3f058300;
                				goto 0x3f0583a3;
                				if (r14d - 1 >= 0) goto 0x3f058375;
                				r9d = _a16;
                				r9d = r9d + r14d - 1;
                				_t272 = 1 - r10d;
                				if (_t272 >= 0) goto 0x3f0583ab;
                				r10d = r10d - 1;
                				 *_t324 =  *( &(( &(_t335[1]))[_t352]) - _t324 + _t324) & 0x000000ff;
                				_t325 = _t324 + 1;
                				if (_t272 != 0) goto 0x3f058340;
                				_t339 = _t352;
                				_t273 = r14d - r10d;
                				if (_t273 >= 0) goto 0x3f0583ab;
                				r10d = r10d - r14d;
                				_t142 =  *_t339 & 0x000000ff;
                				 *_t325 = _t142;
                				_t326 =  &(_t325[0]);
                				_t210 = r14d + 0xffffffff;
                				if (_t273 != 0) goto 0x3f058360;
                				goto 0x3f0583a3;
                				r9d = _t142;
                				_t274 = _t210 - r10d;
                				if (_t274 >= 0) goto 0x3f0583ab;
                				r10d = r10d - _t210;
                				asm("o16 nop [eax+eax]");
                				 *_t326 = ( &(_t339[1]))[_t352] & 0x000000ff;
                				_t327 =  &(_t326[0]);
                				if (_t274 != 0) goto 0x3f058390;
                				_t344 = _t327 - _t286;
                				_t275 = r10d - 2;
                				if (_t275 <= 0) goto 0x3f0583fa;
                				asm("o16 nop [eax+eax]");
                				r10d = r10d + 0xfffffffd;
                				 *_t327 =  *_t344 & 0x000000ff;
                				_t327[0] = _t344[1] & 0x000000ff;
                				_t345 =  &(_t344[3]);
                				_t327[0] = _t344[2] & 0x000000ff;
                				_t328 =  &(_t327[0]);
                				if (_t275 != 0) goto 0x3f0583d0;
                				if (r10d == 0) goto 0x3f058481;
                				 *_t328 =  *_t345 & 0x000000ff;
                				_t329 =  &(_t328[0]);
                				if (r10d - 1 <= 0) goto 0x3f058486;
                				 *_t329 = _t345[1] & 0x000000ff;
                				_t330 =  &(_t329[0]);
                				goto 0x3f058486;
                				_t297 = _t330 - _t286;
                				_t298 =  &(_t297[3]);
                				 *_t330 =  *_t297 & 0x000000ff;
                				r10d = r10d + 0xfffffffd;
                				_t330[0] =  *(_t298 - 2) & 0x000000ff;
                				_t330[0] =  *(_t298 - 1) & 0x000000ff;
                				_t331 =  &(_t330[0]);
                				if (r10d - 2 > 0) goto 0x3f058430;
                				if (r10d == 0) goto 0x3f058481;
                				 *_t331 =  *_t298 & 0x000000ff;
                				_t332 =  &(_t331[0]);
                				if (r10d - 1 <= 0) goto 0x3f05848b;
                				 *_t332 =  *(_t298 + 1) & 0x000000ff;
                				_t333 =  &(_t332[0]);
                				goto 0x3f05848b;
                				if (_t316 - _v96 >= 0) goto 0x3f058505;
                				if (_t333 - _v104 >= 0) goto 0x3f058505;
                				goto 0x3f058124;
                				if (( *_t320 & 0x00000020) == 0) goto 0x3f0584b6;
                				 *((intOrPtr*)(_t351 + 8)) = 0x3f3f;
                				goto 0x3f058512;
                				 *((long long*)(_a8 + 0x20)) = "invalid literal/length code";
                				 *((intOrPtr*)(_t351 + 8)) = 0x3f51;
                				goto 0x3f058512;
                				 *((long long*)(_a8 + 0x20)) = "invalid distance code";
                				 *((intOrPtr*)(_t351 + 8)) = 0x3f51;
                				goto 0x3f058512;
                				_t289 = "invalid distance too far back";
                				 *((long long*)(_a8 + 0x20)) = _t289;
                				 *((intOrPtr*)(_t351 + 8)) = 0x3f51;
                				goto 0x3f05850d;
                				_t304 = _a8;
                				 *(_t304 + 0x10) = _t333;
                				 *((intOrPtr*)(_t304 + 0x18)) = ((0x00000001 << _t203) - 0x00000001 & _t174) + r9d - r8d + 0x101;
                				 *_t304 = _t316 - _t289;
                				_t159 = _t298 * 8;
                				r11d = r11d - _t159;
                				_t161 = _t159 - __esi + 5;
                				 *((intOrPtr*)(_t304 + 8)) = _t161;
                				 *(_t351 + 0x4c) = r11d;
                				 *(_t351 + 0x48) = (0x00000001 << r11d) - 0x00000001 & _t174 >> _t203;
                				return _t161;
                			}






































































                0x13f058080
                0x13f058091
                0x13f058095
                0x13f0580a1
                0x13f0580a8
                0x13f0580ae
                0x13f0580b1
                0x13f0580b7
                0x13f0580bb
                0x13f0580d0
                0x13f0580d4
                0x13f0580d8
                0x13f0580e2
                0x13f0580e5
                0x13f0580ee
                0x13f0580f9
                0x13f058100
                0x13f058115
                0x13f05811a
                0x13f058121
                0x13f058128
                0x13f058140
                0x13f058144
                0x13f05814c
                0x13f05814f
                0x13f058158
                0x13f05815d
                0x13f058160
                0x13f058165
                0x13f058167
                0x13f05816a
                0x13f058173
                0x13f058178
                0x13f05818d
                0x13f058196
                0x13f058199
                0x13f05819e
                0x13f0581a1
                0x13f0581a8
                0x13f0581aa
                0x13f0581af
                0x13f0581b2
                0x13f0581b5
                0x13f0581ba
                0x13f0581bd
                0x13f0581c2
                0x13f0581cc
                0x13f0581cf
                0x13f0581d1
                0x13f0581d5
                0x13f0581e1
                0x13f0581e4
                0x13f0581eb
                0x13f058203
                0x13f058207
                0x13f058217
                0x13f058220
                0x13f058223
                0x13f058228
                0x13f05822b
                0x13f05822e
                0x13f058235
                0x13f05823a
                0x13f058254
                0x13f05825c
                0x13f05825f
                0x13f058264
                0x13f058267
                0x13f05826a
                0x13f058271
                0x13f058273
                0x13f058279
                0x13f058283
                0x13f058289
                0x13f05828f
                0x13f058299
                0x13f05829b
                0x13f05829e
                0x13f0582a2
                0x13f0582b3
                0x13f0582bd
                0x13f0582ce
                0x13f0582d8
                0x13f0582e1
                0x13f0582e3
                0x13f0582eb
                0x13f0582ee
                0x13f0582f1
                0x13f0582f4
                0x13f0582fa
                0x13f058308
                0x13f05830b
                0x13f058311
                0x13f058313
                0x13f058320
                0x13f058322
                0x13f05832d
                0x13f058333
                0x13f058336
                0x13f058338
                0x13f058345
                0x13f058348
                0x13f05834e
                0x13f058350
                0x13f058353
                0x13f058356
                0x13f05835b
                0x13f058360
                0x13f058368
                0x13f05836b
                0x13f05836e
                0x13f058371
                0x13f058373
                0x13f058375
                0x13f05837b
                0x13f05837e
                0x13f058380
                0x13f058387
                0x13f058398
                0x13f05839b
                0x13f0583a1
                0x13f0583a8
                0x13f0583ab
                0x13f0583af
                0x13f0583c5
                0x13f0583d4
                0x13f0583d8
                0x13f0583e0
                0x13f0583e9
                0x13f0583ed
                0x13f0583f1
                0x13f0583f8
                0x13f0583fd
                0x13f05840c
                0x13f05840f
                0x13f058415
                0x13f05841c
                0x13f05841f
                0x13f058422
                0x13f058429
                0x13f058433
                0x13f058437
                0x13f05843a
                0x13f058442
                0x13f05844a
                0x13f05844e
                0x13f058456
                0x13f05845b
                0x13f05846a
                0x13f05846d
                0x13f058473
                0x13f058479
                0x13f05847c
                0x13f05847f
                0x13f058490
                0x13f058495
                0x13f05849a
                0x13f0584aa
                0x13f0584ac
                0x13f0584b4
                0x13f0584bd
                0x13f0584c1
                0x13f0584c9
                0x13f0584da
                0x13f0584de
                0x13f0584e6
                0x13f0584f0
                0x13f0584f7
                0x13f0584fb
                0x13f058503
                0x13f058505
                0x13f058515
                0x13f05852a
                0x13f05852d
                0x13f058530
                0x13f058537
                0x13f058546
                0x13f058549
                0x13f058550
                0x13f058554
                0x13f058568

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
                • API String ID: 0-3255898291
                • Opcode ID: 8fc2dda792858a10c88647a3a9faad95396f07a7bb82160c42dbdb4a47c1c8fd
                • Instruction ID: 103144eb46bcf2b4fdbd9eabcddbe86c1732e1e298845f760863bc751e72e405
                • Opcode Fuzzy Hash: 8fc2dda792858a10c88647a3a9faad95396f07a7bb82160c42dbdb4a47c1c8fd
                • Instruction Fuzzy Hash: ECD1F532A1C5D8CBD75D8B2DD5987AD3BE2E395750F048129EE9A837C2D67CCA4AC700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 91%
                			E0000000113F066CAC(intOrPtr* __rax, long long __rbx, unsigned int* __rcx, char* __rdx, long long __rsi, long long __rbp, void* __r8, void* __r9, void* __r10, char* _a40, intOrPtr _a48, signed int _a56, intOrPtr _a64, signed long long _a72) {
                				void* _v40;
                				intOrPtr _v48;
                				intOrPtr _v64;
                				intOrPtr _v72;
                				long long _v88;
                				intOrPtr _v96;
                				char _v104;
                				intOrPtr _v112;
                				long long _v120;
                				void* _t68;
                				intOrPtr _t74;
                				void* _t75;
                				char _t76;
                				signed int _t78;
                				void* _t111;
                				intOrPtr _t112;
                				void* _t113;
                				signed int _t114;
                				void* _t128;
                				intOrPtr* _t144;
                				char* _t148;
                				unsigned long long _t164;
                				char* _t178;
                				char* _t179;
                				char* _t186;
                				intOrPtr* _t189;
                				char* _t190;
                				void* _t191;
                				void* _t194;
                				void* _t195;
                				signed long long _t200;
                				signed long long _t204;
                				signed long long _t207;
                				void* _t210;
                				char* _t214;
                				void* _t215;
                				void* _t219;
                				void* _t221;
                				void* _t225;
                				char* _t227;
                				char* _t228;
                				char* _t229;
                				char* _t234;
                				void* _t236;
                				long long _t241;
                				unsigned int* _t244;
                				void* _t246;
                				intOrPtr* _t247;
                				signed int* _t248;
                
                				_t144 = __rax;
                				_t236 = _t221;
                				 *((long long*)(_t236 + 8)) = __rbx;
                				 *((long long*)(_t236 + 0x10)) = __rbp;
                				 *((long long*)(_t236 + 0x18)) = __rsi;
                				_push(_t210);
                				_push(_t241);
                				r13d = 0;
                				 *((intOrPtr*)(__rdx)) = r13b;
                				_t178 = __rdx;
                				_t244 = __rcx;
                				_t200 = _a72;
                				_t219 = __r9;
                				_t111 =  >=  ? _a48 : r13d;
                				E0000000113F05BE30(__rax, __rdx, _t236 - 0x48, _t200, __r8, _t246);
                				_t7 = _t210 + 0xb; // 0xb
                				if (__r8 - _t7 > 0) goto 0x3f066d1a;
                				E0000000113F05DEB4(_t144);
                				_t8 = _t241 + 0x22; // 0x22
                				_t112 = _t8;
                				 *_t144 = _t112;
                				E0000000113F063618();
                				goto 0x3f066fe6;
                				if (( *__rcx >> 0x00000034 & _t200) != _t200) goto 0x3f066da7;
                				_v88 = _t241;
                				_t225 = __r8;
                				_v96 = _a64;
                				_t148 = _a40;
                				_v104 = r13b;
                				_v112 = _t112;
                				_v120 = _t148;
                				_t68 = E0000000113F06701C(_t178, __rcx, _t178, __r8, __r8, __r10);
                				_t113 = _t68;
                				if (_t68 == 0) goto 0x3f066d76;
                				 *_t178 = r13b;
                				goto 0x3f066fe6;
                				_t186 = _t178;
                				E0000000113F0599E0(_t68, 0x65, _t148, _t186);
                				if (_t148 == 0) goto 0x3f066fe3;
                				 *_t148 = ((_a56 ^ 0x00000001) << 5) + 0x50;
                				 *((intOrPtr*)(_t148 + 3)) = r13b;
                				goto 0x3f066fe3;
                				if (_t186 >= 0) goto 0x3f066db9;
                				 *_t178 = 0x2d;
                				_t179 = _t178 + 1;
                				_t19 = _t179 + 1; // 0x3
                				_t247 = _t19;
                				r12d = (_a56 ^ 0x00000001) & 0x000000ff;
                				r10d = 0x30;
                				if ((0x00000000 &  *_t244) != 0) goto 0x3f066e0e;
                				 *_t179 = r10b;
                				asm("dec eax");
                				goto 0x3f066e11;
                				 *_t179 = 0x31;
                				_t22 = _t247 + 1; // 0x3
                				_t214 = _t22;
                				if (_t113 != 0) goto 0x3f066e1e;
                				goto 0x3f066e2f;
                				_t74 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_v64 + 0xf8))))));
                				 *_t247 = _t74;
                				if (( *_t244 & 0xffffffff) <= 0) goto 0x3f066ec8;
                				r8d = r10w & 0xffffffff;
                				if (_t113 <= 0) goto 0x3f066e7b;
                				_t75 = _t74 + r10w;
                				_t128 = _t75 - 0x39;
                				if (_t128 <= 0) goto 0x3f066e69;
                				_t76 = _t75 + (r12d << 5) + 7;
                				 *_t214 = _t76;
                				_t114 = _t113 - 1;
                				_t215 = _t214 + 1;
                				r8w = r8w + 0xfffc;
                				if (_t128 >= 0) goto 0x3f066e49;
                				if (r8w < 0) goto 0x3f066ec8;
                				if (_t76 - 8 <= 0) goto 0x3f066ec8;
                				_t27 = _t215 - 1; // 0x3
                				_t189 = _t27;
                				r8b =  *_t189;
                				if ((_t225 - 0x00000046 & 0x000000df) != 0) goto 0x3f066ead;
                				 *_t189 = r10b;
                				_t190 = _t189 - 1;
                				goto 0x3f066e9a;
                				if (_t190 == _t247) goto 0x3f066ec5;
                				if (r8b != 0x39) goto 0x3f066ebd;
                				goto 0x3f066ec1;
                				 *_t190 = _t225 + 1;
                				goto 0x3f066ec8;
                				 *((char*)(_t190 - 1)) =  *((char*)(_t190 - 1)) + 1;
                				if (_t114 <= 0) goto 0x3f066ee5;
                				r8d = _t114;
                				_t191 = _t215;
                				_t78 = E0000000113F0597D0(_t225 - 0x46, r10b, _t191, _t178, _t225);
                				r10d = 0x30;
                				_t248 =  !=  ? _t215 + _t179 : _t247;
                				r12b = r12b << 5;
                				r12b = r12b + 0x50;
                				 *_t248 = r12b;
                				_t34 =  &(_t248[0]); // 0x4
                				_t234 = _t34;
                				_t164 =  *_t244 >> 0x34;
                				if ( *_t247 - r13b >= 0) goto 0x3f066f17;
                				_t194 = _t219 - _t164;
                				_t35 = _t164 + 2; // 0x2d
                				_t81 =  <  ? _t35 : 0x2b;
                				_t248[0] =  <  ? _t35 : 0x2b;
                				 *_t234 = r10b;
                				if (_t194 - 0x3e8 < 0) goto 0x3f066f68;
                				_t37 = _t234 + 1; // 0x5
                				_t227 = _t37;
                				_t204 = (_t191 - _t219 >> 7) + (_t191 - _t219 >> 7 >> 0x3f);
                				 *_t234 = __r10 + _t204;
                				_t195 = _t194 + _t204 * 0xfffffc18;
                				if (_t227 != _t234) goto 0x3f066f73;
                				if (_t195 - 0x64 < 0) goto 0x3f066fa2;
                				_t207 = (_t204 + _t195 >> 6) + (_t204 + _t195 >> 6 >> 0x3f);
                				 *_t227 = __r10 + _t207;
                				_t228 = _t227 + 1;
                				if (_t228 != _t234) goto 0x3f066fad;
                				if (_t195 + _t207 * 0xffffff9c - 0xa < 0) goto 0x3f066fd9;
                				 *_t228 = __r10 + (_t207 >> 2) + (_t207 >> 2 >> 0x3f);
                				_t229 = _t228 + 1;
                				 *_t229 = (_t78 & 0x000007ff) + r10b;
                				 *((intOrPtr*)(_t229 + 1)) = r13b;
                				if (_v48 == r13b) goto 0x3f066ff9;
                				 *(_v72 + 0x3a8) =  *(_v72 + 0x3a8) & 0xfffffffd;
                				return r13d;
                			}




















































                0x13f066cac
                0x13f066cac
                0x13f066caf
                0x13f066cb3
                0x13f066cb7
                0x13f066cbb
                0x13f066cbe
                0x13f066ccf
                0x13f066cd4
                0x13f066cd7
                0x13f066cda
                0x13f066cdd
                0x13f066cec
                0x13f066cef
                0x13f066cf5
                0x13f066cfa
                0x13f066d03
                0x13f066d05
                0x13f066d0a
                0x13f066d0a
                0x13f066d0e
                0x13f066d10
                0x13f066d15
                0x13f066d2f
                0x13f066d3b
                0x13f066d40
                0x13f066d43
                0x13f066d4a
                0x13f066d55
                0x13f066d5a
                0x13f066d5e
                0x13f066d63
                0x13f066d68
                0x13f066d6c
                0x13f066d6e
                0x13f066d71
                0x13f066d7b
                0x13f066d7e
                0x13f066d86
                0x13f066d9c
                0x13f066d9e
                0x13f066da2
                0x13f066daf
                0x13f066db1
                0x13f066db3
                0x13f066dc0
                0x13f066dc0
                0x13f066dcb
                0x13f066dcf
                0x13f066df5
                0x13f066df7
                0x13f066e03
                0x13f066e0c
                0x13f066e0e
                0x13f066e11
                0x13f066e11
                0x13f066e17
                0x13f066e1c
                0x13f066e2d
                0x13f066e2f
                0x13f066e35
                0x13f066e3b
                0x13f066e4b
                0x13f066e5c
                0x13f066e60
                0x13f066e64
                0x13f066e66
                0x13f066e69
                0x13f066e6b
                0x13f066e6d
                0x13f066e74
                0x13f066e79
                0x13f066e7f
                0x13f066e94
                0x13f066e96
                0x13f066e96
                0x13f066e9a
                0x13f066ea3
                0x13f066ea5
                0x13f066ea8
                0x13f066eab
                0x13f066eb0
                0x13f066eb6
                0x13f066ebb
                0x13f066ec1
                0x13f066ec3
                0x13f066ec5
                0x13f066eca
                0x13f066ecc
                0x13f066ed2
                0x13f066ed7
                0x13f066edf
                0x13f066ee8
                0x13f066eec
                0x13f066ef0
                0x13f066ef4
                0x13f066ef7
                0x13f066ef7
                0x13f066efe
                0x13f066f0f
                0x13f066f14
                0x13f066f22
                0x13f066f25
                0x13f066f28
                0x13f066f2c
                0x13f066f36
                0x13f066f42
                0x13f066f42
                0x13f066f54
                0x13f066f5b
                0x13f066f65
                0x13f066f6b
                0x13f066f71
                0x13f066f8e
                0x13f066f95
                0x13f066f98
                0x13f066fa5
                0x13f066fab
                0x13f066fcc
                0x13f066fcf
                0x13f066fdc
                0x13f066fdf
                0x13f066feb
                0x13f066ff2
                0x13f067018

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: gfffffff
                • API String ID: 3215553584-1523873471
                • Opcode ID: 99a1fd0c1530facebddc2638169dd28810dac5974354230458c6acefd113e178
                • Instruction ID: aca7fef95b73dbce830312ee21243e628b7533881942764b26e2f82f522014f9
                • Opcode Fuzzy Hash: 99a1fd0c1530facebddc2638169dd28810dac5974354230458c6acefd113e178
                • Instruction Fuzzy Hash: 25914673B057C886EF19CB2ED4007ED6BA6E755B94F258036EA594B392EA3DC607C301
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 63%
                			E0000000113F067544(signed char __edx, intOrPtr* __rax, long long __rbx, unsigned int* __rcx, char* __rdx, long long __rsi, signed int __rbp, void* __r8, void* __r9, void* __r11, long long _a8, long long _a16, long long _a24, signed long long _a40, intOrPtr _a48, long long _a56, signed long long _a64, void* _a72) {
                				void* _v8;
                				long long _v16;
                				intOrPtr _v20;
                				char _v24;
                				long long _v40;
                				intOrPtr _v48;
                				intOrPtr _v56;
                				long long _v64;
                				long long _v72;
                				void* __rdi;
                				signed char _t88;
                				intOrPtr _t96;
                				intOrPtr _t98;
                				void* _t106;
                				void* _t114;
                				void* _t128;
                				signed long long _t129;
                				long long _t130;
                				void* _t136;
                				unsigned int _t146;
                				signed long long _t152;
                				void* _t163;
                				unsigned int* _t165;
                				unsigned long long _t173;
                				signed long long _t183;
                				signed long long _t184;
                				long long _t185;
                				long long _t190;
                				void* _t195;
                
                				_t195 = __r11;
                				_t167 = __rbp;
                				_t88 = __edx;
                				_a8 = __rbx;
                				_a16 = __rbp;
                				_a24 = __rsi;
                				_t165 = __rcx;
                				if (__rdx != 0) goto 0x3f067581;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06781c;
                				if (__r8 == 0) goto 0x3f067569;
                				if (__r9 == 0) goto 0x3f067569;
                				_t183 = _a40;
                				if (_t183 == 0) goto 0x3f067569;
                				if (_a48 == 0x41) goto 0x3f0675b1;
                				if (__rcx - 0x45 - 2 <= 0) goto 0x3f0675b1;
                				r11b = 0;
                				goto 0x3f0675b4;
                				r11b = 1;
                				_t152 = _a64;
                				if ((_t88 & 0x00000008) != 0) goto 0x3f0676a6;
                				_t173 =  *((intOrPtr*)(__rcx));
                				_t106 = (_t173 >> 0x00000034 & __rbp) - __rbp;
                				if (_t106 != 0) goto 0x3f0676a6;
                				if (_t106 != 0) goto 0x3f0675fb;
                				goto 0x3f067628;
                				if (_t173 >= 0) goto 0x3f067614;
                				if ((_t173 & 0xffffffff) != 0) goto 0x3f067614;
                				goto 0x3f067628;
                				asm("dec eax");
                				_t143 = (_t152 & 0xfffffffc) + 8;
                				_t128 = (_t173 >> 0x3f) + 4;
                				if (__r8 - _t128 >= 0) goto 0x3f06763a;
                				 *__rdx = 0;
                				goto 0x3f06769f;
                				_t184 = _t183 | 0xffffffff;
                				if (r8b == 0) goto 0x3f067654;
                				 *__rdx = 0x2d;
                				_t136 = __rdx + 1;
                				 *_t136 = 0;
                				if (__r8 == _t184) goto 0x3f067654;
                				_t163 = __r8 - 1;
                				_t129 = _t128 + (_t152 & 0xfffffffc) + 8;
                				_t175 =  *((intOrPtr*)(0x3f078ba0 + _t129 * 8));
                				_t185 = _t184 + 1;
                				if ( *((char*)( *((intOrPtr*)(0x3f078ba0 + _t129 * 8)) + _t185)) != 0) goto 0x3f06766d;
                				r8d = _t152 + _t129;
                				_t114 = E0000000113F0628CC(_t129, _t136, _t163,  *((intOrPtr*)(0x3f078ba0 + (_t175 + _t143) * 8)));
                				if (_t114 != 0) goto 0x3f067832;
                				goto 0x3f06781c;
                				if (_t114 == 0) goto 0x3f0677e5;
                				if (_t114 == 0) goto 0x3f0677ac;
                				if (_t114 == 0) goto 0x3f06771f;
                				if (_t114 == 0) goto 0x3f0676e3;
                				if (_t114 == 0) goto 0x3f0677e5;
                				if (_t114 == 0) goto 0x3f0677ac;
                				if (0xffffffffffffff9b == 1) goto 0x3f06771f;
                				_t130 = _a72;
                				_v40 = _t130;
                				_v48 = 2;
                				_v56 = r11b;
                				_v64 = _a56;
                				_v72 = _t185;
                				E0000000113F067410(0x16, _t130, _t136, __rcx, _t136, _t163, __rbp, _t163);
                				goto 0x3f06781c;
                				_t98 = _a56;
                				_t146 =  *_t165;
                				_v72 = 0x3f078ba0;
                				_t96 = _t98;
                				_v24 = _t130;
                				_v16 = _t130;
                				E0000000113F06C13C(_t96, _t146,  &_v24, 0x3f078ba0, _t195);
                				r8d = _v20;
                				r8d = r8d + _t98;
                				_t158 =  ==  ? _t163 : _t163 - _t146;
                				if (E0000000113F06BC20(_t130, _t136, _t146 + _t136,  ==  ? _t163 : _t163 - _t146,  &_v24, _t195) == 0) goto 0x3f067785;
                				 *_t136 = 0;
                				goto 0x3f06781c;
                				_t190 =  &_v24;
                				_v64 = _a72;
                				r8d = _t98;
                				_v72 = 0;
                				E0000000113F0672CC(E0000000113F06BC20(_t130, _t136, _t146 + _t136,  ==  ? _t163 : _t163 - _t146,  &_v24, _t195), _t136, _t136, _t163, _t165, _t167, _t190, _t195);
                				goto 0x3f06781c;
                				_v40 = _a72;
                				_v48 = _t96;
                				_v56 = r11b;
                				_v64 = _a56;
                				_v72 = _t190;
                				E0000000113F06701C(_t136, _t165, _t136, _t165, _t163, 0x3f078ba0);
                				goto 0x3f06781c;
                				_v40 = _a72;
                				_v48 = _t96;
                				_v56 = r11b;
                				_v64 = _a56;
                				_v72 = 0x3f078ba0;
                				return E0000000113F066CAC(_a72, _t136, _t165, _t136, _t165, _t167, _t163, 0x3f078ba0, 0x3f078ba0);
                			}
































                0x13f067544
                0x13f067544
                0x13f067544
                0x13f067544
                0x13f067549
                0x13f06754e
                0x13f067561
                0x13f067567
                0x13f067569
                0x13f067573
                0x13f067575
                0x13f06757c
                0x13f067584
                0x13f067589
                0x13f06758b
                0x13f067596
                0x13f0675a2
                0x13f0675aa
                0x13f0675ac
                0x13f0675af
                0x13f0675b1
                0x13f0675b4
                0x13f0675bf
                0x13f0675c5
                0x13f0675d7
                0x13f0675da
                0x13f0675f5
                0x13f0675f9
                0x13f067608
                0x13f06760d
                0x13f067612
                0x13f06761d
                0x13f067624
                0x13f06762c
                0x13f067633
                0x13f067635
                0x13f067638
                0x13f06763a
                0x13f067641
                0x13f067643
                0x13f067646
                0x13f067649
                0x13f06764f
                0x13f067651
                0x13f067666
                0x13f067669
                0x13f06766d
                0x13f067675
                0x13f06767f
                0x13f067695
                0x13f067697
                0x13f0676a1
                0x13f0676b3
                0x13f0676bc
                0x13f0676c5
                0x13f0676ca
                0x13f0676cf
                0x13f0676d8
                0x13f0676e1
                0x13f0676e3
                0x13f0676ee
                0x13f0676fd
                0x13f067704
                0x13f067709
                0x13f06770d
                0x13f067715
                0x13f06771a
                0x13f06771f
                0x13f06772b
                0x13f067730
                0x13f067735
                0x13f06773a
                0x13f06773f
                0x13f067744
                0x13f067749
                0x13f067762
                0x13f06776d
                0x13f06777b
                0x13f06777d
                0x13f067780
                0x13f06778d
                0x13f067792
                0x13f067797
                0x13f06779d
                0x13f0677a5
                0x13f0677aa
                0x13f0677b7
                0x13f0677c6
                0x13f0677cd
                0x13f0677d2
                0x13f0677d6
                0x13f0677de
                0x13f0677e3
                0x13f0677f0
                0x13f0677ff
                0x13f067806
                0x13f06780b
                0x13f06780f
                0x13f067831

                APIs
                • _invalid_parameter_noinfo.LIBCMT ref: 000000013F067575
                  • Part of subcall function 000000013F063638: IsProcessorFeaturePresent.KERNEL32 ref: 000000013F063641
                  • Part of subcall function 000000013F063638: GetCurrentProcess.KERNEL32(?,?,?,?,000000013F063615), ref: 000000013F063666
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                • String ID: -
                • API String ID: 4036615347-2547889144
                • Opcode ID: c6874d4fea6fc2640d5a8cd540fe9537a8a7d61cbe64812373ee378f34825083
                • Instruction ID: 3dfeee33c56a60beb95093ce5e554d061f9a719a9b8365c2a049c621322eb810
                • Opcode Fuzzy Hash: c6874d4fea6fc2640d5a8cd540fe9537a8a7d61cbe64812373ee378f34825083
                • Instruction Fuzzy Hash: 5181E771B0478485EA68CB2DA4047AAB792F755BF4F644639FA9943BDADF3CC6028700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ExceptionRaise_clrfp
                • String ID:
                • API String ID: 15204871-0
                • Opcode ID: 0a6af59f19295501bc1bbb29e1f3f350ab02b5ae08f6879b1504fd69c99f29a3
                • Instruction ID: 73a98119cf741a18d8430e405be76d8cd07a5673e3f18187c235b2347d222dd6
                • Opcode Fuzzy Hash: 0a6af59f19295501bc1bbb29e1f3f350ab02b5ae08f6879b1504fd69c99f29a3
                • Instruction Fuzzy Hash: 63B13B77610B84CBEB19CF2EC48639C37A1F384B88F158965EB5A87BA5CB35C556C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 82%
                			E0000000113F068C60(void* __ecx, intOrPtr __edx, void* __ebp, signed int __rax, long long __rbx, signed long long __rcx, void* __rdx, void* __r9, signed char _a8, intOrPtr _a16, long long _a24) {
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				void* _t37;
                				void* _t39;
                				void* _t43;
                				void* _t45;
                				void* _t47;
                				intOrPtr _t67;
                				void* _t78;
                				void* _t81;
                				void* _t83;
                				void* _t86;
                				void* _t87;
                				signed long long _t109;
                				intOrPtr _t111;
                				signed long long _t113;
                				intOrPtr* _t116;
                				intOrPtr* _t118;
                				signed long long _t124;
                				signed long long _t126;
                				signed long long _t127;
                				void* _t149;
                				long long _t154;
                				signed long long _t156;
                				signed long long _t157;
                				signed long long _t158;
                				void* _t166;
                				void* _t168;
                				signed long long _t169;
                				signed long long _t170;
                				signed long long _t172;
                				signed long long _t174;
                				intOrPtr* _t175;
                				long long _t179;
                
                				_t117 = __rbx;
                				_a24 = __rbx;
                				_a16 = __edx;
                				_t179 = __rcx;
                				if (__rcx != 0) goto 0x3f068c98;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				_t109 = __rax | 0xffffffff;
                				goto 0x3f068f53;
                				E0000000113F059960(__ecx, 0x3d, __rcx, __rcx, __rdx, __r9);
                				_t169 = _t109;
                				if (_t109 == 0) goto 0x3f068f32;
                				if (_t109 == __rcx) goto 0x3f068f32;
                				_t170 =  *0x3f091720; // 0x431430
                				_t78 = _t170 -  *0x3f091738; // 0x48c7a0
                				bpl =  *(_t109 + 1);
                				_a8 = bpl;
                				if (_t78 != 0) goto 0x3f068ce5;
                				E0000000113F0692A4(__rbx, _t170, __rcx, _t154);
                				 *0x3f091720 = _t109;
                				r12d = 1;
                				if (_t109 != 0) goto 0x3f068da9;
                				if (__edx == 0) goto 0x3f068d37;
                				_t81 =  *0x3f091728 - _t154; // 0x499740
                				if (_t81 == 0) goto 0x3f068d37;
                				E0000000113F061CA4(_t170, _t154);
                				if (_t109 == 0) goto 0x3f068f32;
                				_t172 =  *0x3f091720; // 0x431430
                				_t83 = _t172 -  *0x3f091738; // 0x48c7a0
                				if (_t83 != 0) goto 0x3f068da4;
                				_t37 = E0000000113F0692A4(_t117, _t172, __rcx, _t154);
                				 *0x3f091720 = _t109;
                				goto 0x3f068da4;
                				if (bpl == 0) goto 0x3f068f41;
                				E0000000113F063680(_t37, _t166, __rdx);
                				 *0x3f091720 = _t109;
                				_t39 = E0000000113F0636F8(_t109, _t166);
                				_t174 =  *0x3f091720; // 0x431430
                				if (_t174 != 0) goto 0x3f068d70;
                				_t157 = _t156 | 0xffffffff;
                				goto 0x3f068f43;
                				_t86 =  *0x3f091728 - _t154; // 0x499740
                				if (_t86 != 0) goto 0x3f068da4;
                				E0000000113F063680(_t39, _t166, __rdx);
                				 *0x3f091728 = _t109;
                				E0000000113F0636F8(_t109, _t166);
                				_t87 =  *0x3f091728 - _t154; // 0x499740
                				if (_t87 == 0) goto 0x3f068d67;
                				_t175 =  *0x3f091720; // 0x431430
                				if (_t175 == 0) goto 0x3f068d67;
                				_t168 = _t169 - __rcx;
                				_t118 = _t175;
                				if ( *_t175 == 0) goto 0x3f068dee;
                				if (E0000000113F06F04C(_t67, _t118, __rcx,  *_t175, _t154, _t157, _t168, __r9) != 0) goto 0x3f068ddc;
                				_t111 =  *_t118;
                				if ( *((char*)(_t168 + _t111)) == 0x3d) goto 0x3f068de5;
                				if ( *((intOrPtr*)(_t168 + _t111)) == sil) goto 0x3f068de5;
                				goto 0x3f068db5;
                				goto 0x3f068df8;
                				_t124 =  ~((_t118 + 8 - _t175 >> 3) - _t175 >> 3);
                				if (_t124 < 0) goto 0x3f068e54;
                				if ( *_t175 == _t154) goto 0x3f068e54;
                				_t43 = E0000000113F0636F8( *((intOrPtr*)(_t118 + 8)),  *(_t175 + _t124 * 8));
                				if (bpl == 0) goto 0x3f068e25;
                				 *(_t175 + _t124 * 8) = __rcx;
                				goto 0x3f068eae;
                				_t113 =  *((intOrPtr*)(_t175 + 8 + _t124 * 8));
                				 *(_t175 + _t124 * 8) = _t113;
                				if ( *((intOrPtr*)(_t175 + (_t124 + 1) * 8)) != _t154) goto 0x3f068e19;
                				r8d = 8;
                				E0000000113F06B658(_t43, _t124 + 1, _t175, _t124 + 1, _t154, _t157, _t168);
                				_t126 = _t113;
                				_t45 = E0000000113F0636F8(_t113, _t175);
                				if (_t126 == 0) goto 0x3f068eb1;
                				 *0x3f091720 = _t126;
                				goto 0x3f068eb1;
                				if (bpl == 0) goto 0x3f068f45;
                				_t127 =  ~_t126;
                				_t18 = _t127 + 2; // 0x431432
                				_t149 = _t18;
                				if (_t149 - _t127 >= 0) goto 0x3f068e72;
                				_t158 = _t157 | 0xffffffff;
                				goto 0x3f068f47;
                				if (_t149 - 0xffffffff >= 0) goto 0x3f068e69;
                				r8d = 8;
                				E0000000113F06B658(_t45, _t127, _t175, _t149, _t154, _t158, _t168);
                				_t47 = E0000000113F0636F8(0xffffffff, _t175);
                				if (0xffffffff == 0) goto 0x3f068e69;
                				 *((long long*)(0xffffffff + _t127 * 8)) = _t179;
                				 *((long long*)(0xffffffff + 8 + _t127 * 8)) = _t154;
                				 *0x3f091720 = 0xffffffff;
                				if (_a16 == 0) goto 0x3f068f49;
                				_t178 = (_t158 | 0xffffffff) + 1;
                				if ( *((intOrPtr*)(_t179 + (_t158 | 0xffffffff) + 1)) != sil) goto 0x3f068ec2;
                				E0000000113F063680(_t47, (_t158 | 0xffffffff) + 3, _t149);
                				if (0xffffffff == 0) goto 0x3f068f28;
                				if (E0000000113F0628CC(0xffffffff, 0xffffffff, _t178 + 2, _t179) != 0) goto 0x3f068f6b;
                				_t28 = _t169 + 1; // 0x1
                				_t116 = 0xffffffff - _t179;
                				_a8 =  ~_a8;
                				asm("dec eax");
                				 *((intOrPtr*)(_t28 + _t116 - 1)) = sil;
                				if (E0000000113F06F164(0, E0000000113F0628CC(0xffffffff, 0xffffffff, _t178 + 2, _t179), 0xffffffff, 0xffffffff, _t178 + 0x00000002 & _t28 + _t116, _t154, _t154, _t179, __r9) != 0) goto 0x3f068f28;
                				E0000000113F05DEB4(_t116);
                				 *_t116 = 0x2a;
                				E0000000113F0636F8(_t116, 0xffffffff);
                				goto 0x3f068f49;
                				E0000000113F05DEB4(_t116);
                				 *_t116 = 0x16;
                				E0000000113F0636F8(_t116, _t154);
                				return __ebp;
                			}






































                0x13f068c60
                0x13f068c60
                0x13f068c65
                0x13f068c7c
                0x13f068c82
                0x13f068c84
                0x13f068c89
                0x13f068c8f
                0x13f068c93
                0x13f068ca0
                0x13f068ca5
                0x13f068cab
                0x13f068cb4
                0x13f068cba
                0x13f068cc1
                0x13f068cc8
                0x13f068ccc
                0x13f068cd1
                0x13f068cd6
                0x13f068cde
                0x13f068ce5
                0x13f068cee
                0x13f068cf6
                0x13f068cf8
                0x13f068cff
                0x13f068d01
                0x13f068d09
                0x13f068d0f
                0x13f068d16
                0x13f068d1d
                0x13f068d26
                0x13f068d2e
                0x13f068d35
                0x13f068d3a
                0x13f068d48
                0x13f068d4f
                0x13f068d56
                0x13f068d5b
                0x13f068d65
                0x13f068d67
                0x13f068d6b
                0x13f068d70
                0x13f068d77
                0x13f068d81
                0x13f068d88
                0x13f068d8f
                0x13f068d94
                0x13f068d9b
                0x13f068d9d
                0x13f068da7
                0x13f068daf
                0x13f068db2
                0x13f068db8
                0x13f068dca
                0x13f068dcc
                0x13f068dd4
                0x13f068dda
                0x13f068de3
                0x13f068dec
                0x13f068df5
                0x13f068dfb
                0x13f068e00
                0x13f068e06
                0x13f068e0e
                0x13f068e10
                0x13f068e14
                0x13f068e19
                0x13f068e1e
                0x13f068e29
                0x13f068e2b
                0x13f068e37
                0x13f068e3e
                0x13f068e41
                0x13f068e49
                0x13f068e4b
                0x13f068e52
                0x13f068e57
                0x13f068e5d
                0x13f068e60
                0x13f068e60
                0x13f068e67
                0x13f068e69
                0x13f068e6d
                0x13f068e7f
                0x13f068e81
                0x13f068e8a
                0x13f068e94
                0x13f068e9c
                0x13f068e9e
                0x13f068ea2
                0x13f068ea7
                0x13f068eb5
                0x13f068ec2
                0x13f068ec9
                0x13f068ed4
                0x13f068edf
                0x13f068ef2
                0x13f068ef7
                0x13f068efb
                0x13f068f01
                0x13f068f05
                0x13f068f0b
                0x13f068f19
                0x13f068f1b
                0x13f068f22
                0x13f068f2b
                0x13f068f30
                0x13f068f32
                0x13f068f3b
                0x13f068f4c
                0x13f068f6a

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 483b8c2a100f1cb1108a06311a9d408aad6780d26304f704cf41305326ae1292
                • Instruction ID: debdc5592191c6d4eb73a7e7f4642e33b34a57cb6730d82cfff80cfa632e975f
                • Opcode Fuzzy Hash: 483b8c2a100f1cb1108a06311a9d408aad6780d26304f704cf41305326ae1292
                • Instruction Fuzzy Hash: 9602AE31B1264140FE6D9B1D99453EAA6D7EB05BB0F24463DBDA9477E3EE39CA038300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 80%
                			E0000000113F06E3B0(signed int __ecx, void* __ebp, long long __rbx, signed char* __rdx, long long __rsi, char* __r9) {
                				void* __rdi;
                				signed int _t48;
                				signed int _t52;
                				signed char _t53;
                				void* _t54;
                				void* _t60;
                				void* _t63;
                				signed int _t87;
                				signed int _t88;
                				void* _t98;
                				void* _t126;
                				intOrPtr* _t134;
                				void* _t139;
                				void* _t145;
                				long long _t150;
                				void* _t153;
                				void* _t154;
                				void* _t159;
                				void* _t160;
                				void* _t163;
                
                				_t136 = __rbx;
                				_t159 = _t153;
                				 *((long long*)(_t159 + 0x10)) = __rbx;
                				 *((long long*)(_t159 + 0x18)) = _t150;
                				 *((long long*)(_t159 + 0x20)) = __rsi;
                				_push(_t145);
                				_t154 = _t153 - 0x30;
                				 *__r9 = 0;
                				r10d = r10d & 0x0000003f;
                				_t87 = r8d;
                				_t134 =  *((intOrPtr*)(0x3f0917a0 + (__ecx >> 6) * 8));
                				if ( *((intOrPtr*)(_t134 + 0x38 + (__ecx + __ecx * 8) * 8)) >= 0) goto 0x3f06e611;
                				r15d = 0x74000;
                				if ((r15d & r8d) != 0) goto 0x3f06e42e;
                				_t139 = _t159 + 8;
                				 *(_t154 + 0x50) = 0;
                				_t98 = E0000000113F05F100(_t134, _t139);
                				if (_t98 != 0) goto 0x3f06e62c;
                				if (_t98 != 0) goto 0x3f06e469;
                				asm("bts edi, 0xe");
                				r15d = 2;
                				if ((_t87 & r15d) == 0x4000) goto 0x3f06e47f;
                				_t16 = _t139 - 0x10000; // 0x64000
                				if ((0xffffbfff & _t16) == 0) goto 0x3f06e46d;
                				_t19 = _t139 - 0x20000; // 0x54000
                				if ((0xffffbfff & _t19) == 0) goto 0x3f06e47a;
                				_t22 = _t139 - 0x40000; // 0x34000
                				_t48 = _t22;
                				if ((0xffffbfff & _t48) != 0) goto 0x3f06e481;
                				 *__r9 = 1;
                				goto 0x3f06e481;
                				_t88 = _t87 | _t48;
                				goto 0x3f06e42e;
                				if ((_t88 & 0x00000301) != 0x301) goto 0x3f06e481;
                				 *((intOrPtr*)(__r9)) = r15b;
                				goto 0x3f06e481;
                				 *__r9 = 0;
                				if ((_t88 & 0x00070000) == 0) goto 0x3f06e611;
                				if (( *__rdx & 0x00000040) != 0) goto 0x3f06e611;
                				_t52 = __rdx[4] & 0xc0000000;
                				if (_t52 == 0x40000000) goto 0x3f06e4bb;
                				if (_t52 == 0x80000000) goto 0x3f06e4e6;
                				if (_t52 != 0xc0000000) goto 0x3f06e611;
                				_t53 = __rdx[8];
                				if (_t53 == 0) goto 0x3f06e611;
                				if (_t53 - r15d <= 0) goto 0x3f06e4d9;
                				if (_t53 - 4 <= 0) goto 0x3f06e52c;
                				if (_t53 != 5) goto 0x3f06e611;
                				if (0 == 0) goto 0x3f06e5b4;
                				r8d = 3;
                				 *(_t154 + 0x50) = 0;
                				_t54 = E0000000113F064204(0, r14d, _t134, __rbx, _t154 + 0x50, __r9, _t163, _t160);
                				if (_t54 <= 0) goto 0x3f06e507;
                				_t91 =  ==  ? 0 : 1;
                				if (_t54 == 0xffffffff) goto 0x3f06e551;
                				if (_t54 == r15d) goto 0x3f06e568;
                				if (_t54 != 3) goto 0x3f06e5a1;
                				if ( *(_t154 + 0x50) != 0xbfbbef) goto 0x3f06e568;
                				 *__r9 = 1;
                				goto 0x3f06e5b4;
                				r8d = r15d;
                				E0000000113F06495C(_t136, _t145, __r9);
                				if (_t134 == 0) goto 0x3f06e5b8;
                				r8d = 0;
                				E0000000113F06495C(_t136, _t145, __r9);
                				if (_t134 != 0xffffffff) goto 0x3f06e55d;
                				E0000000113F05DEB4(_t134);
                				goto 0x3f06e613;
                				goto 0x3f06e4de;
                				if (( *(_t154 + 0x50) & 0x0000ffff) != 0xfffe) goto 0x3f06e581;
                				_t60 = E0000000113F05DEB4(_t134);
                				 *_t134 = 0x16;
                				goto 0x3f06e551;
                				if (_t60 != 0xfeff) goto 0x3f06e5a1;
                				r8d = 0;
                				E0000000113F06495C(_t136, _t145, __r9);
                				if (_t134 == 0xffffffff) goto 0x3f06e551;
                				 *((intOrPtr*)(__r9)) = r15b;
                				goto 0x3f06e5b4;
                				r8d = 0;
                				E0000000113F06495C(_t136, _t145, __r9);
                				if (_t134 == 0xffffffff) goto 0x3f06e551;
                				_t126 =  ==  ? 0 : 1;
                				if (_t126 == 0) goto 0x3f06e611;
                				 *(_t154 + 0x50) = 0;
                				if (_t126 == 0) goto 0x3f06e5d8;
                				if ( *__r9 - 1 != 1) goto 0x3f06e5e5;
                				 *(_t154 + 0x50) = 0xfeff;
                				goto 0x3f06e5e9;
                				 *(_t154 + 0x50) = 0xbfbbef;
                				if (3 == 0) goto 0x3f06e611;
                				r8d = 3;
                				r8d = r8d;
                				_t63 = E0000000113F06543C(0, r14d, 3, 0, _t136, _t154 + 0x50, __r9);
                				if (_t63 == 0xffffffff) goto 0x3f06e551;
                				if (3 - 0 + _t63 > 0) goto 0x3f06e5e9;
                				return 0;
                			}























                0x13f06e3b0
                0x13f06e3b0
                0x13f06e3b3
                0x13f06e3b7
                0x13f06e3bb
                0x13f06e3bf
                0x13f06e3c4
                0x13f06e3d0
                0x13f06e3d3
                0x13f06e3e8
                0x13f06e3f2
                0x13f06e3fb
                0x13f06e401
                0x13f06e40a
                0x13f06e40c
                0x13f06e410
                0x13f06e419
                0x13f06e41b
                0x13f06e428
                0x13f06e42a
                0x13f06e433
                0x13f06e43f
                0x13f06e441
                0x13f06e44e
                0x13f06e450
                0x13f06e458
                0x13f06e45a
                0x13f06e45a
                0x13f06e462
                0x13f06e464
                0x13f06e467
                0x13f06e469
                0x13f06e46b
                0x13f06e478
                0x13f06e47a
                0x13f06e47d
                0x13f06e47f
                0x13f06e487
                0x13f06e491
                0x13f06e49f
                0x13f06e4aa
                0x13f06e4b1
                0x13f06e4b5
                0x13f06e4bb
                0x13f06e4c0
                0x13f06e4c9
                0x13f06e4ce
                0x13f06e4d3
                0x13f06e4e0
                0x13f06e4e6
                0x13f06e4ec
                0x13f06e4f8
                0x13f06e4ff
                0x13f06e504
                0x13f06e50a
                0x13f06e50f
                0x13f06e514
                0x13f06e522
                0x13f06e524
                0x13f06e527
                0x13f06e52c
                0x13f06e534
                0x13f06e53c
                0x13f06e53e
                0x13f06e546
                0x13f06e54f
                0x13f06e551
                0x13f06e558
                0x13f06e563
                0x13f06e572
                0x13f06e574
                0x13f06e579
                0x13f06e57f
                0x13f06e586
                0x13f06e588
                0x13f06e591
                0x13f06e59a
                0x13f06e59c
                0x13f06e59f
                0x13f06e5a1
                0x13f06e5a9
                0x13f06e5b2
                0x13f06e5b4
                0x13f06e5b6
                0x13f06e5bd
                0x13f06e5c4
                0x13f06e5c9
                0x13f06e5cb
                0x13f06e5d6
                0x13f06e5d8
                0x13f06e5e7
                0x13f06e5e9
                0x13f06e5f4
                0x13f06e5fd
                0x13f06e605
                0x13f06e60f
                0x13f06e62b

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight_invalid_parameter_noinfo
                • String ID:
                • API String ID: 474895018-0
                • Opcode ID: 1c9729f4adce36047e80d314d5ec755a0f0174b1d3845f1c20522cb7955fd81d
                • Instruction ID: 088b1761b44475830b03d9b4905f385034016dcba2c4ca061a46ebbfdeffd77b
                • Opcode Fuzzy Hash: 1c9729f4adce36047e80d314d5ec755a0f0174b1d3845f1c20522cb7955fd81d
                • Instruction Fuzzy Hash: E071D132E0438146FB7D8A2D94A07E96293E790370F34463DFA6687BD3E67DCA468704
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 58%
                			E0000000113F05CB98(long long __rbx, long long __rcx, long long __rsi, long long __rbp, void* __r10, long long _a16, long long _a24, long long _a32) {
                				void* _v40;
                				signed int _v48;
                				short _v52;
                				short _v56;
                				long long _v72;
                				void* __rdi;
                				signed int _t71;
                				void* _t73;
                				void* _t105;
                				void* _t106;
                				unsigned int _t107;
                				signed short _t108;
                				signed char _t116;
                				signed short _t124;
                				void* _t127;
                				void* _t128;
                				signed long long _t166;
                				void* _t181;
                				void* _t183;
                				signed long long _t184;
                				void* _t191;
                				signed long long _t192;
                				void* _t194;
                				void* _t200;
                				signed long long _t203;
                
                				_t189 = __rbp;
                				_t186 = __rsi;
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_a32 = __rsi;
                				_t192 = _t191 - 0x40;
                				_t166 =  *0x3f082018; // 0x3bece1c8a3ca
                				_v48 = _t166 ^ _t192;
                				_t71 =  *(__rcx + 0x42) & 0x0000ffff;
                				_t6 = _t186 - 0x20; // 0x58
                				_t124 = _t6;
                				_t7 = _t186 - 0x77; // 0x1
                				r15d = _t7;
                				_t128 = _t71 - 0x64;
                				if (_t128 > 0) goto 0x3f05cc41;
                				if (_t128 == 0) goto 0x3f05ccbf;
                				if (_t71 == 0x41) goto 0x3f05ccd2;
                				if (_t71 == 0x43) goto 0x3f05cc2b;
                				if (_t71 - 0x44 <= 0) goto 0x3f05ccdb;
                				if (_t71 - 0x47 <= 0) goto 0x3f05ccd2;
                				if (_t71 == 0x53) goto 0x3f05cc7b;
                				if (_t71 == _t124) goto 0x3f05cc90;
                				if (_t71 == 0x5a) goto 0x3f05cc37;
                				if (_t71 == 0x61) goto 0x3f05ccd2;
                				if (_t71 != 0x63) goto 0x3f05ccdb;
                				E0000000113F05D464(_t71 - 0x63, __rcx, __rcx, __rsi);
                				goto 0x3f05ccd7;
                				_t73 = E0000000113F05CED8(_t106, __rcx, __rcx, _t186);
                				goto 0x3f05ccd7;
                				if (_t73 - 0x67 <= 0) goto 0x3f05ccd2;
                				if (_t73 == 0x69) goto 0x3f05ccbf;
                				if (_t73 == 0x6e) goto 0x3f05ccb8;
                				if (_t73 == 0x6f) goto 0x3f05cc9a;
                				if (_t73 == 0x70) goto 0x3f05cc82;
                				if (_t73 == 0x73) goto 0x3f05cc7b;
                				if (_t73 == 0x75) goto 0x3f05ccc3;
                				if (_t73 != 0x78) goto 0x3f05ccdb;
                				goto 0x3f05ccc8;
                				E0000000113F05DA14(__rcx, __rcx, _t186);
                				goto 0x3f05ccd7;
                				 *((intOrPtr*)(__rcx + 0x38)) = 0x10;
                				 *((intOrPtr*)(__rcx + 0x3c)) = 0xb;
                				r8b = r15b;
                				goto 0x3f05cccb;
                				_t107 =  *(__rcx + 0x30);
                				if ((r15b & _t107 >> 0x00000005) == 0) goto 0x3f05ccae;
                				asm("bts ecx, 0x7");
                				 *(__rcx + 0x30) = _t107;
                				goto 0x3f05ccc8;
                				E0000000113F05D8A0(__rcx, __rcx, _t181, _t186);
                				goto 0x3f05ccd7;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000010;
                				r8d = 0;
                				E0000000113F05D6D4(_t105, 0xa, __rcx, __rcx, _t181, _t186, __rbp, _t200);
                				goto 0x3f05ccd7;
                				if (E0000000113F05D16C(0xa, 0x78, __rcx, __rcx, _t183, _t186, _t189, _t194) != 0) goto 0x3f05cce2;
                				goto 0x3f05ce37;
                				if ( *((char*)(__rcx + 0x40)) != 0) goto 0x3f05ce34;
                				_t116 =  *(__rcx + 0x30);
                				_v56 = 0;
                				_v52 = 0;
                				_t20 = _t183 + 0x20; // 0x20
                				r13d = _t20;
                				if ((r15b & 0) == 0) goto 0x3f05cd3c;
                				if ((r15b & 0) == 0) goto 0x3f05cd1e;
                				_t25 = _t183 + 0x2d; // 0x2d
                				_v56 = _t25;
                				goto 0x3f05cd39;
                				if ((r15b & _t116) == 0) goto 0x3f05cd2a;
                				goto 0x3f05cd17;
                				if ((r15b & 0) == 0) goto 0x3f05cd3c;
                				_v56 = r13w;
                				_t184 = _t203;
                				_t108 =  *(__rcx + 0x42) & 0x0000ffff;
                				r9d = 0xffdf;
                				if ((r9w & (_t108 & 0x0000ffff) - _t124) != 0) goto 0x3f05cd61;
                				if ((r15b & 0) == 0) goto 0x3f05cd61;
                				r8b = r15b;
                				goto 0x3f05cd64;
                				r8b = 0;
                				r12d = 0x30;
                				if (r8b != 0) goto 0x3f05cd7d;
                				if (0 == 0) goto 0x3f05cd9a;
                				 *((intOrPtr*)(_t192 + 0x30 + _t184 * 2)) = r12w;
                				if (_t108 == _t124) goto 0x3f05cd8e;
                				if (_t108 != 0x41) goto 0x3f05cd91;
                				 *((short*)(_t192 + 0x32 + _t184 * 2)) = _t124 & 0x0000ffff;
                				_t187 = __rcx + 0x468;
                				_t127 =  *((intOrPtr*)(__rcx + 0x34)) -  *((intOrPtr*)(__rcx + 0x50));
                				if ((_t116 & 0x0000000c) != 0) goto 0x3f05cdc3;
                				r8d = _t127;
                				E0000000113F05BDB4(r13b, __rcx, __rcx + 0x468, _t184 + 2, __rcx + 0x28, __r10);
                				r8d = 0;
                				_v72 = __rcx + 0x10;
                				E0000000113F05DD44(_t124 & 0x0000ffff, __rcx, __rcx + 0x468, __rcx + 0x468, _t189, __rcx + 0x28);
                				if ((r15b & 0) == 0) goto 0x3f05ce05;
                				if ((r15b &  *(__rcx + 0x30) >> 0x00000002) != 0) goto 0x3f05ce05;
                				r8d = _t127;
                				E0000000113F05BDB4(r12b, __rcx, __rcx + 0x468, _t184 + 2, __rcx + 0x28, __r10);
                				E0000000113F05DBB4(__rcx, __rcx, _t187, _t189);
                				if ( *((intOrPtr*)(__rcx + 0x28)) < 0) goto 0x3f05ce34;
                				r10d =  *(__rcx + 0x30);
                				r10d = r10d >> 2;
                				if ((r15b & r10b) == 0) goto 0x3f05ce34;
                				r8d = _t127;
                				E0000000113F05BDB4(r13b, __rcx, _t187, _t184 + 2, __rcx + 0x28, __r10);
                				return E0000000113F058680( *(__rcx + 0x30) >> 2, __rcx + 0x10, _v48 ^ _t192);
                			}




























                0x13f05cb98
                0x13f05cb98
                0x13f05cb98
                0x13f05cb9d
                0x13f05cba2
                0x13f05cbb0
                0x13f05cbb4
                0x13f05cbbe
                0x13f05cbc3
                0x13f05cbcf
                0x13f05cbcf
                0x13f05cbd2
                0x13f05cbd2
                0x13f05cbd6
                0x13f05cbda
                0x13f05cbdc
                0x13f05cbe6
                0x13f05cbf0
                0x13f05cbf6
                0x13f05cc00
                0x13f05cc0a
                0x13f05cc0f
                0x13f05cc15
                0x13f05cc1b
                0x13f05cc25
                0x13f05cc2d
                0x13f05cc32
                0x13f05cc37
                0x13f05cc3c
                0x13f05cc45
                0x13f05cc4f
                0x13f05cc55
                0x13f05cc5b
                0x13f05cc61
                0x13f05cc67
                0x13f05cc6d
                0x13f05cc72
                0x13f05cc79
                0x13f05cc7b
                0x13f05cc80
                0x13f05cc82
                0x13f05cc89
                0x13f05cc90
                0x13f05cc98
                0x13f05cc9a
                0x13f05cca5
                0x13f05cca7
                0x13f05ccab
                0x13f05ccb6
                0x13f05ccb8
                0x13f05ccbd
                0x13f05ccbf
                0x13f05ccc8
                0x13f05cccb
                0x13f05ccd0
                0x13f05ccd9
                0x13f05ccdd
                0x13f05cce6
                0x13f05ccec
                0x13f05ccf1
                0x13f05ccf7
                0x13f05cd01
                0x13f05cd01
                0x13f05cd08
                0x13f05cd12
                0x13f05cd14
                0x13f05cd17
                0x13f05cd1c
                0x13f05cd21
                0x13f05cd28
                0x13f05cd31
                0x13f05cd33
                0x13f05cd39
                0x13f05cd3c
                0x13f05cd40
                0x13f05cd50
                0x13f05cd5a
                0x13f05cd5c
                0x13f05cd5f
                0x13f05cd61
                0x13f05cd67
                0x13f05cd77
                0x13f05cd7b
                0x13f05cd7d
                0x13f05cd86
                0x13f05cd8c
                0x13f05cd91
                0x13f05cda4
                0x13f05cdab
                0x13f05cdb0
                0x13f05cdb5
                0x13f05cdbe
                0x13f05cdca
                0x13f05cdcd
                0x13f05cdda
                0x13f05cdea
                0x13f05cdf2
                0x13f05cdf7
                0x13f05ce00
                0x13f05ce0a
                0x13f05ce17
                0x13f05ce19
                0x13f05ce1d
                0x13f05ce24
                0x13f05ce26
                0x13f05ce2f
                0x13f05ce61

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: 0
                • API String ID: 3215553584-4108050209
                • Opcode ID: 3e41f0b2b181c369e0412cdc7e5de264c64356d6e60c6b9c9e3172b88737f842
                • Instruction ID: 863c6ee6af981f30f44a8f9b3432c44cc9ec447364f230446ffcd31fb893529b
                • Opcode Fuzzy Hash: 3e41f0b2b181c369e0412cdc7e5de264c64356d6e60c6b9c9e3172b88737f842
                • Instruction Fuzzy Hash: DC71D175B18240C2EAAC9A3D80087E92AA3E740B44FC4953EFD4E5779BC7B5CA4BC745
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E0000000113F060C30(long long __rbx, signed int __rcx, void* __rdx, long long __rsi, long long __rbp, intOrPtr _a8, void* _a16, void* _a24, void* _a32) {
                				void* __rdi;
                				void* __r12;
                				void* _t26;
                				signed int _t32;
                				void* _t38;
                				void* _t59;
                				void* _t90;
                				void* _t92;
                				signed long long _t94;
                				signed long long _t96;
                				intOrPtr _t99;
                				signed short* _t100;
                				signed long long _t101;
                				void* _t119;
                				void* _t134;
                				char* _t140;
                				signed long long _t146;
                				intOrPtr _t150;
                				void* _t154;
                				void* _t164;
                				signed short* _t167;
                				void* _t169;
                				void* _t173;
                
                				_t90 = _t154;
                				 *((long long*)(_t90 + 0x10)) = __rbx;
                				 *((long long*)(_t90 + 0x18)) = __rbp;
                				 *((long long*)(_t90 + 0x20)) = __rsi;
                				r13d = 0;
                				 *(_t90 + 8) = _t167;
                				_t26 = E0000000113F0698F0();
                				if (_t26 == 0) goto 0x3f060c84;
                				if (_t26 == 0x16) goto 0x3f060eb7;
                				goto 0x3f060d0a;
                				_t99 = _a8;
                				if (_t99 == 0) goto 0x3f060d0a;
                				if (E0000000113F069998(0, _t99) != 0) goto 0x3f060caa;
                				_t150 = _t99;
                				_t100 = _t167;
                				goto 0x3f060d88;
                				r8d =  *_t100 & 0x0000ffff;
                				_t126 = _t167;
                				if (r8w == 0) goto 0x3f060cff;
                				_t8 =  &(_t126[0]); // 0x1
                				_t92 =  !=  ? _t167 : _t8;
                				r8d =  *(_t100 + _t150) & 0x0000ffff;
                				if (r8w != 0) goto 0x3f060cbd;
                				if (_t92 == 0) goto 0x3f060cff;
                				E0000000113F063680(_t27,  &(_t167[0]) - _t92 + 1, _t150);
                				if (_t92 != 0) goto 0x3f060d22;
                				E0000000113F0636F8(_t92,  &(_t167[0]) - _t92 + 1);
                				E0000000113F0636F8(_t92, _t167);
                				if (__rcx == 0) goto 0x3f060d69;
                				if (E0000000113F069998(0, __rcx) != 0) goto 0x3f060d69;
                				goto 0x3f060d85;
                				_t32 =  *_t100 & 0x0000ffff;
                				goto 0x3f060d3f;
                				if (_t32 == 0x22) goto 0x3f060d39;
                				 *__rcx = _t32;
                				if (( *(_t100 + _t150) & 0x0000ffff) != 0) goto 0x3f060d2d;
                				 *((intOrPtr*)(__rcx + _t150)) = r13w;
                				E0000000113F0636F8(_t92, __rcx + _t150);
                				if (E0000000113F069998(0, __rcx) != 0) goto 0x3f060d02;
                				E0000000113F0636F8(_t92, __rcx);
                				goto 0x3f060d88;
                				if (E0000000113F069998(0, "\\") == 0) goto 0x3f060d85;
                				_t140 = ".";
                				_t38 = E0000000113F0636F8(_t92, _t100);
                				_t146 = __rcx | 0xffffffff;
                				if (__rdx == 0) goto 0x3f060da8;
                				if ( *((intOrPtr*)(__rdx + (_t146 + 1) * 2)) != r13w) goto 0x3f060d9c;
                				goto 0x3f060dab;
                				r14d = r13d;
                				_t94 = _t146 + 1;
                				if ( *((intOrPtr*)(_t140 + _t94 * 2)) != r13w) goto 0x3f060dae;
                				r15d = _t38 + 0xc + r14d;
                				0x3f05a4f0(_t164, _t134);
                				_t101 = _t94;
                				if (_t94 == 0) goto 0x3f060e6f;
                				 *_t94 = r13w;
                				if (E0000000113F069918(_t94, _t94, _t100 + _t150, _t140) != 0) goto 0x3f060ea2;
                				_t96 = _t146 + 1;
                				if ( *((intOrPtr*)(_t140 + _t96 * 2)) != r13w) goto 0x3f060df6;
                				_t119 = _t140 + _t96 * 2;
                				if (_t140 == _t119) goto 0x3f060e2d;
                				if ( *((short*)(_t119 - 2)) == 0x5c) goto 0x3f060e2d;
                				if ( *((short*)(_t119 - 2)) == 0x2f) goto 0x3f060e2d;
                				if (E0000000113F069918(_t96, _t101, _t173, "\\") != 0) goto 0x3f060ea2;
                				if (__rdx == 0) goto 0x3f060e44;
                				if (E0000000113F069918(_t96, _t101, _t173, __rdx) != 0) goto 0x3f060ea2;
                				_t147 = _t146 + 1;
                				if ( *((intOrPtr*)(_t101 + (_t146 + 1) * 2)) != r13w) goto 0x3f060e44;
                				r9d = r14d;
                				if (E0000000113F060ECC(_t59, _t101, _t101, _t101 + (_t146 + 1) * 2, _t140, _t147, _t173 - _t147, _t100 + _t150, __rdx, _t173, _t169) == 0) goto 0x3f060e6f;
                				goto 0x3f060e72;
                				E0000000113F05A4F8(_t59, _t96, _t167, _t167, _t167);
                				return E0000000113F0636F8(_t96, _t167);
                			}


























                0x13f060c30
                0x13f060c33
                0x13f060c37
                0x13f060c3b
                0x13f060c59
                0x13f060c5e
                0x13f060c66
                0x13f060c71
                0x13f060c76
                0x13f060c7f
                0x13f060c84
                0x13f060c8c
                0x13f060c9a
                0x13f060c9f
                0x13f060ca2
                0x13f060ca5
                0x13f060caa
                0x13f060cae
                0x13f060cbb
                0x13f060cc2
                0x13f060cc6
                0x13f060cd3
                0x13f060cdb
                0x13f060ce0
                0x13f060ceb
                0x13f060cf6
                0x13f060cfa
                0x13f060d05
                0x13f060d0d
                0x13f060d1b
                0x13f060d20
                0x13f060d22
                0x13f060d2b
                0x13f060d31
                0x13f060d33
                0x13f060d42
                0x13f060d44
                0x13f060d4a
                0x13f060d5b
                0x13f060d5f
                0x13f060d67
                0x13f060d7c
                0x13f060d7e
                0x13f060d8b
                0x13f060d90
                0x13f060d97
                0x13f060da4
                0x13f060da6
                0x13f060da8
                0x13f060dae
                0x13f060db6
                0x13f060dc5
                0x13f060dc8
                0x13f060dcd
                0x13f060dd3
                0x13f060ddc
                0x13f060ded
                0x13f060df6
                0x13f060dfe
                0x13f060e00
                0x13f060e07
                0x13f060e0e
                0x13f060e15
                0x13f060e2b
                0x13f060e30
                0x13f060e42
                0x13f060e44
                0x13f060e4c
                0x13f060e51
                0x13f060e65
                0x13f060e6d
                0x13f060e75
                0x13f060ea1

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: TMP
                • API String ID: 3215553584-3125297090
                • Opcode ID: 7b6de6d258347123c9da6cdd80b563c6c8e6c871b9255cf3d217192d52e6b106
                • Instruction ID: 1917fa1b1b4d8606c8df21b6596be54b39f586b6cfa0cf5b0045d803dc9e8ec3
                • Opcode Fuzzy Hash: 7b6de6d258347123c9da6cdd80b563c6c8e6c871b9255cf3d217192d52e6b106
                • Instruction Fuzzy Hash: D161B735B4125041FA6CAB2F5A153EAA293EB44FE4F68813DBE45477F7DB38D6478200
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E0000000113F05C930(long long __rbx, long long __rcx, long long __rsi, long long __rbp, char _a8, char _a10, long long _a16, long long _a24, long long _a32) {
                				long long _v40;
                				void* __rdi;
                				intOrPtr _t61;
                				void* _t63;
                				void* _t93;
                				unsigned int _t94;
                				intOrPtr _t95;
                				unsigned int _t96;
                				signed char _t103;
                				void* _t109;
                				void* _t112;
                				void* _t113;
                				void* _t161;
                				void* _t163;
                				intOrPtr* _t168;
                				void* _t170;
                				void* _t171;
                				void* _t173;
                				void* _t178;
                				void* _t179;
                				void* _t181;
                
                				_t167 = __rbp;
                				_t165 = __rsi;
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_a32 = __rsi;
                				_t171 = _t170 - 0x30;
                				_t61 =  *((intOrPtr*)(__rcx + 0x41));
                				r15d = 1;
                				sil = 0x78;
                				bpl = 0x58;
                				r14b = 0x41;
                				_t113 = _t61 - 0x64;
                				if (_t113 > 0) goto 0x3f05c9b7;
                				if (_t113 == 0) goto 0x3f05ca23;
                				if (_t61 == r14b) goto 0x3f05ca36;
                				if (_t61 == 0x43) goto 0x3f05c9a1;
                				if (_t61 - 0x44 <= 0) goto 0x3f05ca3f;
                				if (_t61 - 0x47 <= 0) goto 0x3f05ca36;
                				if (_t61 == 0x53) goto 0x3f05c9df;
                				if (_t61 == bpl) goto 0x3f05c9f4;
                				if (_t61 == 0x5a) goto 0x3f05c9ad;
                				if (_t61 == 0x61) goto 0x3f05ca36;
                				if (_t61 != 0x63) goto 0x3f05ca3f;
                				E0000000113F05D3A8(_t61 - 0x63, __rcx);
                				goto 0x3f05ca3b;
                				_t63 = E0000000113F05CE64(__rcx);
                				goto 0x3f05ca3b;
                				if (_t63 - 0x67 <= 0) goto 0x3f05ca36;
                				if (_t63 == 0x69) goto 0x3f05ca23;
                				if (_t63 == 0x6e) goto 0x3f05ca1c;
                				if (_t63 == 0x6f) goto 0x3f05c9fe;
                				if (_t63 == 0x70) goto 0x3f05c9e6;
                				if (_t63 == 0x73) goto 0x3f05c9df;
                				if (_t63 == 0x75) goto 0x3f05ca27;
                				if (_t63 != sil) goto 0x3f05ca3f;
                				goto 0x3f05ca2c;
                				E0000000113F05D97C(__rcx);
                				goto 0x3f05ca3b;
                				 *((intOrPtr*)(__rcx + 0x38)) = 0x10;
                				 *((intOrPtr*)(__rcx + 0x3c)) = 0xb;
                				r8b = r15b;
                				goto 0x3f05ca2f;
                				_t94 =  *(__rcx + 0x30);
                				if ((r15b & _t94 >> 0x00000005) == 0) goto 0x3f05ca12;
                				asm("bts ecx, 0x7");
                				 *(__rcx + 0x30) = _t94;
                				goto 0x3f05ca2c;
                				E0000000113F05D8A0(__rcx, __rcx, _t161, __rsi);
                				goto 0x3f05ca3b;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000010;
                				r8d = 0;
                				E0000000113F05D50C(_t93, 0xa, __rcx, __rcx, _t161, _t165, __rbp, _t179);
                				goto 0x3f05ca3b;
                				if (E0000000113F05CF54(0xa, _t109, __rcx, __rcx, _t165, _t167, _t173) != 0) goto 0x3f05ca46;
                				goto 0x3f05cb7d;
                				if ( *((char*)(__rcx + 0x40)) != 0) goto 0x3f05cb7a;
                				_t103 =  *(__rcx + 0x30);
                				_a8 = 0;
                				_a10 = 0;
                				if ((r15b & 0) == 0) goto 0x3f05ca98;
                				if ((r15b & 0) == 0) goto 0x3f05ca7b;
                				_a8 = 0x2d;
                				goto 0x3f05ca95;
                				if ((r15b & _t103) == 0) goto 0x3f05ca87;
                				_a8 = 0x2b;
                				goto 0x3f05ca95;
                				if ((r15b & 0) == 0) goto 0x3f05ca98;
                				_a8 = 0x20;
                				_t163 = _t181;
                				_t95 =  *((intOrPtr*)(__rcx + 0x41));
                				if ((_t95 - bpl & 0x000000df) != 0) goto 0x3f05cab3;
                				if ((r15b & _t103 >> 0x00000005) == 0) goto 0x3f05cab3;
                				r8b = r15b;
                				goto 0x3f05cab6;
                				r8b = 0;
                				_t83 = _t95 - r14b;
                				if (r8b != 0) goto 0x3f05cac9;
                				if ((_t95 - r14b & 0xffffff00 | (_t83 & 0x000000df) == 0x00000000) == 0) goto 0x3f05cae4;
                				 *((char*)(_t171 + _t163 + 0x50)) = 0x30;
                				if (_t95 == bpl) goto 0x3f05cad8;
                				if (_t95 != r14b) goto 0x3f05cadb;
                				sil = bpl;
                				 *((intOrPtr*)(_t171 + _t163 + 0x51)) = sil;
                				_t164 = _t163 + 2;
                				_t168 = __rcx + 0x28;
                				_t180 = __rcx + 0x468;
                				_t112 =  *((intOrPtr*)(__rcx + 0x34)) -  *((intOrPtr*)(__rcx + 0x50));
                				if ((_t103 & 0x0000000c) != 0) goto 0x3f05cb0c;
                				r8d = _t112;
                				E0000000113F05BD3C(0x20, __rcx, __rcx + 0x468, _t163 + 2, _t168, _t178);
                				r8d = 0;
                				_v40 = __rcx + 0x10;
                				E0000000113F05DCA0(0, _t112, __rcx, __rcx + 0x468, _t163 + 2, _t165, _t168, _t168);
                				_t96 =  *(__rcx + 0x30);
                				if ((r15b & _t96 >> 0x00000003) == 0) goto 0x3f05cb4d;
                				if ((r15b & _t96 >> 0x00000002) != 0) goto 0x3f05cb4d;
                				r8d = _t112;
                				E0000000113F05BD3C(0x30, __rcx, _t180, _t163 + 2, _t168, _t178);
                				E0000000113F05DADC(__rcx, __rcx, _t165);
                				if ( *_t168 < 0) goto 0x3f05cb7a;
                				r10d =  *(__rcx + 0x30);
                				r10d = r10d >> 2;
                				if ((r15b & r10b) == 0) goto 0x3f05cb7a;
                				r8d = _t112;
                				E0000000113F05BD3C(0x20, __rcx, _t180, _t164, _t168, _t178);
                				return r15b;
                			}
























                0x13f05c930
                0x13f05c930
                0x13f05c930
                0x13f05c935
                0x13f05c93a
                0x13f05c944
                0x13f05c948
                0x13f05c94e
                0x13f05c954
                0x13f05c957
                0x13f05c95a
                0x13f05c95d
                0x13f05c95f
                0x13f05c961
                0x13f05c96a
                0x13f05c972
                0x13f05c976
                0x13f05c97e
                0x13f05c986
                0x13f05c98b
                0x13f05c98f
                0x13f05c993
                0x13f05c99b
                0x13f05c9a3
                0x13f05c9a8
                0x13f05c9ad
                0x13f05c9b2
                0x13f05c9b9
                0x13f05c9bd
                0x13f05c9c1
                0x13f05c9c5
                0x13f05c9c9
                0x13f05c9cd
                0x13f05c9d1
                0x13f05c9d6
                0x13f05c9dd
                0x13f05c9df
                0x13f05c9e4
                0x13f05c9e6
                0x13f05c9ed
                0x13f05c9f4
                0x13f05c9fc
                0x13f05c9fe
                0x13f05ca09
                0x13f05ca0b
                0x13f05ca0f
                0x13f05ca1a
                0x13f05ca1c
                0x13f05ca21
                0x13f05ca23
                0x13f05ca2c
                0x13f05ca2f
                0x13f05ca34
                0x13f05ca3d
                0x13f05ca41
                0x13f05ca4a
                0x13f05ca50
                0x13f05ca55
                0x13f05ca5c
                0x13f05ca68
                0x13f05ca72
                0x13f05ca74
                0x13f05ca79
                0x13f05ca7e
                0x13f05ca80
                0x13f05ca85
                0x13f05ca8e
                0x13f05ca90
                0x13f05ca95
                0x13f05ca98
                0x13f05caa2
                0x13f05caac
                0x13f05caae
                0x13f05cab1
                0x13f05cab3
                0x13f05cab8
                0x13f05cac3
                0x13f05cac7
                0x13f05cac9
                0x13f05cad1
                0x13f05cad6
                0x13f05cad8
                0x13f05cadb
                0x13f05cae0
                0x13f05cae7
                0x13f05caee
                0x13f05caf5
                0x13f05cafa
                0x13f05caff
                0x13f05cb07
                0x13f05cb13
                0x13f05cb16
                0x13f05cb23
                0x13f05cb28
                0x13f05cb33
                0x13f05cb3b
                0x13f05cb40
                0x13f05cb48
                0x13f05cb52
                0x13f05cb5b
                0x13f05cb5d
                0x13f05cb61
                0x13f05cb68
                0x13f05cb6d
                0x13f05cb75
                0x13f05cb95

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: 0
                • API String ID: 3215553584-4108050209
                • Opcode ID: edecffc07340354544662043969da326c1aeec85a79d9df607cd8f85f76e03e7
                • Instruction ID: 90d2ba639fc6e843a9cb0df59e6c183b5d62afb98543dd000c87d2c4825517b8
                • Opcode Fuzzy Hash: edecffc07340354544662043969da326c1aeec85a79d9df607cd8f85f76e03e7
                • Instruction Fuzzy Hash: 22610531A1C284C6FA6C8A7D601C3DA9B939381B4CF44952EFC891779BC6E5CA4B8741
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06B6F0(long long __rax) {
                				signed int _t3;
                
                				_t3 = GetProcessHeap();
                				 *0x3f091ff0 = __rax;
                				return _t3 & 0xffffff00 | __rax != 0x00000000;
                			}




                0x13f06b6f4
                0x13f06b6fd
                0x13f06b70b

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: e6be20b56f257bdadfbe7bb524d8c8b4382b7696af207cca54c681329bd7b206
                • Instruction ID: eaa7eefdd28a26f3b634dbb5d64a1fb6aeb64ca7879094787274d3da70533794
                • Opcode Fuzzy Hash: e6be20b56f257bdadfbe7bb524d8c8b4382b7696af207cca54c681329bd7b206
                • Instruction Fuzzy Hash: DDB09230F03B05C2EA0C2B19AC8274823A7BB48B00F8800AC900C40322EB2C02AB5B10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F057780(void* __rdx) {
                
                				if (__rdx != 0) goto 0x3f05778b;
                				return 0;
                			}



                0x13f057786
                0x13f05778a

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a07bef107597dc6db609cec3f1dc666b4945fa232d9b52e7c201c1699595e921
                • Instruction ID: f2bd31b9c5f3fe8565d60829de25e9922cd721f62323f130495a0d979cd4e057
                • Opcode Fuzzy Hash: a07bef107597dc6db609cec3f1dc666b4945fa232d9b52e7c201c1699595e921
                • Instruction Fuzzy Hash: F67183737301789BEB648B2E9514FE93390F36A349FC16109EB8447B81CA3E7921DB50
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05E950(signed int __ecx, signed int __edx, void* __eflags, intOrPtr* __rcx, intOrPtr* __rdx, void* __r8) {
                				unsigned int _t13;
                				unsigned int _t14;
                				char _t15;
                				char _t33;
                				signed int* _t41;
                				void* _t52;
                
                				if (__eflags == 0) goto 0x3f05ea0b;
                				if ((__ecx & 0x00000007) == 0) goto 0x3f05e970;
                				_t13 =  *((intOrPtr*)(__rcx));
                				if (_t13 == 0) goto 0x3f05e9e6;
                				_t41 = __rcx + 1;
                				if ((__ecx & 0x00000007) != 0) goto 0x3f05e961;
                				if ((0x01010100 & ( *_t41 ^ 0xffffffff ^ 0xfefefeff +  *_t41)) == 0) goto 0x3f05e970;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				if (_t13 == 0) goto 0x3f05e9e6;
                				_t14 = _t13 >> 0x10;
                				if (_t14 == 0) goto 0x3f05e9e6;
                				if (_t14 == 0) goto 0x3f05e9e6;
                				goto 0x3f05e970;
                				_t52 =  &(_t41[2]) - 8 + 8 - __rdx;
                				if ((__edx & 0x00000007) == 0) goto 0x3f05ea18;
                				_t15 =  *((intOrPtr*)(__rdx));
                				 *((char*)(__rdx + _t52)) = _t15;
                				_t33 = _t15;
                				if (_t33 == 0) goto 0x3f05ea0b;
                				if (_t33 == 0) goto 0x3f05ea06;
                				if ((__edx & 0x00000007) != 0) goto 0x3f05e9ee;
                				goto 0x3f05ea18;
                				 *((char*)(__rdx + 1 + _t52)) = 0;
                				return 0;
                			}









                0x13f05e956
                0x13f05e95f
                0x13f05e961
                0x13f05e965
                0x13f05e967
                0x13f05e96d
                0x13f05e99b
                0x13f05e9a3
                0x13f05e9aa
                0x13f05e9b5
                0x13f05e9bc
                0x13f05e9c7
                0x13f05e9ce
                0x13f05e9d3
                0x13f05e9d8
                0x13f05e9df
                0x13f05e9e4
                0x13f05e9e6
                0x13f05e9ec
                0x13f05e9ee
                0x13f05e9f0
                0x13f05e9f3
                0x13f05e9f5
                0x13f05e9fd
                0x13f05ea02
                0x13f05ea04
                0x13f05ea08
                0x13f05ea0e

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d6ef73793ea1788ae08d57b95515db7d43b127d7364744ae73512ded182e4f5a
                • Instruction ID: dbad13a1bca27957ab7aa18221ccdcef8e0753244115f42452405928216f5cec
                • Opcode Fuzzy Hash: d6ef73793ea1788ae08d57b95515db7d43b127d7364744ae73512ded182e4f5a
                • Instruction Fuzzy Hash: 4A41C472C4D788C4F9AD8A6C450C7E4AA86F722BA0E5852BCFDDA177C7C58C1787C208
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 56%
                			E0000000113F062308(signed int __edx, void* __edi, void* __esp, long long __rbx, signed long long*** __rcx, long long __rsi) {
                				void* _t24;
                				int _t26;
                				signed int _t51;
                				void* _t52;
                				signed long long _t66;
                				signed int* _t73;
                				signed long long _t75;
                				signed long long _t77;
                				signed long long _t78;
                				signed long long _t95;
                				signed long long _t96;
                				signed long long _t98;
                				signed long long _t104;
                				long long _t115;
                				void* _t117;
                				void* _t120;
                				signed long long* _t123;
                				signed long long _t124;
                				signed long long _t126;
                				signed long long _t129;
                				signed long long*** _t132;
                
                				_t52 = __edi;
                				_t51 = __edx;
                				 *((long long*)(_t117 + 0x10)) = __rbx;
                				 *((long long*)(_t117 + 0x18)) = _t115;
                				 *((long long*)(_t117 + 0x20)) = __rsi;
                				_t66 =  *((intOrPtr*)(__rcx));
                				_t132 = __rcx;
                				_t73 =  *_t66;
                				if (_t73 == 0) goto 0x3f06249c;
                				_t124 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t111 = _t124 ^  *_t73;
                				_t75 = _t73[4] ^ _t124;
                				asm("dec eax");
                				asm("dec eax");
                				asm("dec ecx");
                				if ((_t73[2] ^ _t124) != _t75) goto 0x3f06240e;
                				_t77 = _t75 - (_t124 ^  *_t73) >> 3;
                				_t101 =  >  ? _t66 : _t77;
                				_t6 = _t115 + 0x20; // 0x20
                				_t102 = ( >  ? _t66 : _t77) + _t77;
                				_t103 =  ==  ? _t66 : ( >  ? _t66 : _t77) + _t77;
                				if (( ==  ? _t66 : ( >  ? _t66 : _t77) + _t77) - _t77 < 0) goto 0x3f0623aa;
                				_t7 = _t115 + 8; // 0x8
                				r8d = _t7;
                				E0000000113F06B658(_t6, _t77, _t111,  ==  ? _t66 : ( >  ? _t66 : _t77) + _t77, _t111, _t115, _t120);
                				_t24 = E0000000113F0636F8(_t66, _t111);
                				if (_t66 != 0) goto 0x3f0623d2;
                				_t104 = _t77 + 4;
                				r8d = 8;
                				E0000000113F06B658(_t24, _t77, _t111, _t104, _t111, _t115, _t120);
                				_t129 = _t66;
                				_t26 = E0000000113F0636F8(_t66, _t111);
                				if (_t129 == 0) goto 0x3f06249c;
                				_t123 = _t129 + _t77 * 8;
                				_t78 = _t129 + _t104 * 8;
                				_t88 =  >  ? _t115 : _t78 - _t123 + 7 >> 3;
                				_t64 =  >  ? _t115 : _t78 - _t123 + 7 >> 3;
                				if (( >  ? _t115 : _t78 - _t123 + 7 >> 3) == 0) goto 0x3f06240e;
                				memset(_t52, _t26, 0 << 0);
                				_t126 =  *0x3f082018; // 0x3bece1c8a3ca
                				r8d = 0x40;
                				asm("dec eax");
                				 *_t123 =  *(_t132[1]) ^ _t126;
                				_t95 =  *0x3f082018; // 0x3bece1c8a3ca
                				asm("dec eax");
                				 *( *( *_t132)) = _t129 ^ _t95;
                				_t96 =  *0x3f082018; // 0x3bece1c8a3ca
                				asm("dec eax");
                				( *( *_t132))[1] =  &(_t123[1]) ^ _t96;
                				_t98 =  *0x3f082018; // 0x3bece1c8a3ca
                				r8d = r8d - (_t51 & 0x0000003f);
                				asm("dec eax");
                				( *( *_t132))[2] = _t78 ^ _t98;
                				goto 0x3f06249f;
                				return 0xffffffff;
                			}
























                0x13f062308
                0x13f062308
                0x13f062308
                0x13f06230d
                0x13f062312
                0x13f062320
                0x13f062325
                0x13f062328
                0x13f06232e
                0x13f062334
                0x13f062342
                0x13f062352
                0x13f062355
                0x13f062358
                0x13f06235b
                0x13f062361
                0x13f06236f
                0x13f062379
                0x13f06237d
                0x13f062380
                0x13f062383
                0x13f06238a
                0x13f06238c
                0x13f06238c
                0x13f062396
                0x13f0623a0
                0x13f0623a8
                0x13f0623aa
                0x13f0623ae
                0x13f0623ba
                0x13f0623c1
                0x13f0623c4
                0x13f0623cc
                0x13f0623d9
                0x13f0623dd
                0x13f0623f5
                0x13f0623f9
                0x13f0623fc
                0x13f062404
                0x13f062407
                0x13f06240e
                0x13f06242d
                0x13f062433
                0x13f062436
                0x13f062449
                0x13f062452
                0x13f062458
                0x13f062469
                0x13f062472
                0x13f062476
                0x13f062482
                0x13f06248b
                0x13f062496
                0x13f06249a
                0x13f0624b7

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: 08a3b5b7d7c686c72fef61401987739454a5fd4b6a515ba2e53982aa98d5ebce
                • Instruction ID: 9c1f6c9639b91127f62eac80049e30cf31ac5005c372060021600f8aaf2615ea
                • Opcode Fuzzy Hash: 08a3b5b7d7c686c72fef61401987739454a5fd4b6a515ba2e53982aa98d5ebce
                • Instruction Fuzzy Hash: 3741A472710A5441EF18CF2AD9543997792E348FE4F59903AEE0D87B5ADA3CC2569340
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E0000000113F0710D0(intOrPtr __ebx, intOrPtr __edx, signed int __rax, signed int __rdx, void* __r8, signed long long _a8) {
                				intOrPtr _v12;
                				intOrPtr _v16;
                				intOrPtr _v20;
                				void* _t25;
                
                				_t25 = __r8;
                				r8d = 0;
                				 *0x3f09211c = r8d;
                				_t1 = _t25 + 1; // 0x1
                				r9d = _t1;
                				asm("cpuid");
                				_v16 = r9d;
                				_v16 = 0;
                				_v20 = __ebx;
                				_v12 = __edx;
                				if (0 != 0x18001000) goto 0x3f071131;
                				asm("xgetbv");
                				_a8 = __rdx << 0x00000020 | __rax;
                				r8d =  *0x3f09211c;
                				r8d =  ==  ? r9d : r8d;
                				 *0x3f09211c = r8d;
                				 *0x3f092120 = r8d;
                				return 0;
                			}







                0x13f0710d0
                0x13f0710d6
                0x13f0710db
                0x13f0710e2
                0x13f0710e2
                0x13f0710e9
                0x13f0710eb
                0x13f0710f3
                0x13f0710f9
                0x13f0710fd
                0x13f071103
                0x13f071107
                0x13f071111
                0x13f07111b
                0x13f071126
                0x13f07112a
                0x13f071131
                0x13f07113f

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8496157a7989b5e2a65c3d23b814d1cf5c1b8dade6882535584e423579a3aa6a
                • Instruction ID: 48ba0ea60b2113113cc478a10a6553c0870171953c1f8698f4c80cae9b476868
                • Opcode Fuzzy Hash: 8496157a7989b5e2a65c3d23b814d1cf5c1b8dade6882535584e423579a3aa6a
                • Instruction Fuzzy Hash: FFF06271B142948ADBE88F2DA84375A77D1F318380F80802DE789C3B15D23C81728F04
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ac7e444edb157b3bd9a1a898084f62e6b8d7f4d394e4e7ee15cef2537d614976
                • Instruction ID: 68cf3d37e2408107ed6ff55b9bbc56e0078ea55d9068a7926814783af40b6c7b
                • Opcode Fuzzy Hash: ac7e444edb157b3bd9a1a898084f62e6b8d7f4d394e4e7ee15cef2537d614976
                • Instruction Fuzzy Hash: E7A00231A0CC10D1EA0D8B08E85C3D02372F374300F4001B9F18D81462DF7E9686C704
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F0512A0(long long* __rcx, void* __rdx) {
                				long long _t8;
                				void* _t15;
                				void* _t16;
                				void* _t17;
                
                				_t8 =  *((intOrPtr*)(__rcx));
                				_t15 = __rdx;
                				if (_t8 != 0) goto 0x3f0512e8;
                				E0000000113F052E30(_t8, __rcx + 0x78, "rb");
                				 *__rcx = _t8;
                				if (_t8 != 0) goto 0x3f0512e8;
                				E0000000113F051DD0(_t8, "Failed to extract %s: failed to open archive file!\n", _t15 + 0x12, _t16, _t17);
                				return 0;
                			}







                0x13f0512a8
                0x13f0512ab
                0x13f0512b4
                0x13f0512c1
                0x13f0512c6
                0x13f0512cc
                0x13f0512d9
                0x13f0512e7

                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message
                • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                • API String ID: 2030045667-3659356012
                • Opcode ID: 37000fc2d0e95202eab874b8257cbe3fda57b589460c71833648deaf4dc11db0
                • Instruction ID: ed6bde677f45ced7978b02e87740206845ef2b0a1d7b62caaf1a0416acc6e114
                • Opcode Fuzzy Hash: 37000fc2d0e95202eab874b8257cbe3fda57b589460c71833648deaf4dc11db0
                • Instruction Fuzzy Hash: 94417C31A09641C2EF28DB19E8587DA63A2FB44BD4F84543AAE4D07B57EAB8C647C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide
                • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                • API String ID: 626452242-3595433791
                • Opcode ID: 6d42aa2b49a4b1d8f444cd0688a8e84e723d9d887a59972b24ad5cdf1701df4e
                • Instruction ID: 37cab899d5a5a3e57032c4000d51d407dd280c11fb0f3518fd3d22cc17ff71cf
                • Opcode Fuzzy Hash: 6d42aa2b49a4b1d8f444cd0688a8e84e723d9d887a59972b24ad5cdf1701df4e
                • Instruction Fuzzy Hash: 5641B632609B80C2E724CF99F8443AAB7A6F785794F544139EE8D47B96DF78C256C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • WideCharToMultiByte.KERNEL32 ref: 000000013F055601
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                • WideCharToMultiByte.KERNEL32 ref: 000000013F055675
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide$ErrorLastMessage
                • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                • API String ID: 3723044601-3595433791
                • Opcode ID: 661b16ac7b459c528700666a9972ae32bb8b16efeaa082d2f31df73458553e20
                • Instruction ID: 70f02d07a6cd543d730e02185c6ef7d800b1cc92780b55f43d87ed084cfabfbc
                • Opcode Fuzzy Hash: 661b16ac7b459c528700666a9972ae32bb8b16efeaa082d2f31df73458553e20
                • Instruction Fuzzy Hash: FA21BF70B08B81D5EB18CF6AE8443A97762A784BD4F944139EA0D43796EF78C6468300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide
                • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                • API String ID: 626452242-306716450
                • Opcode ID: 0af1065a548bd72e2643c8e7e41cec0953168da58934bdc47b0754c33f29284f
                • Instruction ID: 3748b706c174d882a0fbe4029506a8c91f31344bd034171ccc479dc72816059c
                • Opcode Fuzzy Hash: 0af1065a548bd72e2643c8e7e41cec0953168da58934bdc47b0754c33f29284f
                • Instruction Fuzzy Hash: ED41C232A09B84C2E624CF5DB8483AA76A6F784794F540139FE4D47BA6EF78C647C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F053FB0(void* __edx, void* __rax, long long __rbx, void* __rcx, void* __r8, char _a24, char _a8216, signed int _a16408, long long _a16448) {
                				void* __rdi;
                				long _t16;
                				void* _t31;
                				void* _t34;
                				void* _t40;
                				void* _t41;
                				signed long long _t49;
                				signed long long _t50;
                				long long _t52;
                				signed long long _t74;
                				void* _t76;
                				void* _t77;
                				void* _t85;
                				void* _t86;
                				void* _t87;
                
                				_t80 = __r8;
                				_t52 = __rbx;
                				_t34 = __edx;
                				E0000000113F058610(_t31, __rax, __rcx, _t86, _t87);
                				_t78 = _t77 - __rax;
                				_t49 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t50 = _t49 ^ _t77 - __rax;
                				_a16408 = _t50;
                				_t69 = __rcx;
                				r8d = 0;
                				E0000000113F0554B0(_t50, __rbx, __rcx, __rcx, _t76, __r8);
                				if (_t50 != 0) goto 0x3f053ff9;
                				E0000000113F051DD0(_t50, "LOADER: Failed to convert runtime-tmpdir to a wide string.\n", _t69, _t80, _t85);
                				goto 0x3f0540e2;
                				r8d = 0x1000;
                				_a16448 = _t52;
                				_t16 = ExpandEnvironmentStringsW(??, ??, ??);
                				E0000000113F05A4F8(_t40, _t50, _t52, _t50);
                				if (_t16 != 0) goto 0x3f054039;
                				E0000000113F051DD0(_t50, "LOADER: Failed to expand environment variables in the runtime-tmpdir.\n",  &_a8216, _t80, _t85);
                				goto 0x3f0540da;
                				r8d = 0x1000;
                				E0000000113F05ED58(0, _t34, _t40, _t52, "LOADER: Failed to expand environment variables in the runtime-tmpdir.\n",  &_a8216, _t50, _t76, _t80, _t87);
                				if (_t50 != 0) goto 0x3f054066;
                				E0000000113F051DD0(_t50, "LOADER: Failed to obtain the absolute path of the runtime-tmpdir.\n",  &_a8216, _t80, _t85);
                				goto 0x3f0540da;
                				r8d = 0x2000;
                				E0000000113F0597D0(0, 0,  &_a24,  &_a8216, _t80);
                				E0000000113F059B10(0x5c, _t50, _t85);
                				_t74 = _t50;
                				if (_t50 == 0) goto 0x3f0540cc;
                				E0000000113F05F6A8(_t40, _t41,  &_a24, _t50, _t74, (_t74 - _t50 >> 1) + 1);
                				CreateDirectoryW(??, ??);
                				_t8 = _t74 + 2; // 0x2
                				E0000000113F059B10(0x5c, _t8, _t85);
                				if (_t50 != 0) goto 0x3f054090;
                				CreateDirectoryW(??, ??);
                				return E0000000113F058680(0, _t50, _a16408 ^ _t78);
                			}


















                0x13f053fb0
                0x13f053fb0
                0x13f053fb0
                0x13f053fb7
                0x13f053fbc
                0x13f053fbf
                0x13f053fc6
                0x13f053fc9
                0x13f053fd1
                0x13f053fd4
                0x13f053fd9
                0x13f053fe4
                0x13f053fed
                0x13f053ff4
                0x13f053ff9
                0x13f053fff
                0x13f054012
                0x13f05401d
                0x13f054024
                0x13f05402d
                0x13f054034
                0x13f054039
                0x13f054049
                0x13f054054
                0x13f05405d
                0x13f054064
                0x13f05406d
                0x13f054073
                0x13f054080
                0x13f054085
                0x13f05408b
                0x13f0540a4
                0x13f0540b0
                0x13f0540bb
                0x13f0540bf
                0x13f0540ca
                0x13f0540d1
                0x13f0540fa

                APIs
                  • Part of subcall function 000000013F0554B0: MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                • ExpandEnvironmentStringsW.KERNEL32(00000000,000000013F0542CF,?,00000000,?,000000013F05424D), ref: 000000013F054012
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 000000013F054026
                • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 000000013F054056
                • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 000000013F053FE6
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                • API String ID: 1662231829-3498232454
                • Opcode ID: 4774a8e9ff676fe47f71c264b22fcf21709dbdb849fd82e5e76fc5ff77e56d65
                • Instruction ID: 79dd22881db695dce16086cb72cda4119d83e2ab3610f3bc8f83615429fc8326
                • Opcode Fuzzy Hash: 4774a8e9ff676fe47f71c264b22fcf21709dbdb849fd82e5e76fc5ff77e56d65
                • Instruction Fuzzy Hash: FF319935B19780C1FA2C972AE9693DA5253A7987C1F94443DBA4D43797EE7CC30ACB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                • MultiByteToWideChar.KERNEL32 ref: 000000013F055570
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide$ErrorLastMessage
                • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                • API String ID: 3723044601-306716450
                • Opcode ID: d8b4a6a420558b082c8b60f997ea8a8e921bd64c55c8bf36f0866264c7c0746b
                • Instruction ID: 7dc073584a88abe95d01d1dc07f511727cdae1dfcdaed099c05b464c91e9f5b8
                • Opcode Fuzzy Hash: d8b4a6a420558b082c8b60f997ea8a8e921bd64c55c8bf36f0866264c7c0746b
                • Instruction Fuzzy Hash: F521A875B08A8091EB54CB2DF844399A773F7847C4F544139EB4C83BAAEB28C6568700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                • String ID: CONOUT$
                • API String ID: 3230265001-3130406586
                • Opcode ID: 98e84c71b80d89dac0c76f5293afbbf01bb1ac2dd60d9a438c5439a735892769
                • Instruction ID: a1e942dd967cd7577984805692e69fc823b241b51ff585951ed37344da0918ad
                • Opcode Fuzzy Hash: 98e84c71b80d89dac0c76f5293afbbf01bb1ac2dd60d9a438c5439a735892769
                • Instruction Fuzzy Hash: B0119031B10A4086E7548B5AFC44359A7A2F788BE4F544238FE5E87B96DF38CA4AC740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 41%
                			E0000000113F051C80(void* __rax, long long __rcx, signed long long __rdx, long long __r8, long long __r9, long long _a8, signed long long _a16, char _a24, long long _a32, char _a1048, char _a2072, char _a4120, signed int _a6168, void* _a6224, char _a6232) {
                				void* __rbx;
                				void* __rsi;
                				void* _t27;
                				void* _t35;
                				signed long long _t44;
                				signed long long _t45;
                				long long _t46;
                				long long _t62;
                				void* _t64;
                				void* _t74;
                				void* _t75;
                
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				E0000000113F058610(_t35, __rax, __rcx, _t74, _t75);
                				_t65 = _t64 - __rax;
                				_t44 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t45 = _t44 ^ _t64 - __rax;
                				_a6168 = _t45;
                				_t62 = __rcx;
                				E0000000113F051B20(GetLastError());
                				_a16 =  &_a6232;
                				r8d = 0x400;
                				_a8 = 0;
                				0x3f05ddec();
                				E0000000113F055030(_t24, _t45, __r8);
                				_a16 = _t45;
                				_a8 = _t62;
                				_t27 = E0000000113F051FF0(_t45,  &_a24,  &_a1048, "%s%s: %s",  &_a1048);
                				r8d = 0x800;
                				E0000000113F0597D0(_t27, 0,  &_a2072,  &_a1048, "%s%s: %s");
                				r8d = 0x400;
                				E0000000113F0554B0(_t45, _t46,  &_a4120,  &_a24,  &_a6232, "%s%s: %s");
                				if (_t45 == 0) goto 0x3f051d94;
                				r8d = 0x400;
                				E0000000113F0554B0(_t45, _t46,  &_a2072, "Fatal error detected",  &_a6232, "%s%s: %s");
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051dae;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t45, _a6168 ^ _t65);
                			}














                0x13f051c80
                0x13f051c85
                0x13f051c8a
                0x13f051c97
                0x13f051c9c
                0x13f051c9f
                0x13f051ca6
                0x13f051ca9
                0x13f051cb1
                0x13f051cc4
                0x13f051cd9
                0x13f051cde
                0x13f051ce4
                0x13f051cf4
                0x13f051cfb
                0x13f051d00
                0x13f051d14
                0x13f051d23
                0x13f051d32
                0x13f051d38
                0x13f051d3d
                0x13f051d50
                0x13f051d58
                0x13f051d5a
                0x13f051d6f
                0x13f051d74
                0x13f051d8c
                0x13f051d92
                0x13f051d94
                0x13f051da8
                0x13f051dc8

                APIs
                • GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F055030: GetLastError.KERNEL32(00000000,000000013F051D00), ref: 000000013F055057
                  • Part of subcall function 000000013F055030: FormatMessageW.KERNEL32 ref: 000000013F055086
                  • Part of subcall function 000000013F0554B0: MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                • MessageBoxW.USER32 ref: 000000013F051D8C
                • MessageBoxA.USER32 ref: 000000013F051DA8
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                • String ID: %s%s: %s$Fatal error detected
                • API String ID: 2806210788-2410924014
                • Opcode ID: 90a221819f8eca94b5bdcf23abaa2f754120fd1fc65687a0db4619a7d6dc35e3
                • Instruction ID: 56b4da25d96d06a3063ad87f4840cb3b151669c4e5a0b28bec8d855d249879d9
                • Opcode Fuzzy Hash: 90a221819f8eca94b5bdcf23abaa2f754120fd1fc65687a0db4619a7d6dc35e3
                • Instruction Fuzzy Hash: 1531757262968481EB34DB14E4557DA63A5F784788F80502AB68D07A9BDF7CC34BCB40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: 690d9ddb6f60a26e5b3e80fea60f6852178f52e6120a89603049ff95323a4551
                • Instruction ID: 8192fd9c0f3c7f7a7644cfa0882e8f56135699b84e5d9d4109f793a372ddba40
                • Opcode Fuzzy Hash: 690d9ddb6f60a26e5b3e80fea60f6852178f52e6120a89603049ff95323a4551
                • Instruction Fuzzy Hash: 91F08271B2564481FF5C8B69E8843E82362EB88790F44147DB50B45567DF2DC68ECB10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 85%
                			E0000000113F070ED0(signed int __ecx, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                				signed int _t27;
                				signed int _t28;
                				signed int _t29;
                				signed int _t30;
                				signed int _t31;
                				signed int _t42;
                				signed int _t43;
                				signed int _t44;
                				signed int _t46;
                				void* _t51;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t27 = __ecx & 0x0000001f;
                				if ((__ecx & 0x00000008) == 0) goto 0x3f070f02;
                				if (sil >= 0) goto 0x3f070f02;
                				E0000000113F071664(_t27, _t51);
                				_t28 = _t27 & 0xfffffff7;
                				goto 0x3f070f59;
                				_t42 = 0x00000004 & dil;
                				if (_t42 == 0) goto 0x3f070f1d;
                				asm("dec eax");
                				if (_t42 >= 0) goto 0x3f070f1d;
                				E0000000113F071664(_t28, _t51);
                				_t29 = _t28 & 0xfffffffb;
                				goto 0x3f070f59;
                				_t43 = dil & 0x00000001;
                				if (_t43 == 0) goto 0x3f070f39;
                				asm("dec eax");
                				if (_t43 >= 0) goto 0x3f070f39;
                				E0000000113F071664(_t29, _t51);
                				_t30 = _t29 & 0xfffffffe;
                				goto 0x3f070f59;
                				_t44 = dil & 0x00000002;
                				if (_t44 == 0) goto 0x3f070f59;
                				asm("dec eax");
                				if (_t44 >= 0) goto 0x3f070f59;
                				if ((dil & 0x00000010) == 0) goto 0x3f070f56;
                				E0000000113F071664(_t30, _t51);
                				_t31 = _t30 & 0xfffffffd;
                				_t46 = dil & 0x00000010;
                				if (_t46 == 0) goto 0x3f070f73;
                				asm("dec eax");
                				if (_t46 >= 0) goto 0x3f070f73;
                				E0000000113F071664(_t31, _t51);
                				return 0 | (_t31 & 0xffffffef) == 0x00000000;
                			}













                0x13f070ed0
                0x13f070ed5
                0x13f070ee4
                0x13f070eec
                0x13f070ef1
                0x13f070ef8
                0x13f070efd
                0x13f070f00
                0x13f070f07
                0x13f070f0a
                0x13f070f0c
                0x13f070f11
                0x13f070f13
                0x13f070f18
                0x13f070f1b
                0x13f070f1d
                0x13f070f21
                0x13f070f23
                0x13f070f28
                0x13f070f2f
                0x13f070f34
                0x13f070f37
                0x13f070f39
                0x13f070f3d
                0x13f070f3f
                0x13f070f44
                0x13f070f4a
                0x13f070f51
                0x13f070f56
                0x13f070f59
                0x13f070f5d
                0x13f070f5f
                0x13f070f64
                0x13f070f6b
                0x13f070f89

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _set_statfp
                • String ID:
                • API String ID: 1156100317-0
                • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                • Instruction ID: 368974cb53468e8e325ef9c88ee7940af8d885d138733dad06bb3fe7f40e0a5d
                • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                • Instruction Fuzzy Hash: 7511A572F1CB8545F65C112CEA563EA11436BA4370F4807BDBA7A06AF78B18CA4B9204
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 87%
                			E0000000113F068484(long long __rbx, signed int* __rcx, void* __rdx, long long __rdi, long long __rsi) {
                				signed int _t31;
                				signed int _t33;
                				signed int _t36;
                				signed int _t49;
                				signed int _t56;
                				void* _t61;
                				void* _t82;
                				signed int _t88;
                				void* _t89;
                				signed int _t93;
                				signed int _t108;
                				intOrPtr* _t128;
                				signed short* _t130;
                				signed short* _t131;
                				long long _t135;
                				signed int _t137;
                				signed short* _t141;
                				signed short* _t142;
                				void* _t143;
                
                				_t108 = _t137;
                				 *((long long*)(_t108 + 8)) = __rbx;
                				 *((long long*)(_t108 + 0x10)) = _t135;
                				 *((long long*)(_t108 + 0x18)) = __rsi;
                				 *((long long*)(_t108 + 0x20)) = __rdi;
                				 *__rcx = _t108;
                				__rcx[2] = 0;
                				r14d = 0x20;
                				_t31 =  *0x3f09175c; // 0x0
                				__rcx[1] = _t31;
                				goto 0x3f0684c7;
                				_t141 = __rdx + 2;
                				_t33 =  *_t141 & 0x0000ffff;
                				if (_t33 == r14w) goto 0x3f0684bf;
                				if (_t33 == 0x61) goto 0x3f0684f4;
                				if (_t33 == 0x72) goto 0x3f0684eb;
                				if (_t33 != 0x77) goto 0x3f068755;
                				 *__rcx = 0x301;
                				goto 0x3f0684fa;
                				__rcx[1] = 1;
                				goto 0x3f068501;
                				 *__rcx = 0x109;
                				__rcx[1] = 2;
                				_t142 =  &(_t141[1]);
                				r9b = bpl;
                				dil = bpl;
                				r10b = bpl;
                				r11b = bpl;
                				_t9 = _t135 + 0xa; // 0xa
                				if ( *_t142 == 0) goto 0x3f068667;
                				_t56 =  *_t142 & 0x0000ffff;
                				_t82 = _t56 - 0x53;
                				if (_t82 > 0) goto 0x3f0685d1;
                				if (_t82 == 0) goto 0x3f0685ba;
                				if (_t82 == 0) goto 0x3f068652;
                				if (_t82 == 0) goto 0x3f06858b;
                				if (_t82 == 0) goto 0x3f068583;
                				if (_t82 == 0) goto 0x3f068571;
                				_t61 = _t56 - r14d - 0xfffffffffffffff2 - _t9;
                				if (_t82 == 0) goto 0x3f068568;
                				if (_t61 != 4) goto 0x3f068755;
                				if (r10b != 0) goto 0x3f068645;
                				 *__rcx =  *__rcx | 0x00000010;
                				goto 0x3f0685c6;
                				asm("bts dword [ebx], 0x7");
                				goto 0x3f068650;
                				if (( *__rcx & 0x00000040) != 0) goto 0x3f068645;
                				goto 0x3f06864e;
                				r11b = 1;
                				goto 0x3f068645;
                				if (dil != 0) goto 0x3f068645;
                				_t36 =  *__rcx;
                				dil = 1;
                				if ((_t36 & 0x00000002) != 0) goto 0x3f068645;
                				 *__rcx = _t36 & 0xfffffffe | 0x00000002;
                				__rcx[1] = __rcx[1] & 0xfffffffc | 0x00000004;
                				goto 0x3f068650;
                				_t88 = r10b;
                				if (_t88 != 0) goto 0x3f068645;
                				 *__rcx =  *__rcx | r14d;
                				r10b = 1;
                				goto 0x3f068652;
                				if (_t88 == 0) goto 0x3f06863d;
                				if (_t88 == 0) goto 0x3f06862e;
                				if (_t88 == 0) goto 0x3f06861c;
                				if (_t88 == 0) goto 0x3f068610;
                				if (_t88 == 0) goto 0x3f068601;
                				_t89 = _t61 - 0x34 - 4;
                				if (_t89 != 0) goto 0x3f068755;
                				asm("bt eax, 0x9");
                				if (_t89 >= 0) goto 0x3f068645;
                				asm("bts eax, 0xa");
                				goto 0x3f06864e;
                				if (( *__rcx & 0x0000c000) != 0) goto 0x3f068645;
                				asm("bts eax, 0xe");
                				goto 0x3f06864e;
                				if (r9b != 0) goto 0x3f068645;
                				asm("btr dword [ebx+0x4], 0xb");
                				goto 0x3f068626;
                				if (r9b != 0) goto 0x3f068645;
                				asm("bts dword [ebx+0x4], 0xb");
                				r9b = 1;
                				goto 0x3f068652;
                				_t93 =  *__rcx & 0x0000c000;
                				if (_t93 != 0) goto 0x3f068645;
                				asm("bts eax, 0xf");
                				goto 0x3f06864e;
                				asm("bt eax, 0xc");
                				if (_t93 >= 0) goto 0x3f06864a;
                				goto 0x3f068652;
                				asm("bts eax, 0xc");
                				asm("dec eax");
                				_t143 = _t142 + __rcx;
                				if (1 != 0) goto 0x3f068518;
                				_t127 =  ==  ? _t143 : _t143 + 2;
                				goto 0x3f068678;
                				_t128 = ( ==  ? _t143 : _t143 + 2) + 2;
                				if ( *_t128 == r14w) goto 0x3f068674;
                				if (r11b != 0) goto 0x3f068695;
                				if ( *_t128 != 0) goto 0x3f068755;
                				__rcx[2] = 1;
                				goto 0x3f068765;
                				r8d = 3;
                				if (E0000000113F0633D8(_t143) != 0) goto 0x3f068755;
                				goto 0x3f0686bc;
                				_t130 = _t128 + 8;
                				_t49 =  *_t130 & 0x0000ffff;
                				if (_t49 == r14w) goto 0x3f0686b8;
                				if (_t49 != 0x3d) goto 0x3f068755;
                				_t131 =  &(_t130[1]);
                				if ( *_t131 == r14w) goto 0x3f0686cf;
                				r8d = 5;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f0686f8;
                				asm("bts dword [ebx], 0x12");
                				goto 0x3f06873a;
                				r8d = 8;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f06871a;
                				asm("bts dword [ebx], 0x11");
                				goto 0x3f06873a;
                				r8d = 7;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f068755;
                				asm("bts dword [ebx], 0x10");
                				goto 0x3f068744;
                				if (( *(_t131 + __rsi + 2) & 0x0000ffff) == r14w) goto 0x3f068740;
                				goto 0x3f068686;
                				E0000000113F05DEB4(_t108);
                				 *_t108 = 0x16;
                				return E0000000113F063618();
                			}






















                0x13f068484
                0x13f068487
                0x13f06848b
                0x13f06848f
                0x13f068493
                0x13f0684a2
                0x13f0684a8
                0x13f0684ab
                0x13f0684b1
                0x13f0684b7
                0x13f0684bd
                0x13f0684bf
                0x13f0684c3
                0x13f0684cb
                0x13f0684d1
                0x13f0684d7
                0x13f0684dd
                0x13f0684e3
                0x13f0684e9
                0x13f0684eb
                0x13f0684f2
                0x13f0684f4
                0x13f0684fa
                0x13f068501
                0x13f068509
                0x13f06850c
                0x13f06850f
                0x13f068512
                0x13f068515
                0x13f06851c
                0x13f068522
                0x13f068526
                0x13f068529
                0x13f06852f
                0x13f068538
                0x13f068541
                0x13f068546
                0x13f06854b
                0x13f06854d
                0x13f06854f
                0x13f068554
                0x13f06855d
                0x13f068563
                0x13f068566
                0x13f068568
                0x13f06856c
                0x13f068575
                0x13f06857e
                0x13f068583
                0x13f068586
                0x13f06858e
                0x13f068594
                0x13f068596
                0x13f06859b
                0x13f0685a7
                0x13f0685b2
                0x13f0685b5
                0x13f0685ba
                0x13f0685bd
                0x13f0685c3
                0x13f0685c6
                0x13f0685cc
                0x13f0685d4
                0x13f0685d9
                0x13f0685de
                0x13f0685e3
                0x13f0685e8
                0x13f0685ea
                0x13f0685ed
                0x13f0685f5
                0x13f0685f9
                0x13f0685fb
                0x13f0685ff
                0x13f068608
                0x13f06860a
                0x13f06860e
                0x13f068613
                0x13f068615
                0x13f06861a
                0x13f06861f
                0x13f068621
                0x13f068626
                0x13f06862c
                0x13f068630
                0x13f068635
                0x13f068637
                0x13f06863b
                0x13f06863f
                0x13f068643
                0x13f068648
                0x13f06864a
                0x13f068656
                0x13f06865c
                0x13f068661
                0x13f06866e
                0x13f068672
                0x13f068674
                0x13f06867c
                0x13f068681
                0x13f068686
                0x13f06868c
                0x13f068690
                0x13f068695
                0x13f0686ac
                0x13f0686b6
                0x13f0686b8
                0x13f0686bc
                0x13f0686c3
                0x13f0686c9
                0x13f0686cf
                0x13f0686d7
                0x13f0686d9
                0x13f0686f0
                0x13f0686f2
                0x13f0686f6
                0x13f0686f8
                0x13f06870f
                0x13f068711
                0x13f068718
                0x13f06871a
                0x13f068731
                0x13f068733
                0x13f06873e
                0x13f06874b
                0x13f068750
                0x13f068755
                0x13f06875a
                0x13f068782

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                • API String ID: 3215553584-1196891531
                • Opcode ID: 450d49ee475a7bad6a44c5fa310b096f0ecdf9bddeaef2acd20c06115621a3ce
                • Instruction ID: db4965f0a101a8166008a1810035752a039f2554560910d29e9d6f6be07a369a
                • Opcode Fuzzy Hash: 450d49ee475a7bad6a44c5fa310b096f0ecdf9bddeaef2acd20c06115621a3ce
                • Instruction Fuzzy Hash: 19816C76E0420085FBBD9F2D83943E826E2EB11BA8F75803DFA0557297D729CB439702
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F05C080(signed int __edi, intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, long long _a16, long long _a24) {
                				unsigned int _t79;
                				intOrPtr _t90;
                				signed int _t98;
                				signed int _t100;
                				char _t102;
                				signed int _t105;
                				unsigned int _t112;
                				void* _t132;
                				void* _t142;
                
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_t105 = __edi | 0xffffffff;
                				_t132 = __rcx;
                				if ( *((long long*)(__rcx + 0x468)) == 0) goto 0x3f05c276;
                				if ( *((long long*)(__rcx + 0x18)) != 0) goto 0x3f05c0c1;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05c266;
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) == 2) goto 0x3f05c263;
                				 *(__rcx + 0x50) =  *(__rcx + 0x50) & 0x00000000;
                				 *(__rcx + 0x2c) =  *(__rcx + 0x2c) & 0x00000000;
                				goto 0x3f05c23b;
                				 *((long long*)(__rcx + 0x18)) =  *((long long*)(__rcx + 0x18)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x28)) < 0) goto 0x3f05c250;
                				if (__rcx - 0x20 - 0x5a > 0) goto 0x3f05c114;
                				asm("lfence");
                				_t127 =  *((intOrPtr*)(__rcx + 0x41));
                				goto 0x3f05c116;
                				_t79 = ( *( *((intOrPtr*)(__rcx + 0x41)) + 0x3f077c40) & 0x000000ff) >> 4;
                				 *(__rcx + 0x2c) = _t79;
                				if (_t79 == 8) goto 0x3f05c276;
                				_t112 = _t79;
                				if (_t112 == 0) goto 0x3f05c22f;
                				if (_t112 == 0) goto 0x3f05c216;
                				if (_t112 == 0) goto 0x3f05c1e1;
                				if (_t112 == 0) goto 0x3f05c1b5;
                				if (_t112 == 0) goto 0x3f05c1ac;
                				if (_t112 == 0) goto 0x3f05c17f;
                				if (_t112 == 0) goto 0x3f05c172;
                				if (_t79 - 0xfffffffffffffffc != 1) goto 0x3f05c286;
                				E0000000113F05C930(__rcx, __rcx, _t142, 0x3f077c40);
                				goto 0x3f05c237;
                				E0000000113F05C624(_t127, _t132);
                				goto 0x3f05c237;
                				if ( *((char*)(_t132 + 0x41)) == 0x2a) goto 0x3f05c196;
                				E0000000113F05BF38(_t127, _t132, _t132, _t132 + 0x38, 0x3f077c40);
                				goto 0x3f05c237;
                				 *((long long*)(_t132 + 0x20)) =  *((long long*)(_t132 + 0x20)) + 8;
                				_t98 =  *( *((intOrPtr*)(_t132 + 0x20)) - 8);
                				_t99 =  <  ? _t105 : _t98;
                				 *(_t132 + 0x38) =  <  ? _t105 : _t98;
                				goto 0x3f05c1dd;
                				 *(_t132 + 0x38) =  *(_t132 + 0x38) & 0x00000000;
                				goto 0x3f05c23b;
                				if ( *((char*)(_t132 + 0x41)) == 0x2a) goto 0x3f05c1c1;
                				goto 0x3f05c189;
                				 *((long long*)(_t132 + 0x20)) =  *((long long*)(_t132 + 0x20)) + 8;
                				_t100 =  *( *((intOrPtr*)(_t132 + 0x20)) - 8);
                				 *(_t132 + 0x34) = _t100;
                				if (_t100 >= 0) goto 0x3f05c1dd;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000004;
                				 *(_t132 + 0x34) =  ~_t100;
                				goto 0x3f05c237;
                				_t90 =  *((intOrPtr*)(_t132 + 0x41));
                				if (_t90 == 0x20) goto 0x3f05c210;
                				if (_t90 == 0x23) goto 0x3f05c20a;
                				if (_t90 == 0x2b) goto 0x3f05c204;
                				if (_t90 == 0x2d) goto 0x3f05c1fe;
                				if (_t90 != 0x30) goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000008;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000004;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000001;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000020;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000002;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x34) =  *(_t132 + 0x34) & 0x00000000;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) & 0x00000000;
                				 *(_t132 + 0x3c) =  *(_t132 + 0x3c) & 0x00000000;
                				 *((char*)(_t132 + 0x40)) = 0;
                				 *(_t132 + 0x38) = _t105;
                				 *((char*)(_t132 + 0x54)) = 0;
                				goto 0x3f05c23b;
                				if (E0000000113F05C508(_t132) == 0) goto 0x3f05c286;
                				_t102 =  *((intOrPtr*)( *((intOrPtr*)(_t132 + 0x18))));
                				 *((char*)(_t132 + 0x41)) = _t102;
                				if (_t102 != 0) goto 0x3f05c0e8;
                				 *((long long*)(_t132 + 0x18)) =  *((long long*)(_t132 + 0x18)) + 1;
                				 *((intOrPtr*)(_t132 + 0x470)) =  *((intOrPtr*)(_t132 + 0x470)) + 1;
                				if ( *((intOrPtr*)(_t132 + 0x470)) != 2) goto 0x3f05c0db;
                				return  *((intOrPtr*)(_t132 + 0x28));
                			}












                0x13f05c080
                0x13f05c085
                0x13f05c08f
                0x13f05c092
                0x13f05c09d
                0x13f05c0a8
                0x13f05c0aa
                0x13f05c0af
                0x13f05c0b5
                0x13f05c0bc
                0x13f05c0c1
                0x13f05c0ce
                0x13f05c0db
                0x13f05c0df
                0x13f05c0e3
                0x13f05c0e8
                0x13f05c0f0
                0x13f05c101
                0x13f05c103
                0x13f05c106
                0x13f05c112
                0x13f05c11f
                0x13f05c122
                0x13f05c128
                0x13f05c12e
                0x13f05c130
                0x13f05c139
                0x13f05c142
                0x13f05c14b
                0x13f05c150
                0x13f05c155
                0x13f05c15a
                0x13f05c15f
                0x13f05c168
                0x13f05c16d
                0x13f05c175
                0x13f05c17a
                0x13f05c183
                0x13f05c18c
                0x13f05c191
                0x13f05c196
                0x13f05c19f
                0x13f05c1a4
                0x13f05c1a7
                0x13f05c1aa
                0x13f05c1ac
                0x13f05c1b0
                0x13f05c1b9
                0x13f05c1bf
                0x13f05c1c1
                0x13f05c1ca
                0x13f05c1cd
                0x13f05c1d2
                0x13f05c1d4
                0x13f05c1da
                0x13f05c1df
                0x13f05c1e1
                0x13f05c1e6
                0x13f05c1ea
                0x13f05c1ee
                0x13f05c1f2
                0x13f05c1f6
                0x13f05c1f8
                0x13f05c1fc
                0x13f05c1fe
                0x13f05c202
                0x13f05c204
                0x13f05c208
                0x13f05c20a
                0x13f05c20e
                0x13f05c210
                0x13f05c214
                0x13f05c216
                0x13f05c21a
                0x13f05c21e
                0x13f05c222
                0x13f05c226
                0x13f05c229
                0x13f05c22d
                0x13f05c239
                0x13f05c23f
                0x13f05c241
                0x13f05c246
                0x13f05c24c
                0x13f05c250
                0x13f05c25d
                0x13f05c275

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: $*
                • API String ID: 3215553584-3982473090
                • Opcode ID: 56f6ef7d21224f0faaa81e4b2f482fd7d932899ae18ad29c750557fb832c1004
                • Instruction ID: ceddb313ab3966da24d80473c6ab09fe47bf3afab105e1ae6487fdad97bcf82b
                • Opcode Fuzzy Hash: 56f6ef7d21224f0faaa81e4b2f482fd7d932899ae18ad29c750557fb832c1004
                • Instruction Fuzzy Hash: 0961307290D640CAEB6C8F7C805C3AC3BA2F316B58F14913DE64A4639AC7A5C68BC755
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F051B30(void* __rax, long long __rcx, signed long long __rdx, long long __r8, long long __r9, long long _a8, signed long long _a16, char _a24, long long _a32, char _a1048, char _a2072, char _a4120, signed int _a6168, char _a6232) {
                				void* __rbx;
                				void* __rsi;
                				void* _t22;
                				void* _t26;
                				void* _t33;
                				signed long long _t42;
                				signed long long _t43;
                				void* _t62;
                				void* _t72;
                				void* _t73;
                
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t22 = E0000000113F058610(_t33, __rax, __rcx, _t72, _t73);
                				_t63 = _t62 - __rax;
                				_t42 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t43 = _t42 ^ _t62 - __rax;
                				_a6168 = _t43;
                				_t44 = __rdx;
                				E0000000113F051B20(_t22);
                				_a16 =  &_a6232;
                				_a8 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				E0000000113F05DEB4(_t43);
                				E0000000113F05DED4( *_t43, _t43, __rdx);
                				_a16 = _t43;
                				_a8 = __rcx;
                				_t26 = E0000000113F051FF0(_t43,  &_a24,  &_a1048, "%s%s: %s",  &_a1048);
                				r8d = 0x800;
                				E0000000113F0597D0(_t26, 0,  &_a2072,  &_a1048, "%s%s: %s");
                				r8d = 0x400;
                				E0000000113F0554B0(_t43, _t44,  &_a4120,  &_a24,  &_a6232, "%s%s: %s");
                				if (_t43 == 0) goto 0x3f051c3f;
                				r8d = 0x400;
                				E0000000113F0554B0(_t43, _t44,  &_a2072, "Fatal error detected",  &_a6232, "%s%s: %s");
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051c59;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t43, _a6168 ^ _t63);
                			}













                0x13f051b30
                0x13f051b35
                0x13f051b3a
                0x13f051b47
                0x13f051b4c
                0x13f051b4f
                0x13f051b56
                0x13f051b59
                0x13f051b61
                0x13f051b6f
                0x13f051b74
                0x13f051b84
                0x13f051b8d
                0x13f051b9a
                0x13f051b9f
                0x13f051ba6
                0x13f051bab
                0x13f051bbf
                0x13f051bce
                0x13f051bdd
                0x13f051be3
                0x13f051be8
                0x13f051bfb
                0x13f051c03
                0x13f051c05
                0x13f051c1a
                0x13f051c1f
                0x13f051c37
                0x13f051c3d
                0x13f051c3f
                0x13f051c53
                0x13f051c73

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: %s%s: %s$Fatal error detected
                • API String ID: 1878133881-2410924014
                • Opcode ID: f71ee3b6517c22b91a1bb21c20bc030904f0b5496b387f5b87df66999fb5b4d9
                • Instruction ID: aa427039212fac093a54dc4f362230c0a852f3ea3a0d7bde0f04a051ac007e18
                • Opcode Fuzzy Hash: f71ee3b6517c22b91a1bb21c20bc030904f0b5496b387f5b87df66999fb5b4d9
                • Instruction Fuzzy Hash: 3D315772629684C1E634EB14F4557DA63A6F784788F80402ABA8D47A9BDF7CC307CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F052D20(void* __rax, long long __rcx, char _a24, signed int _a8216) {
                				void* __rbx;
                				void* _t15;
                				intOrPtr _t17;
                				signed long long _t22;
                				signed long long _t23;
                				void* _t34;
                				void* _t35;
                				void* _t36;
                				void* _t39;
                				void* _t40;
                				void* _t41;
                				void* _t42;
                
                				E0000000113F058610(_t15, __rax, __rcx, _t41, _t42);
                				_t37 = _t36 - __rax;
                				_t22 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t23 = _t22 ^ _t36 - __rax;
                				_a8216 = _t23;
                				r8d = 0x1000;
                				if (GetModuleFileNameW(??, ??, ??) != 0) goto 0x3f052d72;
                				E0000000113F051C80(_t23, "GetModuleFileNameW", "Failed to get executable path.", _t39, _t40);
                				goto 0x3f052d9f;
                				r8d = 0x1000;
                				E0000000113F0555C0(_t17, __rcx, __rcx,  &_a24, _t34, _t35, _t39);
                				if (_t23 != 0) goto 0x3f052d9a;
                				E0000000113F051DD0(_t23, "Failed to convert executable path to UTF-8.",  &_a24, _t39, _t40);
                				goto 0x3f052d9f;
                				return E0000000113F058680(0, _t23, _a8216 ^ _t37);
                			}















                0x13f052d27
                0x13f052d2c
                0x13f052d2f
                0x13f052d36
                0x13f052d39
                0x13f052d4b
                0x13f052d59
                0x13f052d69
                0x13f052d70
                0x13f052d72
                0x13f052d80
                0x13f052d88
                0x13f052d91
                0x13f052d98
                0x13f052db7

                APIs
                • GetModuleFileNameW.KERNEL32(?,000000013F052A30), ref: 000000013F052D51
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastMessageModuleName
                • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                • API String ID: 2581892565-482168174
                • Opcode ID: 5c6d75cc4730b95681a5f0ddf4a77b5922be4ab43a4aeae7c68044b380696f15
                • Instruction ID: 900713ace9cfb2c8dbe79098c8d5d90af84942e230fbbef2b9a378df71ee8da5
                • Opcode Fuzzy Hash: 5c6d75cc4730b95681a5f0ddf4a77b5922be4ab43a4aeae7c68044b380696f15
                • Instruction Fuzzy Hash: 6B01A230F18640D5FB289728E84D3D55393AB5C3C4F84043EB84E86697EA9CC34BCB20
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 87%
                			E0000000113F06E644(signed int __edx, void* __eflags, intOrPtr* __rax, long long __rbx, signed char* __rcx, long long __rbp, long long _a8, char _a16, long long _a24) {
                				signed int _t43;
                				signed int _t57;
                				signed int _t73;
                				void* _t96;
                				signed int _t106;
                
                				_a8 = __rbx;
                				_a24 = __rbp;
                				 *__rcx = 0;
                				r14d = r9d;
                				_t73 = __edx;
                				if (__eflags == 0) goto 0x3f06e6b9;
                				if (__eflags == 0) goto 0x3f06e695;
                				if ((__edx & 0x00000003) - 1 == 1) goto 0x3f06e68e;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e6be;
                				goto 0x3f06e6be;
                				asm("sbb ecx, ecx");
                				goto 0x3f06e6be;
                				__rcx[4] = 0x80000000;
                				_t43 = _t73 & 0x00000700;
                				if ((dil & 0x00000008) == 0) goto 0x3f06e72d;
                				if (_t43 == 0x100) goto 0x3f06e726;
                				if (_t43 == 0x200) goto 0x3f06e71f;
                				if (_t43 == 0x300) goto 0x3f06e718;
                				if (_t43 == 0x400) goto 0x3f06e72d;
                				if (_t43 == 0x500) goto 0x3f06e711;
                				if (_t43 == 0x600) goto 0x3f06e71f;
                				_t96 = _t43 - 0x700;
                				if (_t96 == 0) goto 0x3f06e711;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				__rcx[8] = 3;
                				if (_t96 == 0) goto 0x3f06e783;
                				if (_t96 == 0) goto 0x3f06e77c;
                				if (_t96 == 0) goto 0x3f06e775;
                				if (_t96 == 0) goto 0x3f06e76e;
                				if (r8d - 0xffffffffffffffe0 == 0x40) goto 0x3f06e760;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e785;
                				sil = __rcx[4] == 0x80000000;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				__rcx[0x14] = __rcx[0x14] & 0x00000000;
                				__rcx[0xc] = 0;
                				__rcx[0x10] = 0x80;
                				if (dil >= 0) goto 0x3f06e79b;
                				 *__rcx =  *__rcx | 0x00000010;
                				if ((0x00008000 & _t73) != 0) goto 0x3f06e7c3;
                				if ((_t73 & 0x00074000) != 0) goto 0x3f06e7c0;
                				if (E0000000113F05F100(__rax,  &_a16) != 0) goto 0x3f06e838;
                				if (_a16 == 0x8000) goto 0x3f06e7c3;
                				 *__rcx =  *__rcx | 0x00000080;
                				if ((0x00000100 & _t73) == 0) goto 0x3f06e7e2;
                				_t57 =  !( *0x3f092118) & r14d;
                				if (_t57 < 0) goto 0x3f06e7e2;
                				__rcx[0x10] = 1;
                				_t106 = dil & 0x00000040;
                				if (_t106 == 0) goto 0x3f06e7f6;
                				asm("bts dword [ebx+0x14], 0x1a");
                				asm("bts dword [ebx+0x4], 0x10");
                				__rcx[0xc] = __rcx[0xc] | 0x00000004;
                				asm("bt edi, 0xc");
                				if (_t106 >= 0) goto 0x3f06e7ff;
                				__rcx[0x10] = __rcx[0x10] | 0x00000100;
                				asm("bt edi, 0xd");
                				if (_t106 >= 0) goto 0x3f06e80a;
                				asm("bts dword [ebx+0x14], 0x19");
                				if ((dil & 0x00000020) == 0) goto 0x3f06e817;
                				asm("bts dword [ebx+0x14], 0x1b");
                				goto 0x3f06e822;
                				if ((dil & 0x00000010) == 0) goto 0x3f06e822;
                				asm("bts dword [ebx+0x14], 0x1c");
                				return _t57;
                			}








                0x13f06e644
                0x13f06e649
                0x13f06e659
                0x13f06e65e
                0x13f06e664
                0x13f06e66e
                0x13f06e673
                0x13f06e678
                0x13f06e67a
                0x13f06e67f
                0x13f06e685
                0x13f06e68c
                0x13f06e693
                0x13f06e6a9
                0x13f06e6b7
                0x13f06e6c0
                0x13f06e6c8
                0x13f06e6ca
                0x13f06e6d1
                0x13f06e6d8
                0x13f06e6df
                0x13f06e6e6
                0x13f06e6ed
                0x13f06e6f4
                0x13f06e6f6
                0x13f06e6f8
                0x13f06e6fa
                0x13f06e6ff
                0x13f06e705
                0x13f06e70f
                0x13f06e716
                0x13f06e71d
                0x13f06e724
                0x13f06e72b
                0x13f06e732
                0x13f06e738
                0x13f06e73d
                0x13f06e742
                0x13f06e747
                0x13f06e74c
                0x13f06e74e
                0x13f06e753
                0x13f06e759
                0x13f06e75e
                0x13f06e768
                0x13f06e76c
                0x13f06e773
                0x13f06e77a
                0x13f06e781
                0x13f06e785
                0x13f06e789
                0x13f06e78c
                0x13f06e796
                0x13f06e798
                0x13f06e7a2
                0x13f06e7aa
                0x13f06e7b8
                0x13f06e7be
                0x13f06e7c0
                0x13f06e7ca
                0x13f06e7d4
                0x13f06e7d9
                0x13f06e7db
                0x13f06e7e2
                0x13f06e7e6
                0x13f06e7e8
                0x13f06e7ed
                0x13f06e7f2
                0x13f06e7f6
                0x13f06e7fa
                0x13f06e7fc
                0x13f06e7ff
                0x13f06e803
                0x13f06e805
                0x13f06e80e
                0x13f06e810
                0x13f06e815
                0x13f06e81b
                0x13f06e81d
                0x13f06e837

                APIs
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo$_get_daylight
                • String ID:
                • API String ID: 72036449-0
                • Opcode ID: ef77394652ea48f6e9b02221a271bf5ee5cd757e95e4ca21a70a10eec1c0cfb4
                • Instruction ID: 034fb7055e89b907d4426a7fca59f11b2902124844c7c6265c00093198928d24
                • Opcode Fuzzy Hash: ef77394652ea48f6e9b02221a271bf5ee5cd757e95e4ca21a70a10eec1c0cfb4
                • Instruction Fuzzy Hash: 20519C36E0475086F77D5B2CD4053EA6692E340734F39803DFA468B2D7D63CCB42969A
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 57%
                			E0000000113F05C28C(signed int __edi, intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, long long _a16, long long _a24) {
                				void* __rdi;
                				void* __rsi;
                				unsigned int _t89;
                				signed int _t99;
                				signed int _t107;
                				signed int _t109;
                				signed int _t111;
                				signed int _t115;
                				unsigned int _t124;
                				intOrPtr* _t140;
                				intOrPtr _t155;
                				void* _t160;
                				signed int _t161;
                				void* _t167;
                
                				_t140 = __rax;
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_t115 = __edi | 0xffffffff;
                				if ( *((intOrPtr*)(__rcx + 0x468)) == _t161) goto 0x3f05c4f3;
                				if ( *(__rcx + 0x18) != _t161) goto 0x3f05c2d0;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05c4e0;
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) == 2) goto 0x3f05c4dd;
                				 *((intOrPtr*)(__rcx + 0x50)) = 0;
                				 *(__rcx + 0x2c) = 0;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x18) =  &(( *(__rcx + 0x18))[1]);
                				if ( *(__rcx + 0x28) < 0) goto 0x3f05c4ca;
                				if (( *(__rcx + 0x42) & 0xffff) - 0x20 - 0x5a > 0) goto 0x3f05c32c;
                				asm("lfence");
                				goto 0x3f05c32e;
                				_t89 = ( *(__rax + 0x3f077c40) & 0x000000ff) >> 4;
                				 *(__rcx + 0x2c) = _t89;
                				if (_t89 == 8) goto 0x3f05c4f3;
                				_t124 = _t89;
                				if (_t124 == 0) goto 0x3f05c45c;
                				if (_t124 == 0) goto 0x3f05c448;
                				if (_t124 == 0) goto 0x3f05c403;
                				if (_t124 == 0) goto 0x3f05c3d1;
                				if (_t124 == 0) goto 0x3f05c3c9;
                				if (_t124 == 0) goto 0x3f05c398;
                				if (_t124 == 0) goto 0x3f05c38b;
                				if (_t89 - 0xfffffffffffffffc != 1) goto 0x3f05c503;
                				E0000000113F05CB98(__rcx, __rcx, _t161, __rbp, _t167);
                				goto 0x3f05c4ad;
                				E0000000113F05C798(_t140, __rcx);
                				goto 0x3f05c4ad;
                				if ( *(__rcx + 0x42) == 0x2a) goto 0x3f05c3b0;
                				E0000000113F05BFDC(_t140, __rcx, __rcx, __rcx + 0x38, _t160, _t161);
                				goto 0x3f05c4ad;
                				 *((long long*)(__rcx + 0x20)) =  *((long long*)(__rcx + 0x20)) + 8;
                				_t107 =  *( *((intOrPtr*)(__rcx + 0x20)) - 8);
                				_t108 =  <  ? _t115 : _t107;
                				 *(__rcx + 0x38) =  <  ? _t115 : _t107;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x38) = 0;
                				goto 0x3f05c4b1;
                				if ( *(__rcx + 0x42) == 0x2a) goto 0x3f05c3de;
                				goto 0x3f05c3a3;
                				 *((long long*)(__rcx + 0x20)) =  *((long long*)(__rcx + 0x20)) + 8;
                				_t109 =  *( *((intOrPtr*)(__rcx + 0x20)) - 8);
                				 *(__rcx + 0x34) = _t109;
                				if (_t109 >= 0) goto 0x3f05c4ab;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000004;
                				 *(__rcx + 0x34) =  ~_t109;
                				goto 0x3f05c4ab;
                				_t99 =  *(__rcx + 0x42) & 0x0000ffff;
                				if (_t99 == 0x20) goto 0x3f05c442;
                				if (_t99 == 0x23) goto 0x3f05c43d;
                				if (_t99 == 0x2b) goto 0x3f05c437;
                				if (_t99 == 0x2d) goto 0x3f05c431;
                				if (_t99 != 0x30) goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000008;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000004;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000001;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000020;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000002;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) = _t161;
                				 *((intOrPtr*)(__rcx + 0x40)) = sil;
                				 *(__rcx + 0x38) = _t115;
                				 *((intOrPtr*)(__rcx + 0x3c)) = 0;
                				 *((intOrPtr*)(__rcx + 0x54)) = sil;
                				goto 0x3f05c4b1;
                				 *((char*)(__rcx + 0x54)) = 1;
                				_t155 =  *((intOrPtr*)(__rcx + 0x468));
                				if ( *((intOrPtr*)(_t155 + 0x10)) !=  *((intOrPtr*)(_t155 + 8))) goto 0x3f05c485;
                				if ( *((intOrPtr*)(_t155 + 0x18)) == sil) goto 0x3f05c480;
                				 *(__rcx + 0x28) =  *(__rcx + 0x28) + 1;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x28) = _t115;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x28) =  *(__rcx + 0x28) + 1;
                				 *((long long*)( *((intOrPtr*)(__rcx + 0x468)) + 0x10)) =  *((long long*)( *((intOrPtr*)(__rcx + 0x468)) + 0x10)) + 1;
                				 *((short*)( *((intOrPtr*)( *((intOrPtr*)(__rcx + 0x468)))))) =  *(__rcx + 0x42) & 0x0000ffff;
                				 *((long long*)( *((intOrPtr*)(__rcx + 0x468)))) =  *((long long*)( *((intOrPtr*)(__rcx + 0x468)))) + 2;
                				if (1 == 0) goto 0x3f05c503;
                				_t111 =  *( *(__rcx + 0x18)) & 0x0000ffff;
                				 *(__rcx + 0x42) = _t111;
                				if (_t111 != 0) goto 0x3f05c2fa;
                				 *(__rcx + 0x18) =  &(( *(__rcx + 0x18))[1]);
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) != 2) goto 0x3f05c2ef;
                				return  *(__rcx + 0x28);
                			}

















                0x13f05c28c
                0x13f05c28c
                0x13f05c291
                0x13f05c29e
                0x13f05c2ad
                0x13f05c2b7
                0x13f05c2b9
                0x13f05c2be
                0x13f05c2c4
                0x13f05c2cb
                0x13f05c2d0
                0x13f05c2dd
                0x13f05c2ef
                0x13f05c2f2
                0x13f05c2f5
                0x13f05c2fa
                0x13f05c302
                0x13f05c319
                0x13f05c31b
                0x13f05c32a
                0x13f05c338
                0x13f05c33b
                0x13f05c341
                0x13f05c347
                0x13f05c349
                0x13f05c352
                0x13f05c35b
                0x13f05c364
                0x13f05c369
                0x13f05c36e
                0x13f05c373
                0x13f05c378
                0x13f05c381
                0x13f05c386
                0x13f05c38e
                0x13f05c393
                0x13f05c39d
                0x13f05c3a6
                0x13f05c3ab
                0x13f05c3b0
                0x13f05c3b9
                0x13f05c3be
                0x13f05c3c1
                0x13f05c3c4
                0x13f05c3c9
                0x13f05c3cc
                0x13f05c3d6
                0x13f05c3dc
                0x13f05c3de
                0x13f05c3e7
                0x13f05c3ea
                0x13f05c3ef
                0x13f05c3f5
                0x13f05c3fb
                0x13f05c3fe
                0x13f05c403
                0x13f05c40a
                0x13f05c410
                0x13f05c416
                0x13f05c41c
                0x13f05c422
                0x13f05c428
                0x13f05c42c
                0x13f05c431
                0x13f05c435
                0x13f05c437
                0x13f05c43b
                0x13f05c43d
                0x13f05c440
                0x13f05c442
                0x13f05c446
                0x13f05c448
                0x13f05c44c
                0x13f05c450
                0x13f05c453
                0x13f05c456
                0x13f05c45a
                0x13f05c460
                0x13f05c464
                0x13f05c473
                0x13f05c479
                0x13f05c47b
                0x13f05c47e
                0x13f05c480
                0x13f05c483
                0x13f05c485
                0x13f05c48f
                0x13f05c49d
                0x13f05c4a7
                0x13f05c4af
                0x13f05c4b5
                0x13f05c4b8
                0x13f05c4bf
                0x13f05c4c5
                0x13f05c4ca
                0x13f05c4d7
                0x13f05c4f2

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: *
                • API String ID: 3215553584-163128923
                • Opcode ID: 3a05c2af0537070f29d44a5f6214136916f455d348a6860d1b37f7f20aacc2e2
                • Instruction ID: 8ca0a015356790495bebd1809ac9f88f7556c3e0fce2248c09c0075059335095
                • Opcode Fuzzy Hash: 3a05c2af0537070f29d44a5f6214136916f455d348a6860d1b37f7f20aacc2e2
                • Instruction Fuzzy Hash: C9717872909610C6EB6C8F3C80487BC37A2F345B5CF54913EEA4A42296D7B4CA8BDB50
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F0670F8(void* __ebx, long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
                				void* _t11;
                				intOrPtr* _t20;
                				intOrPtr* _t34;
                
                				_t20 = _t34;
                				 *((long long*)(_t20 + 8)) = __rbx;
                				 *((long long*)(_t20 + 0x10)) = __rbp;
                				 *((long long*)(_t20 + 0x18)) = __rsi;
                				 *((long long*)(_t20 + 0x20)) = __rdi;
                				r15b = r9b;
                				_t10 =  >  ? __ebx : 0;
                				_t11 = ( >  ? __ebx : 0) + 9;
                				if (__rdx - _t20 > 0) goto 0x3f06715d;
                				E0000000113F05DEB4(_t20);
                				 *_t20 = 0x22;
                				E0000000113F063618();
                				return 0x22;
                			}






                0x13f0670f8
                0x13f0670fb
                0x13f0670ff
                0x13f067103
                0x13f067107
                0x13f067119
                0x13f067122
                0x13f067125
                0x13f06712d
                0x13f06712f
                0x13f067139
                0x13f06713b
                0x13f06715c

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: e+000$gfff
                • API String ID: 3215553584-3030954782
                • Opcode ID: 66d4498feff3d1b45d430b9fd03c668551b6bfd917565881f5e92891cdb99774
                • Instruction ID: 7c922e4687af8dc89b1a765bcc5749056d3c921b569e63bb02eb706fa7aa62e9
                • Opcode Fuzzy Hash: 66d4498feff3d1b45d430b9fd03c668551b6bfd917565881f5e92891cdb99774
                • Instruction Fuzzy Hash: 97512872B147C186E7298F3D99403896B92E381BA0F589239E7984BBD7DF28C546C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 70%
                			E0000000113F053B90(void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long _a16, long long _a24, long long _a32, signed int _a8232, void* _a8248) {
                				void* __rdi;
                				void* _t47;
                				void* _t48;
                				void* _t63;
                				void* _t68;
                				signed long long _t75;
                				intOrPtr* _t77;
                				intOrPtr* _t78;
                				intOrPtr* _t79;
                				intOrPtr* _t80;
                				intOrPtr* _t81;
                				intOrPtr* _t82;
                				intOrPtr _t83;
                				intOrPtr* _t84;
                				intOrPtr* _t85;
                				intOrPtr _t87;
                				void* _t107;
                				void* _t109;
                				void* _t113;
                				void* _t116;
                				void* _t117;
                				void* _t118;
                				void* _t119;
                
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_a32 = __rsi;
                				E0000000113F058610(_t48, __rax, __rcx, _t118, _t119);
                				_t114 = _t113 - __rax;
                				_t75 =  *0x3f082018; // 0x3bece1c8a3ca
                				_a8232 = _t75 ^ _t113 - __rax;
                				_t77 =  *0x3f082b10; // 0x0
                				_t87 =  *((intOrPtr*)(__rcx + 0x10));
                				_t109 = __rcx;
                				 *_t77 = 1;
                				_t78 =  *0x3f082b08; // 0x0
                				 *_t78 = 1;
                				_t79 =  *0x3f082b38; // 0x0
                				 *_t79 = 1;
                				_t80 =  *0x3f082b40; // 0x0
                				 *_t80 = 1;
                				_t81 =  *0x3f082b30; // 0x0
                				 *_t81 = 1;
                				_t82 =  *0x3f082b28; // 0x0
                				 *_t82 = 0;
                				if (_t87 -  *((intOrPtr*)(__rcx + 0x18)) >= 0) goto 0x3f053d63;
                				if ( *((char*)(_t87 + 0x11)) != 0x6f) goto 0x3f053ca0;
                				r8d = 4;
                				_t68 = E0000000113F05B380(_t48, _t87 + 0x12, "pyi-", _t116);
                				if (_t68 == 0) goto 0x3f053ca0;
                				if (_t68 == 0) goto 0x3f053c93;
                				if (_t68 == 0) goto 0x3f053c68;
                				if (_t68 == 0) goto 0x3f053c61;
                				if ( *((char*)(_t87 + 0x12)) - 0x29 != 1) goto 0x3f053ca0;
                				_t83 =  *0x3f082b28; // 0x0
                				goto 0x3f053c9a;
                				goto 0x3f053ca0;
                				r8d = 0x1000;
                				mbstowcs(??, ??, ??);
                				if (_t83 == 0xffffffff) goto 0x3f053d8e;
                				 *0x3f082c20();
                				goto 0x3f053ca0;
                				_t84 =  *0x3f082b18; // 0x0
                				 *_t84 = 1;
                				_t106 = _t87;
                				E0000000113F0516E0(__rcx, _t87);
                				if (_t84 -  *((intOrPtr*)(_t109 + 0x18)) < 0) goto 0x3f053c20;
                				if (1 == 0) goto 0x3f053d63;
                				E0000000113F05B520(0, _t84);
                				E0000000113F05F170(_t47, E0000000113F0628A4(_t84, _t84), 0x8000, _t63, _t84, _t107, _t109);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05F170(_t47, E0000000113F0628A4(_t84, _t84), 0x8000, _t63, _t84, _t107, _t109);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05F640(1, _t84, _t84, _t87, _t116, _t117);
                				E0000000113F05B520(2, _t84);
                				E0000000113F05F640(2, _t84, _t84, _t87, _t116, _t117);
                				E0000000113F05B520(0, _t84);
                				E0000000113F05E914(0, 0, 1, _t84, _t87, _t116);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05E914(1, 0, 1, _t84, _t106, _t116);
                				E0000000113F05B520(2, _t84);
                				E0000000113F05E914(2, 0, 1, _t84, _t106, _t116);
                				_t85 =  *0x3f082b48; // 0x0
                				 *_t85 = 1;
                				return E0000000113F058680(2, _t85, _a8232 ^ _t114);
                			}


























                0x13f053b90
                0x13f053b95
                0x13f053b9a
                0x13f053ba5
                0x13f053baa
                0x13f053bad
                0x13f053bb7
                0x13f053bbf
                0x13f053bc8
                0x13f053bcc
                0x13f053bcf
                0x13f053bd5
                0x13f053bdc
                0x13f053be2
                0x13f053be9
                0x13f053bef
                0x13f053bf6
                0x13f053bfc
                0x13f053c03
                0x13f053c09
                0x13f053c10
                0x13f053c16
                0x13f053c24
                0x13f053c26
                0x13f053c3c
                0x13f053c3e
                0x13f053c47
                0x13f053c4c
                0x13f053c51
                0x13f053c56
                0x13f053c58
                0x13f053c5f
                0x13f053c66
                0x13f053c6c
                0x13f053c77
                0x13f053c80
                0x13f053c8b
                0x13f053c91
                0x13f053c93
                0x13f053c9a
                0x13f053ca0
                0x13f053ca6
                0x13f053cb2
                0x13f053cba
                0x13f053cc2
                0x13f053cd6
                0x13f053ce0
                0x13f053cf4
                0x13f053cfe
                0x13f053d06
                0x13f053d10
                0x13f053d18
                0x13f053d1f
                0x13f053d29
                0x13f053d33
                0x13f053d3d
                0x13f053d47
                0x13f053d51
                0x13f053d56
                0x13f053d5d
                0x13f053d8d

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: mbstowcs
                • String ID: Failed to convert Wflag %s using mbstowcs (invalid multibyte string)$pyi-
                • API String ID: 103190477-3625900369
                • Opcode ID: e508572e6829ee6ecbdd717d445326794eee15d16bb3e373bb817a5bff238df4
                • Instruction ID: b17e7dfd3d9277c35039fb7a6bf9c22e737abadca67abf15ed9dbb328fbeb86f
                • Opcode Fuzzy Hash: e508572e6829ee6ecbdd717d445326794eee15d16bb3e373bb817a5bff238df4
                • Instruction Fuzzy Hash: 98513B75A09604C1FB1CAF7DE8593E927A3A784B90F844139FA4D473E7DEB8C6428750
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 54%
                			E0000000113F06162C(void* __ecx, intOrPtr* __rax, long long __rbx, void* __rcx, void* __r8, void* __r12, long long _a8, signed int _a16, signed int _a24, signed int _a32) {
                				long long _v56;
                				void* __rdi;
                				void* __rsi;
                				void* _t30;
                				intOrPtr _t36;
                				intOrPtr _t42;
                				intOrPtr* _t65;
                				long long _t71;
                				void* _t73;
                				long long _t87;
                				signed int _t88;
                				intOrPtr* _t89;
                
                				_t99 = __r12;
                				_t73 = __rcx;
                				_a8 = __rbx;
                				r14d = __ecx;
                				if (__ecx == 0) goto 0x3f06179b;
                				_t2 = _t73 - 1; // -1
                				if (_t2 - 1 <= 0) goto 0x3f06166a;
                				E0000000113F05DEB4(__rax);
                				_t3 = _t88 + 0x16; // 0x16
                				_t42 = _t3;
                				 *__rax = _t42;
                				E0000000113F063618();
                				goto 0x3f06179b;
                				r8d = 0x104;
                				GetModuleFileNameW(??, ??, ??);
                				_t89 =  *0x3f0914b8; // 0x4325d2
                				 *0x3f091490 = 0x3f091510;
                				if (_t89 == 0) goto 0x3f06169a;
                				if ( *_t89 != _t42) goto 0x3f06169d;
                				_t65 =  &_a32;
                				_a24 = _t88;
                				_v56 = _t65;
                				r8d = 0;
                				_a32 = _t88;
                				_t30 = E0000000113F061428(0x3f091510, 0x3f091510, 0x3f091510, _t88, 0x3f091510, __r8,  &_a24, __r12);
                				r8d = 2;
                				E0000000113F0615CC(_t30, _a24, _a32, __r8);
                				_t71 = _t65;
                				if (_t65 != 0) goto 0x3f0616f5;
                				E0000000113F05DEB4(_t65);
                				 *_t65 = 0xc;
                				E0000000113F0636F8(_t65, _a24);
                				goto 0x3f061663;
                				_v56 =  &_a32;
                				E0000000113F061428(_t71, 0x3f091510, _t71, _t88, 0x3f091510, _t65 + _a24 * 8,  &_a24, _t99);
                				if (r14d != 1) goto 0x3f06172d;
                				_t36 = _a24 - 1;
                				 *0x3f0914a8 = _t71;
                				 *0x3f091498 = _t36;
                				goto 0x3f061796;
                				_a16 = _t88;
                				0x3f06a13c();
                				if (_t36 == 0) goto 0x3f06175c;
                				E0000000113F0636F8( &_a32, _a16);
                				_a16 = _t88;
                				E0000000113F0636F8( &_a32, _t71);
                				goto 0x3f06179b;
                				_t87 = _a16;
                				if ( *_t87 == _t88) goto 0x3f061777;
                				if ( *((intOrPtr*)(_t87 + 8)) != _t88) goto 0x3f06176b;
                				 *0x3f091498 = 0;
                				_a16 = _t88;
                				 *0x3f0914a8 = _t87;
                				E0000000113F0636F8(_t87 + 8, _t88 + 1);
                				_a16 = _t88;
                				E0000000113F0636F8(_t87 + 8, _t71);
                				return _t36;
                			}















                0x13f06162c
                0x13f06162c
                0x13f06162c
                0x13f061641
                0x13f061646
                0x13f06164c
                0x13f061652
                0x13f061654
                0x13f061659
                0x13f061659
                0x13f06165c
                0x13f06165e
                0x13f061665
                0x13f061671
                0x13f06167c
                0x13f061682
                0x13f061689
                0x13f061693
                0x13f061698
                0x13f06169d
                0x13f0616a1
                0x13f0616a9
                0x13f0616ae
                0x13f0616b1
                0x13f0616ba
                0x13f0616c3
                0x13f0616d0
                0x13f0616d5
                0x13f0616db
                0x13f0616dd
                0x13f0616e9
                0x13f0616eb
                0x13f0616f0
                0x13f061707
                0x13f06170c
                0x13f061715
                0x13f06171a
                0x13f06171c
                0x13f061723
                0x13f06172b
                0x13f061731
                0x13f061738
                0x13f061741
                0x13f061747
                0x13f06174f
                0x13f061753
                0x13f06175a
                0x13f06175c
                0x13f061769
                0x13f061775
                0x13f061777
                0x13f06177f
                0x13f061783
                0x13f06178a
                0x13f061792
                0x13f061796
                0x13f0617ad

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FileFreeHeapModuleName_invalid_parameter_noinfo
                • String ID: C:\Users\user\Desktop\SecurityUpdate.exe
                • API String ID: 13503096-111689339
                • Opcode ID: 72f97c26e3264610b6cfc9e7643878af920f717dfa8b5473e9cce39c981e866e
                • Instruction ID: b599b36cba377c1dbf4f417d328d13b4f0818505e55c55b6a1414ce9bb6296f3
                • Opcode Fuzzy Hash: 72f97c26e3264610b6cfc9e7643878af920f717dfa8b5473e9cce39c981e866e
                • Instruction Fuzzy Hash: 6B416036A00B1186EB1CDF2DE4417ED27A6E745BE4F65403DFA8A47B97DE34C6868340
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F0652CC(void* __ecx, signed int __edx, void* __edi, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, signed short* __r8, void* __r10, void* __r11, signed long long _a8, signed long long _a16, long long _a24, char _a40, char _a1744, char _a1752, signed int _a5176, void* _a5192) {
                				intOrPtr _v0;
                				signed long long _v8;
                				signed int _t42;
                				signed long long _t63;
                				short* _t68;
                				signed int* _t69;
                				void* _t92;
                				void* _t103;
                				void* _t104;
                
                				_a8 = __rbx;
                				_a24 = __rbp;
                				E0000000113F058610(__ecx, __rax, __rcx, __r10, __r11);
                				_t63 =  *0x3f082018; // 0x3bece1c8a3ca
                				_a5176 = _t63 ^ _t92 - __rax;
                				r14d = r9d;
                				r10d = r10d & 0x0000003f;
                				_t104 = _t103 + __r8;
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x3f0917a0 + (__edx >> 6) * 8));
                				 *((intOrPtr*)(__rcx + 8)) = 0;
                				if (__r8 - _t104 >= 0) goto 0x3f06540d;
                				_t68 =  &_a40;
                				if (__r8 - _t104 >= 0) goto 0x3f065376;
                				_t42 =  *__r8 & 0x0000ffff;
                				if (_t42 != 0xa) goto 0x3f065362;
                				 *_t68 = 0xd;
                				_t69 = _t68 + 2;
                				 *_t69 = _t42;
                				if ( &(_t69[0]) -  &_a1744 < 0) goto 0x3f065344;
                				_a16 = _a16 & 0x00000000;
                				_a8 = _a8 & 0x00000000;
                				_v0 = 0xd55;
                				_v8 =  &_a1752;
                				r9d = 0;
                				E0000000113F0683EC();
                				if (0 == 0) goto 0x3f065405;
                				if (0 == 0) goto 0x3f0653f5;
                				_v8 = _v8 & 0x00000000;
                				r8d = 0;
                				r8d = r8d;
                				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x3f065405;
                				if (0 + _a24 < 0) goto 0x3f0653c2;
                				 *((intOrPtr*)(__rcx + 4)) = __edi - r15d;
                				goto 0x3f065339;
                				 *((intOrPtr*)(__rcx)) = GetLastError();
                				return E0000000113F058680(0, __rcx, _a5176 ^ _t92 - __rax);
                			}












                0x13f0652cc
                0x13f0652d1
                0x13f0652e3
                0x13f0652eb
                0x13f0652f5
                0x13f065306
                0x13f065314
                0x13f065318
                0x13f065330
                0x13f065336
                0x13f065339
                0x13f06533f
                0x13f065347
                0x13f065349
                0x13f065354
                0x13f06535b
                0x13f06535e
                0x13f065362
                0x13f065374
                0x13f065376
                0x13f065381
                0x13f06538f
                0x13f0653a2
                0x13f0653a7
                0x13f0653b1
                0x13f0653ba
                0x13f0653c0
                0x13f0653c2
                0x13f0653d7
                0x13f0653e0
                0x13f0653eb
                0x13f0653f3
                0x13f0653fa
                0x13f065400
                0x13f06540b
                0x13f06543b

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite
                • String ID: U
                • API String ID: 442123175-4171548499
                • Opcode ID: 51937191067bbbf43432886cbd29028088d0a406a78cbc48e1f41c19fca03b89
                • Instruction ID: 069824c9ef20e2fc6927d743dfa267118fc7347394543b4821a25438001c3753
                • Opcode Fuzzy Hash: 51937191067bbbf43432886cbd29028088d0a406a78cbc48e1f41c19fca03b89
                • Instruction Fuzzy Hash: 0141D572B24A5081DB24CF69E8443EA77A2F788B94F554039FE4D87795DB7CC642CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 72%
                			E0000000113F067934(long long __rbx, void* __rdx, long long __rsi, void* __r8, long long _a8, long long _a16) {
                				void* _v8;
                				signed int _v24;
                				short _v550;
                				signed int _v552;
                				void* _t19;
                				void* _t28;
                				void* _t40;
                				signed long long _t56;
                				signed long long _t57;
                				signed short* _t59;
                				signed short* _t61;
                				void* _t70;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t56 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t57 = _t56 ^ _t70 - 0x00000240;
                				_v24 = _t57;
                				_t61 =  &_v552;
                				r8d = 0x20a;
                				E0000000113F0597D0(_t19, 0, _t61, __rdx, __r8);
                				if (GetCurrentDirectoryW(??, ??) - 0x104 > 0) goto 0x3f0679a8;
                				if (_v552 == 0) goto 0x3f067a03;
                				if (_v550 != 0x3a) goto 0x3f067a03;
                				_t39 =  >  ? _v552 & 0x0000ffff : _t61 - 0x20;
                				_t40 = ( >  ? _v552 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				goto 0x3f067a03;
                				E0000000113F063680(_t61 - 0x61, _t61,  &_v552);
                				_t59 = _t57;
                				if (_t57 == 0) goto 0x3f0679d0;
                				if (GetCurrentDirectoryW(??, ??) != 0) goto 0x3f0679dd;
                				E0000000113F05DEB4(_t57);
                				 *_t57 = 0xc;
                				goto 0x3f0679fb;
                				if ( *_t59 == 0) goto 0x3f0679fb;
                				if (_t59[1] != 0x3a) goto 0x3f0679fb;
                				_t43 =  >  ?  *_t59 & 0x0000ffff : _t61 - 0x20;
                				_t44 = ( >  ?  *_t59 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				E0000000113F0636F8(_t57, _t59);
                				_t28 = ( >  ?  *_t59 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				return E0000000113F058680( *_t59 & 0x0000ffff, _t57, _v24 ^ _t70 - 0x00000240);
                			}















                0x13f067934
                0x13f067939
                0x13f067946
                0x13f06794d
                0x13f067950
                0x13f06795a
                0x13f06795f
                0x13f067965
                0x13f06797f
                0x13f067988
                0x13f067990
                0x13f0679a0
                0x13f0679a3
                0x13f0679a6
                0x13f0679b2
                0x13f0679b9
                0x13f0679bf
                0x13f0679ce
                0x13f0679d0
                0x13f0679d5
                0x13f0679db
                0x13f0679e0
                0x13f0679e7
                0x13f0679f5
                0x13f0679f8
                0x13f0679fe
                0x13f067a03
                0x13f067a29

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CurrentDirectory
                • String ID: :
                • API String ID: 1611563598-336475711
                • Opcode ID: 23ca1ea52909aa7aee5cc64832dcf5e81eb024531f16259d61858d4530af65ba
                • Instruction ID: 96541995085515d4a9bf1ffaccf30a561190d61ae6c74918c0230fd9c61208f1
                • Opcode Fuzzy Hash: 23ca1ea52909aa7aee5cc64832dcf5e81eb024531f16259d61858d4530af65ba
                • Instruction Fuzzy Hash: 4A215172A0468081EB289B29D44439D63F3E784B94F55413EEA8943686DFB8CA468A91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E0000000113F051EE0(void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, long long _a8, long long _a16, long long _a24, char _a32, char _a1056, char _a3104, signed int _a5152, char _a5208) {
                				void* __rbx;
                				void* _t19;
                				void* _t20;
                				void* _t27;
                				signed long long _t34;
                				signed long long _t35;
                				void* _t52;
                				void* _t53;
                				void* _t61;
                				void* _t62;
                
                				_t56 = __r8;
                				_a8 = __rcx;
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t19 = E0000000113F058610(_t27, __rax, __rcx, _t61, _t62);
                				_t54 = _t53 - __rax;
                				_t34 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t35 = _t34 ^ _t53 - __rax;
                				_a5152 = _t35;
                				_t36 = __rcx;
                				_t20 = E0000000113F051B20(_t19);
                				_a24 =  &_a5208;
                				_a16 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				r8d = 0x800;
                				E0000000113F0597D0(_t20, 0,  &_a1056,  &_a32, __r8);
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, __rcx,  &_a3104,  &_a32, _t52, __r8);
                				if (_t35 == 0) goto 0x3f051fb9;
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, _t36,  &_a1056, "Error detected", _t52, _t56);
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051fd3;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t35, _a5152 ^ _t54);
                			}













                0x13f051ee0
                0x13f051ee0
                0x13f051ee5
                0x13f051eea
                0x13f051eef
                0x13f051efb
                0x13f051f00
                0x13f051f03
                0x13f051f0a
                0x13f051f0d
                0x13f051f15
                0x13f051f20
                0x13f051f25
                0x13f051f32
                0x13f051f3b
                0x13f051f48
                0x13f051f57
                0x13f051f5d
                0x13f051f62
                0x13f051f75
                0x13f051f7d
                0x13f051f7f
                0x13f051f94
                0x13f051f99
                0x13f051fb1
                0x13f051fb7
                0x13f051fb9
                0x13f051fcd
                0x13f051fec

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: Error detected
                • API String ID: 1878133881-3513342764
                • Opcode ID: bb397e3570bded85acc4c3d56a73b19ee45e6fec8bd3e0b3078de3b06422ac8b
                • Instruction ID: 73abf9b3e06ad768e7d5ea402fca8955cbf9cbf5c3d805d6c224861a4b34b63b
                • Opcode Fuzzy Hash: bb397e3570bded85acc4c3d56a73b19ee45e6fec8bd3e0b3078de3b06422ac8b
                • Instruction Fuzzy Hash: 4221717272968481EB24DB18F4557DA63A5F784788F80512ABA8D47A9ADF7CC30ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E0000000113F051DD0(void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, long long _a8, long long _a16, long long _a24, char _a32, char _a1056, char _a3104, signed int _a5152, char _a5208) {
                				void* __rbx;
                				void* _t19;
                				void* _t20;
                				void* _t27;
                				signed long long _t34;
                				signed long long _t35;
                				void* _t52;
                				void* _t53;
                				void* _t61;
                				void* _t62;
                
                				_t56 = __r8;
                				_a8 = __rcx;
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t19 = E0000000113F058610(_t27, __rax, __rcx, _t61, _t62);
                				_t54 = _t53 - __rax;
                				_t34 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t35 = _t34 ^ _t53 - __rax;
                				_a5152 = _t35;
                				_t36 = __rcx;
                				_t20 = E0000000113F051B20(_t19);
                				_a24 =  &_a5208;
                				_a16 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				r8d = 0x800;
                				E0000000113F0597D0(_t20, 0,  &_a1056,  &_a32, __r8);
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, __rcx,  &_a3104,  &_a32, _t52, __r8);
                				if (_t35 == 0) goto 0x3f051ea9;
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, _t36,  &_a1056, "Fatal error detected", _t52, _t56);
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051ec3;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t35, _a5152 ^ _t54);
                			}













                0x13f051dd0
                0x13f051dd0
                0x13f051dd5
                0x13f051dda
                0x13f051ddf
                0x13f051deb
                0x13f051df0
                0x13f051df3
                0x13f051dfa
                0x13f051dfd
                0x13f051e05
                0x13f051e10
                0x13f051e15
                0x13f051e22
                0x13f051e2b
                0x13f051e38
                0x13f051e47
                0x13f051e4d
                0x13f051e52
                0x13f051e65
                0x13f051e6d
                0x13f051e6f
                0x13f051e84
                0x13f051e89
                0x13f051ea1
                0x13f051ea7
                0x13f051ea9
                0x13f051ebd
                0x13f051edc

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: Fatal error detected
                • API String ID: 1878133881-4025702859
                • Opcode ID: 2c3a763c668417d4cfdb2ffe35055d171e815e9b941d9dedd0c637aab3a95fdb
                • Instruction ID: b5b7de5813de4a5a98dc1c2aecc6e558df2393103c8d44e99a2f257e88d90cd9
                • Opcode Fuzzy Hash: 2c3a763c668417d4cfdb2ffe35055d171e815e9b941d9dedd0c637aab3a95fdb
                • Instruction Fuzzy Hash: D6218672629784C1FB349B14F4557DA63A5F784788F805129BA8D47A96DF7CC30ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 20%
                			E0000000113F065DC0(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, void* __r8, long long _a8, long long _a16, long long _a24, long long _a40, intOrPtr _a48, long long _a56, long long _a64, long long _a72) {
                				long long _v24;
                				long long _v32;
                				long long _v40;
                				intOrPtr _v48;
                				long long _v56;
                				void* _t26;
                				void* _t38;
                				void* _t53;
                
                				_t40 = __rbx;
                				_t38 = __rax;
                				_a8 = __rbx;
                				_a16 = __rbp;
                				_a24 = __rsi;
                				_t26 = r9d;
                				_t53 = __rcx;
                				E0000000113F065B5C(1, __rbx, "CompareStringEx", __rsi, 0x3f078600, "CompareStringEx");
                				if (_t38 == 0) goto 0x3f065e55;
                				r9d = _t26;
                				_v24 = _a72;
                				_v32 = _a64;
                				_v40 = _a56;
                				_v48 = _a48;
                				_v56 = _a40;
                				 *0x3f072350();
                				goto 0x3f065e87;
                				E0000000113F066108(0, 0, _t38, _t40, _t53);
                				r9d = _t26;
                				_v48 = _a48;
                				_v56 = _a40;
                				return CompareStringW(??, ??, ??, ??, ??, ??);
                			}











                0x13f065dc0
                0x13f065dc0
                0x13f065dc0
                0x13f065dc5
                0x13f065dca
                0x13f065dd4
                0x13f065de3
                0x13f065df9
                0x13f065e01
                0x13f065e0b
                0x13f065e18
                0x13f065e20
                0x13f065e2d
                0x13f065e39
                0x13f065e45
                0x13f065e4d
                0x13f065e53
                0x13f065e5a
                0x13f065e61
                0x13f065e6e
                0x13f065e7c
                0x13f065e9b

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CompareStringtry_get_function
                • String ID: CompareStringEx
                • API String ID: 3328479835-2590796910
                • Opcode ID: 2051346f2dff1739ac3aa9ce91246bca6dac596dfde56006ceca8fa98f81a75a
                • Instruction ID: e4bdddcd98857513acbbb157497b3406b7a865e22c4c4f2303f31e2edfcad815
                • Opcode Fuzzy Hash: 2051346f2dff1739ac3aa9ce91246bca6dac596dfde56006ceca8fa98f81a75a
                • Instruction Fuzzy Hash: A0115E32608B8086D764CF5AF48039AB7A6F7C9B90F54412AFECD43B1ADF38C5458B00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 79%
                			E0000000113F068344(void* __ecx) {
                				signed int _v16;
                				short _v18;
                				intOrPtr _v22;
                				short _v24;
                				void* _t20;
                				signed long long _t26;
                				signed long long _t27;
                				signed long long _t32;
                
                				_t20 = __ecx;
                				_t26 =  *0x3f082018; // 0x3bece1c8a3ca
                				_t27 = _t26 ^ _t32;
                				_v16 = _t27;
                				if (__ecx - 0x1a <= 0) goto 0x3f06837d;
                				E0000000113F05DE94(_t27);
                				 *_t27 = 0xf;
                				E0000000113F05DEB4(_t27);
                				 *_t27 = 0xd;
                				E0000000113F063618();
                				goto 0x3f0683b1;
                				if (_t20 != 0) goto 0x3f068388;
                				goto 0x3f0683b1;
                				_v22 = 0x5c003a;
                				_v24 = _t20 + 0x40;
                				_v18 = 0;
                				GetDriveTypeW(??);
                				return E0000000113F058680(_t20 + 0x40, _t27, _v16 ^ _t32);
                			}











                0x13f068344
                0x13f06834a
                0x13f068351
                0x13f068354
                0x13f06835c
                0x13f06835e
                0x13f068363
                0x13f068369
                0x13f06836e
                0x13f068374
                0x13f06837b
                0x13f068381
                0x13f068386
                0x13f06838c
                0x13f068394
                0x13f06839e
                0x13f0683a3
                0x13f0683c3

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: :
                • API String ID: 3215553584-336475711
                • Opcode ID: 67ad9f7b692f4407f001fef7da25d2cae8c087c07c9502c1b1a769e3ef848532
                • Instruction ID: 569660bef6bebfce9c0bf42320fc39362dee036f27d66813591241dca6be0ffd
                • Opcode Fuzzy Hash: 67ad9f7b692f4407f001fef7da25d2cae8c087c07c9502c1b1a769e3ef848532
                • Instruction Fuzzy Hash: EA01D172918250C2F738AF6895953DE73A2EB58354F94043EF94E42797D73CC7068A14
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F065FC8(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long _a8, long long _a16) {
                				void* _t15;
                
                				_t15 = __rax;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				E0000000113F065B5C(0x12, __rbx, "InitializeCriticalSectionEx", __rsi, 0x3f078638, 0x3f078640);
                				if (_t15 == 0) goto 0x3f066013;
                				 *0x3f072350();
                				goto 0x3f066019;
                				return InitializeCriticalSectionAndSpinCount(??, ??);
                			}




                0x13f065fc8
                0x13f065fc8
                0x13f065fcd
                0x13f065ff9
                0x13f066006
                0x13f06600b
                0x13f066011
                0x13f066028

                APIs
                • try_get_function.LIBVCRUNTIME ref: 000000013F065FF9
                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,-00000018,000000013F063A9A,?,?,?,000000013F063992,?,?,?,000000013F05EE82,?,?,?,000000013F052E89), ref: 000000013F066013
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CountCriticalInitializeSectionSpintry_get_function
                • String ID: InitializeCriticalSectionEx
                • API String ID: 539475747-3084827643
                • Opcode ID: a4b8079536662c4a47836a92d4af9fc3a0f3d512cb0c2c90dc2c1a3b8a1f2104
                • Instruction ID: d82f0a6ca4d6af4324d0f14adc3cb5e736c3872bb94c03f7e1290e44a2ff2469
                • Opcode Fuzzy Hash: a4b8079536662c4a47836a92d4af9fc3a0f3d512cb0c2c90dc2c1a3b8a1f2104
                • Instruction Fuzzy Hash: 1BF05E31A0469091FB1C9B99E5403DA6362E748BA0F58507DBA5907B56CE38CA9A8740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F065F74(void* __ecx, void* __eflags, void* __rax, long long __rbx, void* __rdx, long long _a8) {
                				void* _t12;
                				void* _t19;
                
                				_t12 = __rax;
                				_a8 = __rbx;
                				E0000000113F065B5C(6, __rdx, "FlsSetValue", _t19, 0x3f078630, 0x3f078638);
                				if (_t12 == 0) goto 0x3f065fb4;
                				 *0x3f072350();
                				goto 0x3f065fba;
                				return TlsSetValue(??, ??);
                			}





                0x13f065f74
                0x13f065f74
                0x13f065f9d
                0x13f065faa
                0x13f065fac
                0x13f065fb2
                0x13f065fc4

                APIs
                • try_get_function.LIBVCRUNTIME ref: 000000013F065F9D
                • TlsSetValue.KERNEL32(?,?,00000000,000000013F066B62,?,?,00000000,000000013F05DEBD,?,?,?,?,000000013F06371D), ref: 000000013F065FB4
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.1002347764.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000001.00000002.1002331219.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002394177.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002414162.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000001.00000002.1002438089.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Valuetry_get_function
                • String ID: FlsSetValue
                • API String ID: 738293619-3750699315
                • Opcode ID: c14831855c825cdc936e457e28e4dd95bd183854e956f779fec1469deb181833
                • Instruction ID: 4b5c75a8f37e851405fb8e9bc627fe7a014352243dae79f7d0dabb0e3436bcf7
                • Opcode Fuzzy Hash: c14831855c825cdc936e457e28e4dd95bd183854e956f779fec1469deb181833
                • Instruction Fuzzy Hash: 29E06D71A01640D1EA0C5B99E9447E96363FB48B90F68407EB9590A296CE38CA5AC600
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:9.6%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:1719
                Total number of Limit Nodes:32
                execution_graph 15724 13f05a9ac 15725 13f05a9f1 15724->15725 15726 13f05a9ce 15724->15726 15725->15726 15728 13f05a9f6 15725->15728 15727 13f05deb4 _set_errno_from_matherr 13 API calls 15726->15727 15729 13f05a9d3 15727->15729 15737 13f05b590 EnterCriticalSection 15728->15737 15731 13f063618 _invalid_parameter_noinfo 30 API calls 15729->15731 15733 13f05a9de 15731->15733 17060 13f0621b8 17063 13f06213c 17060->17063 17070 13f068a68 EnterCriticalSection 17063->17070 16070 13f05b534 16071 13f05b53f 16070->16071 16079 13f0661d0 16071->16079 16092 13f068a68 EnterCriticalSection 16079->16092 15738 13f05abbc 15739 13f05abf2 15738->15739 15740 13f05abd3 15738->15740 15750 13f05b590 EnterCriticalSection 15739->15750 15741 13f05deb4 _set_errno_from_matherr 13 API calls 15740->15741 15743 13f05abd8 15741->15743 15746 13f063618 _invalid_parameter_noinfo 30 API calls 15743->15746 15748 13f05abe3 15746->15748 13189 13f0647c8 13190 13f0647f1 13189->13190 13191 13f064809 13189->13191 13214 13f05de94 13190->13214 13193 13f064883 13191->13193 13198 13f06483a 13191->13198 13195 13f05de94 _fread_nolock 13 API calls 13193->13195 13197 13f064888 13195->13197 13199 13f05deb4 _set_errno_from_matherr 13 API calls 13197->13199 13213 13f0602d4 EnterCriticalSection 13198->13213 13201 13f064890 13199->13201 13220 13f063618 13201->13220 13212 13f0647fe 13223 13f066b18 GetLastError 13214->13223 13216 13f05de9d 13217 13f05deb4 13216->13217 13218 13f066b18 _invalid_parameter_noinfo 13 API calls 13217->13218 13219 13f05debd 13218->13219 13219->13212 13305 13f063568 13220->13305 13224 13f066b3a 13223->13224 13227 13f066b3f 13223->13227 13246 13f065f2c 13224->13246 13229 13f066b47 SetLastError 13227->13229 13250 13f065f74 13227->13250 13229->13216 13233 13f066b93 13235 13f065f74 _invalid_parameter_noinfo 6 API calls 13233->13235 13234 13f066b83 13236 13f065f74 _invalid_parameter_noinfo 6 API calls 13234->13236 13238 13f066b9b 13235->13238 13237 13f066b8a 13236->13237 13262 13f0636f8 13237->13262 13239 13f066bb1 13238->13239 13240 13f066b9f 13238->13240 13267 13f06674c 13239->13267 13242 13f065f74 _invalid_parameter_noinfo 6 API calls 13240->13242 13242->13237 13272 13f065b5c 13246->13272 13251 13f065b5c try_get_function 5 API calls 13250->13251 13252 13f065fa2 13251->13252 13253 13f065fb4 TlsSetValue 13252->13253 13254 13f065fac 13252->13254 13253->13254 13254->13229 13255 13f063680 13254->13255 13261 13f063691 _invalid_parameter_noinfo 13255->13261 13256 13f0636e2 13258 13f05deb4 _set_errno_from_matherr 12 API calls 13256->13258 13257 13f0636c6 RtlAllocateHeap 13259 13f0636e0 13257->13259 13257->13261 13258->13259 13259->13233 13259->13234 13261->13256 13261->13257 13282 13f06b7dc 13261->13282 13263 13f0636fd HeapFree 13262->13263 13265 13f06372f 13262->13265 13264 13f063718 13263->13264 13263->13265 13266 13f05deb4 _set_errno_from_matherr 12 API calls 13264->13266 13265->13229 13266->13265 13291 13f066624 13267->13291 13273 13f065bbd TlsGetValue 13272->13273 13280 13f065bb8 try_get_function 13272->13280 13274 13f065bec LoadLibraryExW 13276 13f065c0d GetLastError 13274->13276 13274->13280 13275 13f065ca0 13275->13273 13277 13f065cae GetProcAddress 13275->13277 13276->13280 13278 13f065cbf 13277->13278 13278->13273 13279 13f065c85 FreeLibrary 13279->13280 13280->13273 13280->13274 13280->13275 13280->13279 13281 13f065c47 LoadLibraryExW 13280->13281 13281->13280 13285 13f06b80c 13282->13285 13290 13f068a68 EnterCriticalSection 13285->13290 13303 13f068a68 EnterCriticalSection 13291->13303 13306 13f066b18 _invalid_parameter_noinfo 13 API calls 13305->13306 13307 13f06358d 13306->13307 13308 13f06359e 13307->13308 13313 13f063638 IsProcessorFeaturePresent 13307->13313 13308->13212 13314 13f06364b 13313->13314 13317 13f063404 13314->13317 13318 13f06343e __scrt_fastfail __scrt_get_show_window_mode 13317->13318 13319 13f063466 RtlCaptureContext RtlLookupFunctionEntry 13318->13319 13320 13f0634d6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13319->13320 13321 13f0634a0 RtlVirtualUnwind 13319->13321 13323 13f063528 __scrt_fastfail 13320->13323 13321->13320 13325 13f058680 13323->13325 13326 13f05868a 13325->13326 13327 13f058696 GetCurrentProcess TerminateProcess 13326->13327 13328 13f058944 IsProcessorFeaturePresent 13326->13328 13329 13f05895b 13328->13329 13334 13f058b38 RtlCaptureContext 13329->13334 13335 13f058b52 RtlLookupFunctionEntry 13334->13335 13336 13f058b68 RtlVirtualUnwind 13335->13336 13337 13f05896e 13335->13337 13336->13335 13336->13337 13338 13f058910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13337->13338 13339 13f058788 13364 13f058be8 13339->13364 13342 13f0588d4 13443 13f058f14 IsProcessorFeaturePresent 13342->13443 13343 13f0587a4 __scrt_acquire_startup_lock 13345 13f0588de 13343->13345 13347 13f0587c2 13343->13347 13346 13f058f14 __scrt_fastfail 7 API calls 13345->13346 13351 13f0588e9 13346->13351 13355 13f058804 __scrt_release_startup_lock 13347->13355 13372 13f061e14 13347->13372 13350 13f0587e7 13353 13f05886d 13381 13f059060 13353->13381 13355->13353 13432 13f0620f4 13355->13432 13356 13f058872 13384 13f051000 13356->13384 13361 13f058895 13361->13351 13439 13f058d7c 13361->13439 13450 13f0591dc 13364->13450 13367 13f058c17 13452 13f0627b8 13367->13452 13368 13f05879c 13368->13342 13368->13343 13374 13f061e27 13372->13374 13373 13f0587e3 13373->13350 13377 13f061db0 13373->13377 13374->13373 13793 13f05b400 13374->13793 13805 13f0586a4 13374->13805 13378 13f061de5 13377->13378 13379 13f061dff 13377->13379 13378->13379 13888 13f05876c 13378->13888 13379->13355 13897 13f0597d0 13381->13897 13385 13f05100b 13384->13385 13899 13f055180 13385->13899 13387 13f05101d 13910 13f05e914 13387->13910 13392 13f052abd 13395 13f058680 _wfindfirst32i64 8 API calls 13392->13395 13394 13f052a30 13394->13392 13935 13f054490 13394->13935 13396 13f052ad2 13395->13396 13437 13f0590a4 GetModuleHandleW 13396->13437 13398 13f052a70 13950 13f054af0 13398->13950 13403 13f052ae5 13404 13f052b07 13403->13404 13961 13f052960 13403->13961 13965 13f0554b0 13404->13965 13405 13f0519f0 103 API calls 13406 13f052aa0 13405->13406 13406->13403 13409 13f052aa4 13406->13409 14033 13f051dd0 13409->14033 13411 13f052b1c SetDllDirectoryW 13979 13f05a4f8 13411->13979 13413 13f052bc2 14023 13f052790 13413->14023 13416 13f052bca 13416->13392 14044 13f054a80 13416->14044 13420 13f054490 42 API calls 13423 13f052bff 13420->13423 13422 13f052b30 13422->13392 13985 13f0528d0 13422->13985 13423->13392 13425 13f052c10 13423->13425 14055 13f054b30 13425->14055 13428 13f052c3b 14104 13f051aa0 13428->14104 13433 13f062118 13432->13433 13434 13f06212a 13432->13434 13433->13353 15590 13f062804 13434->15590 13438 13f0590b5 13437->13438 13438->13361 13440 13f058d8d 13439->13440 13441 13f0588ac 13440->13441 13442 13f059dc0 __scrt_initialize_crt 7 API calls 13440->13442 13441->13350 13442->13441 13444 13f058f39 __scrt_fastfail __scrt_get_show_window_mode 13443->13444 13445 13f058f58 RtlCaptureContext RtlLookupFunctionEntry 13444->13445 13446 13f058f81 RtlVirtualUnwind 13445->13446 13447 13f058fbd __scrt_get_show_window_mode 13445->13447 13446->13447 13448 13f058fef IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13447->13448 13449 13f059041 __scrt_fastfail 13448->13449 13449->13345 13451 13f058c0a __scrt_dllmain_crt_thread_attach 13450->13451 13451->13367 13451->13368 13454 13f06b718 13452->13454 13453 13f058c1c 13453->13368 13459 13f059dc0 13453->13459 13454->13453 13465 13f066be4 13454->13465 13472 13f06a7b8 13454->13472 13487 13f064b60 13454->13487 13498 13f06a870 13454->13498 13460 13f059dc8 13459->13460 13461 13f059dd2 13459->13461 13771 13f05a040 13460->13771 13461->13368 13504 13f065e9c 13465->13504 13473 13f06a7db 13472->13473 13474 13f06a7e5 13473->13474 13517 13f068a68 EnterCriticalSection 13473->13517 13476 13f06a857 13474->13476 13508 13f06292c 13474->13508 13476->13454 13580 13f068a68 EnterCriticalSection 13487->13580 13499 13f06a87d 13498->13499 13500 13f06a8c2 13498->13500 13581 13f066a70 13499->13581 13500->13454 13505 13f065b5c try_get_function 5 API calls 13504->13505 13506 13f065ec4 TlsAlloc 13505->13506 13518 13f060770 13508->13518 13544 13f060658 13518->13544 13549 13f068a68 EnterCriticalSection 13544->13549 13582 13f066a81 13581->13582 13586 13f066a86 13581->13586 13583 13f065f2c _invalid_parameter_noinfo 6 API calls 13582->13583 13583->13586 13584 13f065f74 _invalid_parameter_noinfo 6 API calls 13585 13f066aa5 13584->13585 13587 13f066a8e 13585->13587 13588 13f063680 _invalid_parameter_noinfo 13 API calls 13585->13588 13586->13584 13586->13587 13589 13f06292c 33 API calls 13587->13589 13594 13f066b08 13587->13594 13590 13f066ab8 13588->13590 13591 13f066b16 13589->13591 13592 13f066ad6 13590->13592 13593 13f066ac6 13590->13593 13596 13f065f74 _invalid_parameter_noinfo 6 API calls 13592->13596 13595 13f065f74 _invalid_parameter_noinfo 6 API calls 13593->13595 13606 13f06a5f4 13594->13606 13597 13f066acd 13595->13597 13598 13f066ade 13596->13598 13602 13f0636f8 __free_lconv_mon 13 API calls 13597->13602 13599 13f066af4 13598->13599 13600 13f066ae2 13598->13600 13601 13f06674c _invalid_parameter_noinfo 13 API calls 13599->13601 13603 13f065f74 _invalid_parameter_noinfo 6 API calls 13600->13603 13604 13f066afc 13601->13604 13602->13587 13603->13597 13605 13f0636f8 __free_lconv_mon 13 API calls 13604->13605 13605->13587 13607 13f06a7b8 43 API calls 13606->13607 13608 13f06a61d 13607->13608 13624 13f06a300 13608->13624 13611 13f06a637 13611->13500 13613 13f06a6e3 13615 13f0636f8 __free_lconv_mon 13 API calls 13613->13615 13615->13611 13618 13f06a6de 13619 13f05deb4 _set_errno_from_matherr 13 API calls 13618->13619 13619->13613 13620 13f06a740 13620->13613 13649 13f06a144 13620->13649 13621 13f06a703 13621->13620 13622 13f0636f8 __free_lconv_mon 13 API calls 13621->13622 13622->13620 13664 13f05be30 13624->13664 13627 13f06a332 13629 13f06a337 GetACP 13627->13629 13630 13f06a347 13627->13630 13628 13f06a320 GetOEMCP 13628->13630 13629->13630 13630->13611 13631 13f063738 13630->13631 13632 13f063783 13631->13632 13636 13f063747 _invalid_parameter_noinfo 13631->13636 13633 13f05deb4 _set_errno_from_matherr 13 API calls 13632->13633 13635 13f063781 13633->13635 13634 13f06376a RtlAllocateHeap 13634->13635 13634->13636 13635->13613 13638 13f06a8ec 13635->13638 13636->13632 13636->13634 13637 13f06b7dc _invalid_parameter_noinfo 2 API calls 13636->13637 13637->13636 13639 13f06a300 35 API calls 13638->13639 13640 13f06a917 13639->13640 13641 13f06a954 IsValidCodePage 13640->13641 13646 13f06a997 __scrt_get_show_window_mode 13640->13646 13644 13f06a965 13641->13644 13641->13646 13642 13f058680 _wfindfirst32i64 8 API calls 13643 13f06a6d7 13642->13643 13643->13618 13643->13621 13645 13f06a99c GetCPInfo 13644->13645 13648 13f06a96e __scrt_get_show_window_mode 13644->13648 13645->13646 13645->13648 13646->13642 13696 13f06a410 13648->13696 13770 13f068a68 EnterCriticalSection 13649->13770 13665 13f05be54 13664->13665 13671 13f05be4f 13664->13671 13666 13f06699c 33 API calls 13665->13666 13665->13671 13667 13f05be6f 13666->13667 13672 13f066c44 13667->13672 13671->13627 13671->13628 13673 13f05be92 13672->13673 13674 13f066c59 13672->13674 13676 13f066c78 13673->13676 13674->13673 13680 13f06b584 13674->13680 13677 13f066ca0 13676->13677 13678 13f066c8d 13676->13678 13677->13671 13678->13677 13693 13f06a8d0 13678->13693 13681 13f06699c 33 API calls 13680->13681 13682 13f06b593 13681->13682 13683 13f06b5dc 13682->13683 13692 13f068a68 EnterCriticalSection 13682->13692 13683->13673 13694 13f06699c 33 API calls 13693->13694 13695 13f06a8d9 13694->13695 13697 13f06a44d GetCPInfo 13696->13697 13706 13f06a545 13696->13706 13698 13f06a460 13697->13698 13697->13706 13707 13f06b0c0 13698->13707 13699 13f058680 _wfindfirst32i64 8 API calls 13701 13f06a5de 13699->13701 13701->13646 13706->13699 13708 13f05be30 33 API calls 13707->13708 13709 13f06b102 13708->13709 13727 13f067c10 13709->13727 13728 13f067c18 MultiByteToWideChar 13727->13728 13772 13f05a04f 13771->13772 13773 13f059dcd 13771->13773 13779 13f05a264 13772->13779 13775 13f05a098 13773->13775 13776 13f05a0c3 13775->13776 13777 13f05a0a6 DeleteCriticalSection 13776->13777 13778 13f05a0c7 13776->13778 13777->13776 13778->13461 13783 13f05a0d0 13779->13783 13784 13f05a1f5 TlsFree 13783->13784 13791 13f05a113 try_get_function 13783->13791 13785 13f05a140 LoadLibraryExW 13787 13f05a1b7 13785->13787 13788 13f05a161 GetLastError 13785->13788 13786 13f05a1d7 GetProcAddress 13786->13784 13790 13f05a1e8 13786->13790 13787->13786 13789 13f05a1ce FreeLibrary 13787->13789 13788->13791 13789->13786 13790->13784 13791->13784 13791->13785 13791->13786 13792 13f05a183 LoadLibraryExW 13791->13792 13792->13787 13792->13791 13794 13f05b42a 13793->13794 13795 13f063680 _invalid_parameter_noinfo 13 API calls 13794->13795 13796 13f05b449 13795->13796 13797 13f0636f8 __free_lconv_mon 13 API calls 13796->13797 13798 13f05b457 13797->13798 13799 13f063680 _invalid_parameter_noinfo 13 API calls 13798->13799 13803 13f05b481 13798->13803 13800 13f05b473 13799->13800 13802 13f0636f8 __free_lconv_mon 13 API calls 13800->13802 13802->13803 13804 13f05b48a 13803->13804 13822 13f065fc8 13803->13822 13804->13374 13806 13f0586b4 13805->13806 13827 13f05f130 13806->13827 13808 13f0586c0 13833 13f058c34 13808->13833 13810 13f058f14 __scrt_fastfail 7 API calls 13813 13f058759 13810->13813 13811 13f0586d8 _RTC_Initialize 13820 13f05872d 13811->13820 13838 13f058de4 13811->13838 13813->13374 13814 13f0586ed 13841 13f06162c 13814->13841 13820->13810 13821 13f058749 13820->13821 13821->13374 13823 13f065b5c try_get_function 5 API calls 13822->13823 13824 13f065ffe 13823->13824 13825 13f066008 13824->13825 13826 13f066013 InitializeCriticalSectionAndSpinCount 13824->13826 13825->13803 13826->13825 13828 13f05f141 13827->13828 13829 13f05deb4 _set_errno_from_matherr 13 API calls 13828->13829 13830 13f05f149 13828->13830 13831 13f05f158 13829->13831 13830->13808 13832 13f063618 _invalid_parameter_noinfo 30 API calls 13831->13832 13832->13830 13834 13f058c45 13833->13834 13837 13f058c4a __scrt_acquire_startup_lock 13833->13837 13835 13f058f14 __scrt_fastfail 7 API calls 13834->13835 13834->13837 13836 13f058cbe 13835->13836 13837->13811 13867 13f058da8 13838->13867 13840 13f058ded 13840->13814 13842 13f0586f9 13841->13842 13843 13f06164c 13841->13843 13842->13820 13866 13f058eb8 InitializeSListHead 13842->13866 13844 13f061654 13843->13844 13845 13f06166a GetModuleFileNameW 13843->13845 13846 13f05deb4 _set_errno_from_matherr 13 API calls 13844->13846 13849 13f061695 13845->13849 13847 13f061659 13846->13847 13848 13f063618 _invalid_parameter_noinfo 30 API calls 13847->13848 13848->13842 13882 13f0615cc 13849->13882 13852 13f0616dd 13853 13f05deb4 _set_errno_from_matherr 13 API calls 13852->13853 13854 13f0616e2 13853->13854 13857 13f0636f8 __free_lconv_mon 13 API calls 13854->13857 13855 13f061717 13859 13f0636f8 __free_lconv_mon 13 API calls 13855->13859 13856 13f0616f5 13856->13855 13860 13f061743 13856->13860 13861 13f06175c 13856->13861 13858 13f0616f0 13857->13858 13858->13842 13859->13842 13862 13f0636f8 __free_lconv_mon 13 API calls 13860->13862 13863 13f0636f8 __free_lconv_mon 13 API calls 13861->13863 13864 13f06174c 13862->13864 13863->13855 13865 13f0636f8 __free_lconv_mon 13 API calls 13864->13865 13865->13858 13868 13f058dc2 13867->13868 13870 13f058dbb 13867->13870 13871 13f062644 13868->13871 13870->13840 13874 13f062290 13871->13874 13881 13f068a68 EnterCriticalSection 13874->13881 13883 13f0615e4 13882->13883 13887 13f06161c 13882->13887 13884 13f063680 _invalid_parameter_noinfo 13 API calls 13883->13884 13883->13887 13885 13f061612 13884->13885 13886 13f0636f8 __free_lconv_mon 13 API calls 13885->13886 13886->13887 13887->13852 13887->13856 13896 13f0590f8 SetUnhandledExceptionFilter 13888->13896 13898 13f059077 GetStartupInfoW 13897->13898 13898->13356 13900 13f05519f 13899->13900 13901 13f0551a7 13900->13901 13902 13f0551f0 WideCharToMultiByte 13900->13902 13903 13f055297 13900->13903 13905 13f055246 WideCharToMultiByte 13900->13905 13901->13387 13902->13900 13902->13903 14112 13f051c80 13903->14112 13905->13900 13905->13903 13906 13f0552c3 13907 13f0552e1 13906->13907 13909 13f05a4f8 __vcrt_freefls 14 API calls 13906->13909 13908 13f05a4f8 __vcrt_freefls 14 API calls 13907->13908 13908->13901 13909->13906 13911 13f068020 13910->13911 13912 13f0680a3 13911->13912 13915 13f068064 13911->13915 13913 13f05deb4 _set_errno_from_matherr 13 API calls 13912->13913 13914 13f0680a8 13913->13914 13916 13f063618 _invalid_parameter_noinfo 30 API calls 13914->13916 14141 13f067f00 13915->14141 13917 13f052a10 13916->13917 13919 13f051ae0 13917->13919 13920 13f051af5 13919->13920 13922 13f051b10 13920->13922 14149 13f051b30 13920->14149 13922->13392 13923 13f052d20 13922->13923 13924 13f058610 13923->13924 13925 13f052d2c GetModuleFileNameW 13924->13925 13926 13f052d72 13925->13926 13927 13f052d5b 13925->13927 14185 13f0555c0 13926->14185 13928 13f051c80 16 API calls 13927->13928 13930 13f052d6e 13928->13930 13933 13f058680 _wfindfirst32i64 8 API calls 13930->13933 13932 13f051dd0 18 API calls 13932->13930 13934 13f052daf 13933->13934 13934->13394 13936 13f05449a 13935->13936 13937 13f0554b0 16 API calls 13936->13937 13938 13f0544bc GetEnvironmentVariableW 13937->13938 13939 13f054526 13938->13939 13940 13f0544d4 ExpandEnvironmentStringsW 13938->13940 13941 13f058680 _wfindfirst32i64 8 API calls 13939->13941 13942 13f0555c0 18 API calls 13940->13942 13943 13f054538 13941->13943 13944 13f0544fc 13942->13944 13943->13398 13944->13939 13945 13f054506 13944->13945 14196 13f06282c 13945->14196 13948 13f058680 _wfindfirst32i64 8 API calls 13949 13f05451e 13948->13949 13949->13398 13951 13f0554b0 16 API calls 13950->13951 13952 13f054b07 SetEnvironmentVariableW 13951->13952 13953 13f05a4f8 __vcrt_freefls 14 API calls 13952->13953 13954 13f052a7f 13953->13954 13955 13f0519f0 13954->13955 13956 13f051a00 13955->13956 13959 13f051a7f 13956->13959 14212 13f051710 13956->14212 13959->13403 13959->13405 13962 13f0529a0 13961->13962 13964 13f052977 13961->13964 13962->13404 13962->13413 13964->13962 14521 13f0516e0 13964->14521 13966 13f055557 MultiByteToWideChar 13965->13966 13967 13f0554d1 MultiByteToWideChar 13965->13967 13968 13f05559f 13966->13968 13969 13f05557a 13966->13969 13970 13f0554f7 13967->13970 13973 13f05551c 13967->13973 13968->13411 13971 13f051c80 14 API calls 13969->13971 13972 13f051c80 14 API calls 13970->13972 13974 13f05558d 13971->13974 13975 13f05550a 13972->13975 13973->13966 13976 13f055532 13973->13976 13974->13411 13975->13411 13977 13f051c80 14 API calls 13976->13977 13978 13f055545 13977->13978 13978->13411 13980 13f0636f8 13979->13980 13981 13f06372f 13980->13981 13982 13f0636fd HeapFree 13980->13982 13981->13422 13982->13981 13983 13f063718 13982->13983 13984 13f05deb4 _set_errno_from_matherr 13 API calls 13983->13984 13984->13981 13986 13f0528dc 13985->13986 14525 13f051640 13986->14525 13988 13f052941 13989 13f058680 _wfindfirst32i64 8 API calls 13988->13989 13990 13f052951 13989->13990 13995 13f052540 13990->13995 13991 13f052900 13991->13988 13992 13f052937 13991->13992 13994 13f051dd0 18 API calls 13991->13994 14529 13f054ea0 MultiByteToWideChar 13992->14529 13994->13992 13996 13f05254d 13995->13996 14542 13f053a30 13996->14542 14000 13f058680 _wfindfirst32i64 8 API calls 14002 13f05277f 14000->14002 14001 13f052585 14012 13f0525e2 14001->14012 14590 13f0537b0 14001->14590 14002->13392 14004 13f052595 14004->14012 14601 13f053930 14004->14601 14007 13f0525d6 14009 13f051dd0 18 API calls 14007->14009 14008 13f0525ec 14010 13f052605 14008->14010 14019 13f05261a 14008->14019 14009->14012 14011 13f051dd0 18 API calls 14010->14011 14011->14012 14012->14000 14014 13f0516e0 18 API calls 14014->14019 14015 13f052757 14016 13f051dd0 18 API calls 14015->14016 14016->14012 14017 13f05273a 14018 13f051dd0 18 API calls 14017->14018 14018->14012 14019->14012 14019->14014 14019->14015 14019->14017 14020 13f052722 14019->14020 14021 13f05a4f8 __vcrt_freefls 14 API calls 14019->14021 14606 13f0512a0 14019->14606 14022 13f051dd0 18 API calls 14020->14022 14021->14019 14022->14012 14024 13f05282f 14023->14024 14029 13f0527ff 14023->14029 14025 13f052866 14024->14025 14026 13f051aa0 65 API calls 14024->14026 14027 13f058680 _wfindfirst32i64 8 API calls 14025->14027 14026->14024 14028 13f052878 14027->14028 14028->13416 14029->14024 14030 13f0516e0 18 API calls 14029->14030 14868 13f052050 14029->14868 14912 13f051430 14029->14912 14030->14029 14034 13f051df0 __scrt_get_show_window_mode 14033->14034 14035 13f0554b0 16 API calls 14034->14035 14036 13f051e6a 14035->14036 14037 13f051e6f 14036->14037 14038 13f051ea9 MessageBoxA 14036->14038 14039 13f0554b0 16 API calls 14037->14039 14040 13f051ec3 14038->14040 14041 13f051e89 MessageBoxW 14039->14041 14042 13f058680 _wfindfirst32i64 8 API calls 14040->14042 14041->14040 14043 13f051ed3 14042->14043 14043->13392 14045 13f0554b0 16 API calls 14044->14045 14046 13f054a9f 14045->14046 14047 13f0554b0 16 API calls 14046->14047 14048 13f054aaf 14047->14048 14049 13f05fd9c 31 API calls 14048->14049 14050 13f054abd 14049->14050 14051 13f05a4f8 __vcrt_freefls 14 API calls 14050->14051 14052 13f054ac7 14051->14052 14053 13f05a4f8 __vcrt_freefls 14 API calls 14052->14053 14054 13f052bf3 14053->14054 14054->13420 14056 13f054b40 14055->14056 14057 13f0554b0 16 API calls 14056->14057 14058 13f054b71 14057->14058 15533 13f060a2c 14058->15533 14061 13f060a2c 16 API calls 14062 13f054b8a 14061->14062 14063 13f060a2c 16 API calls 14062->14063 14064 13f054b94 14063->14064 14065 13f060a2c 16 API calls 14064->14065 14066 13f054b9e GetStartupInfoW 14065->14066 14067 13f054beb 14066->14067 14068 13f0628a4 _fread_nolock 30 API calls 14067->14068 14069 13f054bf3 14068->14069 15551 13f0605e0 14069->15551 14071 13f054bfa 14072 13f0628a4 _fread_nolock 30 API calls 14071->14072 14073 13f054c11 14072->14073 14074 13f0605e0 30 API calls 14073->14074 14075 13f054c18 14074->14075 14076 13f0628a4 _fread_nolock 30 API calls 14075->14076 14077 13f054c30 14076->14077 14078 13f0605e0 30 API calls 14077->14078 14079 13f054c37 GetCommandLineW CreateProcessW 14078->14079 14080 13f054cb1 14079->14080 14081 13f054c8b WaitForSingleObject GetExitCodeProcess 14079->14081 14083 13f051c80 16 API calls 14080->14083 14082 13f054cc4 14081->14082 14084 13f058680 _wfindfirst32i64 8 API calls 14082->14084 14083->14082 14085 13f052c28 14084->14085 14085->13428 14086 13f054730 14085->14086 14087 13f054752 14086->14087 14088 13f0554b0 16 API calls 14087->14088 14090 13f05477b 14088->14090 14089 13f054a48 15586 13f05fdd4 RemoveDirectoryW 14089->15586 14090->14089 14090->14090 15564 13f054d50 14090->15564 14094 13f058680 _wfindfirst32i64 8 API calls 14095 13f054a63 14094->14095 14095->13428 14096 13f054a40 15582 13f0600fc FindClose 14096->15582 14099 13f0555c0 18 API calls 14100 13f0548bd 14099->14100 14100->14096 14100->14099 14101 13f054a12 Sleep 14100->14101 14102 13f054730 37 API calls 14100->14102 15578 13f060c08 DeleteFileW 14100->15578 14103 13f060c08 15 API calls 14101->14103 14102->14100 14103->14100 14105 13f051aa5 14104->14105 14111 13f051ad7 14104->14111 14106 13f05a4f8 __vcrt_freefls 14 API calls 14105->14106 14107 13f051abb 14105->14107 14106->14107 14108 13f051ac8 14107->14108 14109 13f05a598 64 API calls 14107->14109 14110 13f05a4f8 __vcrt_freefls 14 API calls 14108->14110 14109->14108 14110->14111 14111->13392 14127 13f058610 14112->14127 14115 13f051cc9 14129 13f055030 14115->14129 14117 13f051d00 __scrt_get_show_window_mode 14118 13f0554b0 13 API calls 14117->14118 14119 13f051d55 14118->14119 14120 13f051d94 MessageBoxA 14119->14120 14121 13f051d5a 14119->14121 14123 13f051dae 14120->14123 14122 13f0554b0 13 API calls 14121->14122 14124 13f051d74 MessageBoxW 14122->14124 14125 13f058680 _wfindfirst32i64 8 API calls 14123->14125 14124->14123 14126 13f051dbe 14125->14126 14126->13906 14128 13f051c9c GetLastError 14127->14128 14128->14115 14130 13f05503c 14129->14130 14131 13f055057 GetLastError 14130->14131 14132 13f05505d FormatMessageW 14130->14132 14131->14132 14133 13f055090 14132->14133 14134 13f0550ac WideCharToMultiByte 14132->14134 14135 13f051c80 13 API calls 14133->14135 14136 13f0550e6 14134->14136 14137 13f0550a3 14134->14137 14135->14137 14138 13f051c80 13 API calls 14136->14138 14139 13f058680 _wfindfirst32i64 8 API calls 14137->14139 14138->14137 14140 13f055115 14139->14140 14140->14117 14148 13f05b590 EnterCriticalSection 14141->14148 14150 13f051b4c 14149->14150 14151 13f05deb4 _set_errno_from_matherr 13 API calls 14150->14151 14152 13f051ba4 14151->14152 14164 13f05ded4 14152->14164 14154 13f051bab __scrt_get_show_window_mode 14155 13f0554b0 16 API calls 14154->14155 14156 13f051c00 14155->14156 14157 13f051c05 14156->14157 14158 13f051c3f MessageBoxA 14156->14158 14159 13f0554b0 16 API calls 14157->14159 14160 13f051c59 14158->14160 14161 13f051c1f MessageBoxW 14159->14161 14162 13f058680 _wfindfirst32i64 8 API calls 14160->14162 14161->14160 14163 13f051c69 14162->14163 14163->13922 14165 13f066b18 _invalid_parameter_noinfo 13 API calls 14164->14165 14166 13f05dee6 14165->14166 14167 13f05deee 14166->14167 14168 13f063680 _invalid_parameter_noinfo 13 API calls 14166->14168 14171 13f05df21 14166->14171 14167->14154 14169 13f05df16 14168->14169 14170 13f0636f8 __free_lconv_mon 13 API calls 14169->14170 14170->14171 14171->14167 14176 13f067860 14171->14176 14174 13f063638 _wfindfirst32i64 17 API calls 14175 13f05df79 14174->14175 14179 13f067878 14176->14179 14177 13f06787d 14178 13f05deb4 _set_errno_from_matherr 13 API calls 14177->14178 14182 13f05df5a 14177->14182 14184 13f067887 14178->14184 14179->14177 14180 13f0678c2 14179->14180 14179->14182 14180->14182 14183 13f05deb4 _set_errno_from_matherr 13 API calls 14180->14183 14181 13f063618 _invalid_parameter_noinfo 30 API calls 14181->14182 14182->14167 14182->14174 14183->14184 14184->14181 14186 13f055652 WideCharToMultiByte 14185->14186 14187 13f0555e4 WideCharToMultiByte 14185->14187 14188 13f05567f 14186->14188 14195 13f052d85 14186->14195 14189 13f05560e 14187->14189 14192 13f055625 14187->14192 14190 13f051c80 16 API calls 14188->14190 14191 13f051c80 16 API calls 14189->14191 14190->14195 14191->14195 14192->14186 14193 13f05563b 14192->14193 14194 13f051c80 16 API calls 14193->14194 14194->14195 14195->13930 14195->13932 14197 13f062843 14196->14197 14200 13f05450e 14196->14200 14197->14200 14203 13f0628cc 14197->14203 14200->13948 14201 13f063638 _wfindfirst32i64 17 API calls 14202 13f0628a0 14201->14202 14204 13f0628e3 14203->14204 14205 13f0628d9 14203->14205 14206 13f05deb4 _set_errno_from_matherr 13 API calls 14204->14206 14205->14204 14210 13f0628fe 14205->14210 14207 13f0628ea 14206->14207 14208 13f063618 _invalid_parameter_noinfo 30 API calls 14207->14208 14209 13f062870 14208->14209 14209->14200 14209->14201 14210->14209 14211 13f05deb4 _set_errno_from_matherr 13 API calls 14210->14211 14211->14207 14213 13f051733 14212->14213 14226 13f051743 14212->14226 14256 13f052e30 14213->14256 14215 13f05a4f8 __vcrt_freefls 14 API calls 14216 13f051837 14215->14216 14217 13f05184e 14216->14217 14218 13f05186b 14216->14218 14243 13f05181f 14216->14243 14219 13f051b30 40 API calls 14217->14219 14220 13f05a8e4 _fread_nolock 46 API calls 14218->14220 14219->14243 14225 13f051880 14220->14225 14221 13f051817 14223 13f05a4f8 __vcrt_freefls 14 API calls 14221->14223 14222 13f051886 14224 13f051b30 40 API calls 14222->14224 14223->14243 14224->14243 14225->14222 14228 13f051901 14225->14228 14229 13f05191e 14225->14229 14226->14221 14233 13f051829 14226->14233 14226->14243 14266 13f05a8e4 14226->14266 14231 13f051b30 40 API calls 14228->14231 14230 13f05a8e4 _fread_nolock 46 API calls 14229->14230 14232 13f051933 14230->14232 14231->14243 14232->14222 14234 13f051945 14232->14234 14233->14215 14269 13f05a628 14234->14269 14237 13f05195d 14238 13f051dd0 18 API calls 14237->14238 14238->14243 14239 13f0519b3 14240 13f05a598 64 API calls 14239->14240 14239->14243 14240->14243 14241 13f051970 14241->14239 14242 13f051dd0 18 API calls 14241->14242 14242->14239 14243->13959 14244 13f05a598 14243->14244 14245 13f05a5af 14244->14245 14247 13f05a5cd 14244->14247 14246 13f05deb4 _set_errno_from_matherr 13 API calls 14245->14246 14249 13f05a5b4 14246->14249 14252 13f05a5bf 14247->14252 14520 13f05b590 EnterCriticalSection 14247->14520 14251 13f063618 _invalid_parameter_noinfo 30 API calls 14249->14251 14251->14252 14252->13959 14257 13f052e3c 14256->14257 14258 13f0554b0 16 API calls 14257->14258 14259 13f052e67 14258->14259 14260 13f0554b0 16 API calls 14259->14260 14261 13f052e7a 14260->14261 14275 13f05eed8 14261->14275 14264 13f058680 _wfindfirst32i64 8 API calls 14265 13f052e99 14264->14265 14265->14226 14506 13f05a904 14266->14506 14270 13f05a631 14269->14270 14272 13f051959 14269->14272 14271 13f05deb4 _set_errno_from_matherr 13 API calls 14270->14271 14273 13f05a636 14271->14273 14272->14237 14272->14241 14274 13f063618 _invalid_parameter_noinfo 30 API calls 14273->14274 14274->14272 14276 13f05ee0c 14275->14276 14277 13f05ee32 14276->14277 14280 13f05ee65 14276->14280 14278 13f05deb4 _set_errno_from_matherr 13 API calls 14277->14278 14279 13f05ee37 14278->14279 14281 13f063618 _invalid_parameter_noinfo 30 API calls 14279->14281 14282 13f05ee78 14280->14282 14283 13f05ee6b 14280->14283 14284 13f052e89 14281->14284 14294 13f063970 14282->14294 14285 13f05deb4 _set_errno_from_matherr 13 API calls 14283->14285 14284->14264 14285->14284 14307 13f068a68 EnterCriticalSection 14294->14307 14507 13f05a92e 14506->14507 14518 13f05a8fc 14506->14518 14508 13f05a93d __scrt_get_show_window_mode 14507->14508 14509 13f05a97a 14507->14509 14507->14518 14511 13f05deb4 _set_errno_from_matherr 13 API calls 14508->14511 14519 13f05b590 EnterCriticalSection 14509->14519 14513 13f05a952 14511->14513 14515 13f063618 _invalid_parameter_noinfo 30 API calls 14513->14515 14515->14518 14518->14226 14522 13f051701 14521->14522 14523 13f0516f5 14521->14523 14522->13964 14524 13f051dd0 18 API calls 14523->14524 14524->14522 14527 13f051665 14525->14527 14526 13f0516a2 14526->13991 14527->14526 14528 13f051dd0 18 API calls 14527->14528 14528->14526 14530 13f054ee9 14529->14530 14532 13f054ee0 14529->14532 14531 13f054f0f MultiByteToWideChar 14530->14531 14530->14532 14531->14532 14534 13f054f47 LoadLibraryA GetProcAddress GetProcAddress 14531->14534 14533 13f051c80 16 API calls 14532->14533 14535 13f054f45 14533->14535 14536 13f054f86 14534->14536 14537 13f055018 14534->14537 14535->14534 14536->14537 14538 13f05a4f8 __vcrt_freefls 14 API calls 14536->14538 14537->13988 14539 13f054fd5 14538->14539 14540 13f055030 16 API calls 14539->14540 14541 13f054fef 14539->14541 14540->14537 14541->13988 14543 13f053a40 14542->14543 14544 13f053a7b 14543->14544 14547 13f053a9b 14543->14547 14545 13f051dd0 18 API calls 14544->14545 14546 13f053a91 14545->14546 14551 13f058680 _wfindfirst32i64 8 API calls 14546->14551 14548 13f053af2 14547->14548 14550 13f053ada 14547->14550 14555 13f051dd0 18 API calls 14547->14555 14549 13f053b29 14548->14549 14553 13f051dd0 18 API calls 14548->14553 14638 13f054cf0 14549->14638 14632 13f052dc0 14550->14632 14552 13f05256a 14551->14552 14552->14012 14564 13f053db0 14552->14564 14553->14549 14555->14550 14559 13f053b5d 14643 13f052f70 GetProcAddress 14559->14643 14560 13f053b3b 14562 13f051c80 16 API calls 14560->14562 14561 13f054cf0 31 API calls 14561->14548 14562->14546 14565 13f0554b0 16 API calls 14564->14565 14566 13f053dcf 14565->14566 14567 13f053dd4 14566->14567 14568 13f053deb 14566->14568 14569 13f051dd0 18 API calls 14567->14569 14571 13f0554b0 16 API calls 14568->14571 14570 13f053de0 14569->14570 14570->14001 14572 13f053e19 14571->14572 14575 13f053ec0 14572->14575 14576 13f053e9b 14572->14576 14588 13f053e1e 14572->14588 14573 13f051dd0 18 API calls 14574 13f053f95 14573->14574 14574->14001 14578 13f0554b0 16 API calls 14575->14578 14577 13f051dd0 18 API calls 14576->14577 14579 13f053eb0 14577->14579 14580 13f053ed9 14578->14580 14579->14001 14580->14588 14741 13f053b90 14580->14741 14584 13f053f62 14586 13f05a4f8 __vcrt_freefls 14 API calls 14584->14586 14585 13f053f2a 14585->14584 14587 13f05a4f8 __vcrt_freefls 14 API calls 14585->14587 14585->14588 14586->14588 14587->14585 14588->14573 14589 13f053f7e 14588->14589 14589->14001 14591 13f0537c7 14590->14591 14592 13f0537e9 14591->14592 14600 13f053800 14591->14600 14593 13f051dd0 18 API calls 14592->14593 14594 13f0537f5 14593->14594 14594->14004 14595 13f05390b 14595->14004 14596 13f0516e0 18 API calls 14596->14600 14597 13f0512a0 105 API calls 14597->14600 14598 13f051dd0 18 API calls 14598->14600 14599 13f05a4f8 __vcrt_freefls 14 API calls 14599->14600 14600->14595 14600->14596 14600->14597 14600->14598 14600->14599 14603 13f0525a5 14601->14603 14604 13f05394b 14601->14604 14602 13f0516e0 18 API calls 14602->14604 14603->14007 14603->14008 14603->14012 14604->14602 14604->14603 14605 13f051dd0 18 API calls 14604->14605 14605->14604 14607 13f0512b6 14606->14607 14608 13f0512e8 14606->14608 14609 13f052e30 98 API calls 14607->14609 14611 13f0512fe 14608->14611 14612 13f05131f 14608->14612 14610 13f0512c6 14609->14610 14610->14608 14613 13f0512ce 14610->14613 14614 13f051b30 40 API calls 14611->14614 14618 13f051354 14612->14618 14619 13f051334 14612->14619 14615 13f051dd0 18 API calls 14613->14615 14617 13f051315 14614->14617 14616 13f0512de 14615->14616 14616->14019 14617->14019 14621 13f05136e 14618->14621 14628 13f051385 14618->14628 14620 13f051b30 40 API calls 14619->14620 14622 13f05134f 14620->14622 14829 13f051040 14621->14829 14625 13f051411 14622->14625 14627 13f05a598 64 API calls 14622->14627 14624 13f05137f 14624->14622 14630 13f05a4f8 __vcrt_freefls 14 API calls 14624->14630 14625->14019 14626 13f05a8e4 _fread_nolock 46 API calls 14626->14628 14627->14625 14628->14622 14628->14626 14629 13f0513ce 14628->14629 14631 13f051b30 40 API calls 14629->14631 14630->14622 14631->14624 14633 13f052dca 14632->14633 14634 13f0554b0 16 API calls 14633->14634 14635 13f052df2 14634->14635 14636 13f058680 _wfindfirst32i64 8 API calls 14635->14636 14637 13f052e1a 14636->14637 14637->14548 14637->14561 14639 13f0554b0 16 API calls 14638->14639 14640 13f054d07 LoadLibraryExW 14639->14640 14641 13f05a4f8 __vcrt_freefls 14 API calls 14640->14641 14642 13f053b36 14641->14642 14642->14559 14642->14560 14644 13f052fb0 GetProcAddress 14643->14644 14652 13f052f92 14643->14652 14645 13f052fd5 GetProcAddress 14644->14645 14644->14652 14646 13f052ffa GetProcAddress 14645->14646 14645->14652 14648 13f053022 GetProcAddress 14646->14648 14646->14652 14647 13f051c80 16 API calls 14649 13f052fa5 14647->14649 14650 13f05304a GetProcAddress 14648->14650 14648->14652 14649->14546 14651 13f053072 GetProcAddress 14650->14651 14650->14652 14651->14652 14653 13f05309a GetProcAddress 14651->14653 14652->14647 14654 13f0530b6 14653->14654 14655 13f0530c2 GetProcAddress 14653->14655 14654->14655 14656 13f0530de 14655->14656 14657 13f0530ea GetProcAddress 14655->14657 14656->14657 14658 13f053106 14657->14658 14659 13f053112 GetProcAddress 14657->14659 14658->14659 14660 13f05312e 14659->14660 14661 13f05313a GetProcAddress 14659->14661 14660->14661 14662 13f053156 14661->14662 14663 13f053162 GetProcAddress 14661->14663 14662->14663 14664 13f05317e 14663->14664 14665 13f05318a GetProcAddress 14663->14665 14664->14665 14666 13f0531a6 14665->14666 14667 13f0531b2 GetProcAddress 14665->14667 14666->14667 14668 13f0531ce 14667->14668 14669 13f0531da GetProcAddress 14667->14669 14668->14669 14670 13f0531f6 14669->14670 14671 13f053202 GetProcAddress 14669->14671 14670->14671 14672 13f05321e 14671->14672 14673 13f05322a GetProcAddress 14671->14673 14672->14673 14674 13f053246 14673->14674 14675 13f053252 GetProcAddress 14673->14675 14674->14675 14676 13f05326e 14675->14676 14677 13f05327a GetProcAddress 14675->14677 14676->14677 14678 13f053296 14677->14678 14679 13f0532a2 GetProcAddress 14677->14679 14678->14679 14680 13f0532be 14679->14680 14681 13f0532ca GetProcAddress 14679->14681 14680->14681 14682 13f0532e6 14681->14682 14683 13f0532f2 GetProcAddress 14681->14683 14682->14683 14684 13f05330e 14683->14684 14685 13f05331a GetProcAddress 14683->14685 14684->14685 14686 13f053336 14685->14686 14687 13f053342 GetProcAddress 14685->14687 14686->14687 14688 13f05335e 14687->14688 14689 13f05336a GetProcAddress 14687->14689 14688->14689 14690 13f053386 14689->14690 14691 13f053392 GetProcAddress 14689->14691 14690->14691 14692 13f0533ae 14691->14692 14693 13f0533ba GetProcAddress 14691->14693 14692->14693 14694 13f0533d6 14693->14694 14695 13f0533e2 GetProcAddress 14693->14695 14694->14695 14696 13f0533fe 14695->14696 14697 13f05340a GetProcAddress 14695->14697 14696->14697 14698 13f053426 14697->14698 14699 13f053432 GetProcAddress 14697->14699 14698->14699 14700 13f05344e 14699->14700 14701 13f05345a GetProcAddress 14699->14701 14700->14701 14702 13f053476 14701->14702 14703 13f053482 GetProcAddress 14701->14703 14702->14703 14704 13f05349e 14703->14704 14705 13f0534aa GetProcAddress 14703->14705 14704->14705 14706 13f0534c6 14705->14706 14707 13f0534d2 GetProcAddress 14705->14707 14706->14707 14708 13f0534ee 14707->14708 14709 13f0534fa GetProcAddress 14707->14709 14708->14709 14710 13f053516 14709->14710 14711 13f053522 GetProcAddress 14709->14711 14710->14711 14712 13f05353e 14711->14712 14713 13f05354a GetProcAddress 14711->14713 14712->14713 14714 13f053566 14713->14714 14715 13f053572 GetProcAddress 14713->14715 14714->14715 14716 13f05358e 14715->14716 14717 13f05359a GetProcAddress 14715->14717 14716->14717 14718 13f0535b6 14717->14718 14719 13f0535c2 GetProcAddress 14717->14719 14718->14719 14720 13f0535de 14719->14720 14721 13f0535ea GetProcAddress 14719->14721 14720->14721 14722 13f053606 14721->14722 14723 13f053612 GetProcAddress 14721->14723 14722->14723 14724 13f05362e 14723->14724 14725 13f05363a GetProcAddress 14723->14725 14724->14725 14726 13f053656 14725->14726 14727 13f053662 GetProcAddress 14725->14727 14726->14727 14728 13f05367e 14727->14728 14729 13f05368a GetProcAddress 14727->14729 14728->14729 14730 13f0536a6 14729->14730 14731 13f0536b2 GetProcAddress 14729->14731 14730->14731 14732 13f0536ce 14731->14732 14733 13f0536da GetProcAddress 14731->14733 14732->14733 14734 13f0536f6 14733->14734 14735 13f053702 GetProcAddress 14733->14735 14734->14735 14736 13f05371e 14735->14736 14737 13f05372a GetProcAddress 14735->14737 14736->14737 14738 13f053746 14737->14738 14739 13f053752 GetProcAddress 14737->14739 14738->14739 14740 13f05376e 14739->14740 14740->14546 14746 13f053baa mbstowcs 14741->14746 14742 13f058680 _wfindfirst32i64 8 API calls 14744 13f053d75 14742->14744 14743 13f0516e0 18 API calls 14743->14746 14767 13f0556b0 14744->14767 14745 13f053cb8 14753 13f053d56 14745->14753 14778 13f0628a4 14745->14778 14746->14743 14746->14745 14749 13f053d8e 14746->14749 14746->14753 14751 13f051dd0 18 API calls 14749->14751 14751->14753 14752 13f053cdb 14754 13f0628a4 _fread_nolock 30 API calls 14752->14754 14753->14742 14755 13f053ced 14754->14755 14756 13f05f170 32 API calls 14755->14756 14757 13f053cf9 14756->14757 14803 13f05f640 14757->14803 14759 13f053d0b 14760 13f05f640 63 API calls 14759->14760 14761 13f053d1d 14760->14761 14762 13f05e914 62 API calls 14761->14762 14763 13f053d2e 14762->14763 14764 13f05e914 62 API calls 14763->14764 14765 13f053d42 14764->14765 14766 13f05e914 62 API calls 14765->14766 14766->14753 14768 13f0556cf 14767->14768 14769 13f0556d7 14768->14769 14770 13f055720 MultiByteToWideChar 14768->14770 14771 13f0557ac 14768->14771 14772 13f055768 MultiByteToWideChar 14768->14772 14769->14585 14770->14768 14770->14771 14773 13f051c80 16 API calls 14771->14773 14772->14768 14772->14771 14774 13f0557d8 14773->14774 14775 13f0557f1 14774->14775 14777 13f05a4f8 __vcrt_freefls 14 API calls 14774->14777 14776 13f05a4f8 __vcrt_freefls 14 API calls 14775->14776 14776->14769 14777->14774 14779 13f053ccf 14778->14779 14780 13f0628ad 14778->14780 14784 13f05f170 14779->14784 14781 13f05deb4 _set_errno_from_matherr 13 API calls 14780->14781 14782 13f0628b2 14781->14782 14783 13f063618 _invalid_parameter_noinfo 30 API calls 14782->14783 14783->14779 14785 13f05f1c9 14784->14785 14786 13f05f199 14784->14786 14787 13f05f1ce 14785->14787 14788 13f05f1db 14785->14788 14786->14785 14793 13f05f1b9 14786->14793 14789 13f05deb4 _set_errno_from_matherr 13 API calls 14787->14789 14790 13f05f244 14788->14790 14795 13f05f20b 14788->14795 14791 13f05f1d3 14789->14791 14792 13f05deb4 _set_errno_from_matherr 13 API calls 14790->14792 14791->14752 14794 13f05f1be 14792->14794 14796 13f05deb4 _set_errno_from_matherr 13 API calls 14793->14796 14798 13f063618 _invalid_parameter_noinfo 30 API calls 14794->14798 14809 13f0602d4 EnterCriticalSection 14795->14809 14796->14794 14798->14791 14804 13f05f655 14803->14804 14805 13f05f64e 14803->14805 14807 13f05f653 14804->14807 14813 13f05f4d0 14804->14813 14810 13f05f510 14805->14810 14807->14759 14820 13f05f3f0 14810->14820 14828 13f05b590 EnterCriticalSection 14813->14828 14827 13f068a68 EnterCriticalSection 14820->14827 14830 13f051096 14829->14830 14831 13f0510c3 14830->14831 14832 13f05109d 14830->14832 14835 13f0510dd 14831->14835 14836 13f0510f9 14831->14836 14833 13f051dd0 18 API calls 14832->14833 14834 13f0510b0 14833->14834 14834->14624 14837 13f051b30 40 API calls 14835->14837 14838 13f05110b 14836->14838 14850 13f051127 memcpy_s 14836->14850 14841 13f0510f4 14837->14841 14839 13f051b30 40 API calls 14838->14839 14839->14841 14840 13f05a8e4 _fread_nolock 46 API calls 14840->14850 14842 13f05a4f8 __vcrt_freefls 14 API calls 14841->14842 14843 13f051279 14842->14843 14845 13f05a4f8 __vcrt_freefls 14 API calls 14843->14845 14844 13f05a628 30 API calls 14844->14850 14846 13f051281 14845->14846 14846->14624 14847 13f0511f5 14849 13f051dd0 18 API calls 14847->14849 14849->14841 14850->14840 14850->14841 14850->14844 14850->14847 14851 13f05b2ec 14850->14851 14852 13f05b326 14851->14852 14853 13f05b30c 14851->14853 14852->14850 14853->14852 14854 13f05b316 14853->14854 14855 13f05b32e 14853->14855 14856 13f05deb4 _set_errno_from_matherr 13 API calls 14854->14856 14860 13f05b09c 14855->14860 14858 13f05b31b 14856->14858 14859 13f063618 _invalid_parameter_noinfo 30 API calls 14858->14859 14859->14852 14867 13f05b590 EnterCriticalSection 14860->14867 14870 13f052066 14868->14870 14869 13f052489 14870->14869 14946 13f0524a0 14870->14946 14873 13f0521a7 14952 13f054220 14873->14952 14874 13f0524a0 55 API calls 14876 13f0521a3 14874->14876 14876->14873 14878 13f052215 14876->14878 14877 13f0521af 14879 13f0521cc 14877->14879 14961 13f054100 14877->14961 14880 13f0524a0 55 API calls 14878->14880 14883 13f051dd0 18 API calls 14879->14883 14911 13f0521e6 14879->14911 14882 13f05223e 14880->14882 14884 13f052298 14882->14884 14885 13f0524a0 55 API calls 14882->14885 14883->14911 14884->14879 14886 13f054220 80 API calls 14884->14886 14887 13f05226b 14885->14887 14892 13f0522a8 14886->14892 14887->14884 14890 13f0524a0 55 API calls 14887->14890 14888 13f058680 _wfindfirst32i64 8 API calls 14889 13f05220a 14888->14889 14889->14029 14890->14884 14891 13f051ae0 40 API calls 14897 13f0522ff 14891->14897 14892->14879 14892->14891 14893 13f0523c6 14892->14893 14893->14879 14902 13f0523de 14893->14902 14894 13f052462 14895 13f051dd0 18 API calls 14894->14895 14896 13f0523c1 14895->14896 14898 13f051aa0 65 API calls 14896->14898 14897->14879 14897->14894 14901 13f05238c 14897->14901 14898->14879 14899 13f051430 144 API calls 14899->14902 14900 13f0516e0 18 API calls 14900->14902 14903 13f051710 103 API calls 14901->14903 14902->14899 14902->14900 14904 13f052444 14902->14904 14902->14911 14905 13f0523a3 14903->14905 14906 13f051dd0 18 API calls 14904->14906 14905->14902 14907 13f0523a7 14905->14907 14908 13f052455 14906->14908 14909 13f051b30 40 API calls 14907->14909 14910 13f051aa0 65 API calls 14908->14910 14909->14896 14910->14911 14911->14888 14913 13f054220 80 API calls 14912->14913 14914 13f051444 14913->14914 14915 13f051449 14914->14915 14916 13f054540 115 API calls 14914->14916 14915->14029 14917 13f05146f 14916->14917 14918 13f051497 14917->14918 14919 13f051477 14917->14919 14921 13f0514d0 14918->14921 14922 13f052e30 98 API calls 14918->14922 14920 13f051b30 40 API calls 14919->14920 14938 13f05148d 14920->14938 14924 13f051506 14921->14924 14925 13f0514e6 14921->14925 14923 13f0514af 14922->14923 14923->14921 14926 13f0514b7 14923->14926 14928 13f051524 14924->14928 14929 13f05150c 14924->14929 14927 13f051b30 40 API calls 14925->14927 14930 13f051dd0 18 API calls 14926->14930 14939 13f0514c6 14927->14939 14933 13f051546 14928->14933 14944 13f051565 14928->14944 14931 13f051040 86 API calls 14929->14931 14930->14939 14931->14939 14932 13f051614 14935 13f05a598 64 API calls 14932->14935 14936 13f051b30 40 API calls 14933->14936 14934 13f05a598 64 API calls 14934->14932 14935->14938 14936->14939 14937 13f0515c3 14940 13f05a4f8 __vcrt_freefls 14 API calls 14937->14940 14938->14029 14939->14932 14939->14934 14940->14939 14941 13f05a8e4 _fread_nolock 46 API calls 14941->14944 14942 13f0515c5 14945 13f051b30 40 API calls 14942->14945 14943 13f05b2ec 64 API calls 14943->14944 14944->14937 14944->14941 14944->14942 14944->14943 14945->14937 14947 13f0524d4 14946->14947 14948 13f05250b 14947->14948 14985 13f05e80c 14947->14985 14950 13f058680 _wfindfirst32i64 8 API calls 14948->14950 14951 13f052156 14950->14951 14951->14873 14951->14874 14953 13f054268 14952->14953 14954 13f054232 14952->14954 14953->14877 14955 13f051640 18 API calls 14954->14955 14956 13f05423e 14955->14956 15227 13f054280 14956->15227 14959 13f051dd0 18 API calls 14960 13f05425d 14959->14960 14960->14877 14962 13f05410e 14961->14962 14963 13f052e30 98 API calls 14962->14963 14964 13f054135 14963->14964 15458 13f054540 14964->15458 14967 13f05415d 15474 13f05a5fc 14967->15474 14968 13f0541f3 14969 13f0541ef 14968->14969 14971 13f05a598 64 API calls 14968->14971 14972 13f058680 _wfindfirst32i64 8 API calls 14969->14972 14971->14969 14974 13f054215 14972->14974 14973 13f0541d0 14975 13f05a598 64 API calls 14973->14975 14974->14879 14977 13f0541e7 14975->14977 14976 13f05a8e4 _fread_nolock 46 API calls 14983 13f054162 14976->14983 14978 13f05a598 64 API calls 14977->14978 14978->14969 14979 13f05a628 30 API calls 14979->14983 14980 13f05b2ec 64 API calls 14980->14983 14981 13f054199 15480 13f060fe8 14981->15480 14982 13f05a5fc 30 API calls 14982->14983 14983->14973 14983->14976 14983->14979 14983->14980 14983->14981 14983->14982 14986 13f05e835 14985->14986 14987 13f05e829 14985->14987 14989 13f05be30 33 API calls 14986->14989 15002 13f05e0f4 14987->15002 14990 13f05e85d 14989->14990 14993 13f05e86d 14990->14993 15026 13f065d84 14990->15026 15029 13f05df7c 14993->15029 14995 13f05e8c5 14997 13f05e82e 14995->14997 14999 13f0636f8 __free_lconv_mon 13 API calls 14995->14999 14996 13f05e8d9 14998 13f05e0f4 52 API calls 14996->14998 14997->14948 15000 13f05e8e5 14998->15000 14999->14997 15000->14997 15001 13f0636f8 __free_lconv_mon 13 API calls 15000->15001 15001->14997 15003 13f05e11a 15002->15003 15004 13f05e139 __scrt_get_show_window_mode 15002->15004 15005 13f05de94 _fread_nolock 13 API calls 15003->15005 15004->15003 15007 13f05e169 CreateFileW 15004->15007 15006 13f05e11f 15005->15006 15008 13f05deb4 _set_errno_from_matherr 13 API calls 15006->15008 15009 13f05e202 15007->15009 15010 13f05e19e 15007->15010 15011 13f05e126 15008->15011 15077 13f05e708 15009->15077 15051 13f05e288 GetFileType 15010->15051 15013 13f063618 _invalid_parameter_noinfo 30 API calls 15011->15013 15017 13f05e131 15013->15017 15016 13f05e1ac __scrt_get_show_window_mode 15016->15017 15022 13f05e1de CloseHandle 15016->15022 15017->14997 15018 13f05e217 15097 13f05e4c4 15018->15097 15019 13f05e20b 15020 13f05de44 _fread_nolock 13 API calls 15019->15020 15025 13f05e215 15020->15025 15022->15017 15025->15016 15027 13f065b5c try_get_function 5 API calls 15026->15027 15028 13f065da4 15027->15028 15028->14993 15030 13f05dfa5 15029->15030 15031 13f05dfc7 15029->15031 15032 13f05dfb3 15030->15032 15035 13f0636f8 __free_lconv_mon 13 API calls 15030->15035 15033 13f05e020 15031->15033 15034 13f05dfcb 15031->15034 15032->14995 15032->14996 15036 13f067c10 _fread_nolock MultiByteToWideChar 15033->15036 15034->15032 15040 13f0636f8 __free_lconv_mon 13 API calls 15034->15040 15043 13f05dfdf 15034->15043 15035->15032 15037 13f05e03b 15036->15037 15039 13f05e042 GetLastError 15037->15039 15042 13f05e07b 15037->15042 15046 13f05e06f 15037->15046 15050 13f0636f8 __free_lconv_mon 13 API calls 15037->15050 15038 13f063738 _fread_nolock 14 API calls 15038->15032 15041 13f05de44 _fread_nolock 13 API calls 15039->15041 15040->15043 15045 13f05e04f 15041->15045 15042->15032 15044 13f067c10 _fread_nolock MultiByteToWideChar 15042->15044 15043->15038 15048 13f05e0c3 15044->15048 15049 13f05deb4 _set_errno_from_matherr 13 API calls 15045->15049 15047 13f063738 _fread_nolock 14 API calls 15046->15047 15047->15042 15048->15032 15048->15039 15049->15032 15050->15046 15052 13f05e2d6 15051->15052 15053 13f05e38e 15051->15053 15059 13f05e600 23 API calls 15052->15059 15063 13f05e2f0 __scrt_get_show_window_mode 15052->15063 15054 13f05e396 15053->15054 15055 13f05e3b8 15053->15055 15056 13f05e39a 15054->15056 15057 13f05e3a9 GetLastError 15054->15057 15058 13f05e3db PeekNamedPipe 15055->15058 15065 13f05e379 15055->15065 15061 13f05deb4 _set_errno_from_matherr 13 API calls 15056->15061 15062 13f05de44 _fread_nolock 13 API calls 15057->15062 15058->15065 15059->15063 15060 13f05e311 GetFileInformationByHandle 15060->15057 15064 13f05e326 15060->15064 15061->15065 15062->15065 15063->15060 15063->15065 15067 13f05e4c4 34 API calls 15064->15067 15066 13f058680 _wfindfirst32i64 8 API calls 15065->15066 15068 13f05e414 15066->15068 15069 13f05e331 15067->15069 15068->15016 15114 13f05e42c 15069->15114 15072 13f05e42c 10 API calls 15073 13f05e350 15072->15073 15074 13f05e42c 10 API calls 15073->15074 15075 13f05e361 15074->15075 15075->15065 15076 13f05deb4 _set_errno_from_matherr 13 API calls 15075->15076 15076->15065 15078 13f05e73e 15077->15078 15080 13f05deb4 _set_errno_from_matherr 13 API calls 15078->15080 15095 13f05e7e1 15078->15095 15079 13f058680 _wfindfirst32i64 8 API calls 15081 13f05e207 15079->15081 15082 13f05e752 15080->15082 15081->15018 15081->15019 15083 13f05deb4 _set_errno_from_matherr 13 API calls 15082->15083 15084 13f05e759 15083->15084 15121 13f05ed58 15084->15121 15087 13f05deb4 _set_errno_from_matherr 13 API calls 15089 13f05e777 15087->15089 15088 13f05e7d6 15092 13f05a4f8 __vcrt_freefls 14 API calls 15088->15092 15089->15088 15090 13f05deb4 _set_errno_from_matherr 13 API calls 15089->15090 15094 13f05e77c 15089->15094 15091 13f05e78a 15090->15091 15093 13f05ed58 39 API calls 15091->15093 15092->15095 15093->15094 15094->15088 15096 13f05e7c4 GetDriveTypeW 15094->15096 15095->15079 15096->15088 15098 13f05e4ec 15097->15098 15106 13f05e224 15098->15106 15196 13f067aa0 15098->15196 15100 13f05e580 15101 13f067aa0 34 API calls 15100->15101 15100->15106 15102 13f05e593 15101->15102 15103 13f067aa0 34 API calls 15102->15103 15102->15106 15104 13f05e5a6 15103->15104 15105 13f067aa0 34 API calls 15104->15105 15104->15106 15105->15106 15107 13f05e600 15106->15107 15108 13f05e61a 15107->15108 15109 13f05e652 15108->15109 15110 13f05e62a 15108->15110 15213 13f067934 15109->15213 15112 13f05de44 _fread_nolock 13 API calls 15110->15112 15113 13f05e63a 15110->15113 15112->15113 15113->15025 15115 13f05e458 FileTimeToSystemTime 15114->15115 15116 13f05e44b 15114->15116 15117 13f05e453 15115->15117 15118 13f05e46a SystemTimeToTzSpecificLocalTime 15115->15118 15116->15115 15116->15117 15119 13f058680 _wfindfirst32i64 8 API calls 15117->15119 15118->15117 15120 13f05e340 15119->15120 15120->15072 15122 13f05ed77 15121->15122 15123 13f05ede0 15121->15123 15122->15123 15125 13f05ed7c 15122->15125 15162 13f0683c4 15123->15162 15126 13f05ed8f 15125->15126 15127 13f05edac 15125->15127 15135 13f05eb18 GetFullPathNameW 15126->15135 15143 13f05eb8c GetFullPathNameW 15127->15143 15128 13f05e76f 15128->15087 15133 13f05edca 15133->15128 15134 13f05a4f8 __vcrt_freefls 14 API calls 15133->15134 15134->15128 15136 13f05eb3e GetLastError 15135->15136 15140 13f05eb54 15135->15140 15137 13f05de44 _fread_nolock 13 API calls 15136->15137 15139 13f05eb4b 15137->15139 15138 13f05eb50 15138->15128 15141 13f05deb4 _set_errno_from_matherr 13 API calls 15139->15141 15140->15138 15142 13f05deb4 _set_errno_from_matherr 13 API calls 15140->15142 15141->15138 15142->15138 15144 13f05ebc3 GetLastError 15143->15144 15148 13f05ebd9 15143->15148 15145 13f05de44 _fread_nolock 13 API calls 15144->15145 15147 13f05ebd0 15145->15147 15146 13f05ebd5 15153 13f05ec70 15146->15153 15150 13f05deb4 _set_errno_from_matherr 13 API calls 15147->15150 15148->15146 15149 13f05ebf7 15148->15149 15151 13f05a4f8 __vcrt_freefls 14 API calls 15148->15151 15149->15146 15152 13f05ec30 GetFullPathNameW 15149->15152 15150->15146 15151->15149 15152->15144 15152->15146 15154 13f05ece9 memcpy_s 15153->15154 15155 13f05ec99 __scrt_get_show_window_mode 15153->15155 15154->15133 15155->15154 15156 13f05ecd2 15155->15156 15159 13f05ed0b 15155->15159 15157 13f05deb4 _set_errno_from_matherr 13 API calls 15156->15157 15158 13f05ecd7 15157->15158 15160 13f063618 _invalid_parameter_noinfo 30 API calls 15158->15160 15159->15154 15161 13f05deb4 _set_errno_from_matherr 13 API calls 15159->15161 15160->15154 15161->15158 15165 13f0681dc 15162->15165 15166 13f068208 15165->15166 15167 13f068231 15165->15167 15168 13f05deb4 _set_errno_from_matherr 13 API calls 15166->15168 15169 13f068235 15167->15169 15170 13f068256 15167->15170 15171 13f06820d 15168->15171 15173 13f068344 31 API calls 15169->15173 15172 13f067934 23 API calls 15170->15172 15176 13f063618 _invalid_parameter_noinfo 30 API calls 15171->15176 15180 13f06825b 15172->15180 15174 13f06823a 15173->15174 15175 13f06823e 15174->15175 15174->15180 15177 13f05de94 _fread_nolock 13 API calls 15175->15177 15178 13f068218 15176->15178 15179 13f068243 15177->15179 15182 13f058680 _wfindfirst32i64 8 API calls 15178->15182 15181 13f05deb4 _set_errno_from_matherr 13 API calls 15179->15181 15183 13f0682ff 15180->15183 15187 13f068283 15180->15187 15181->15171 15184 13f068226 15182->15184 15183->15166 15185 13f068307 15183->15185 15184->15128 15186 13f05eb18 15 API calls 15185->15186 15186->15178 15188 13f05eb8c 17 API calls 15187->15188 15189 13f0682c0 15188->15189 15190 13f0682e7 15189->15190 15191 13f0682c4 15189->15191 15190->15178 15194 13f05a4f8 __vcrt_freefls 14 API calls 15190->15194 15192 13f05ec70 30 API calls 15191->15192 15193 13f0682cd 15192->15193 15193->15178 15195 13f05a4f8 __vcrt_freefls 14 API calls 15193->15195 15194->15178 15195->15178 15197 13f067aad 15196->15197 15198 13f067ad1 15196->15198 15197->15198 15199 13f067ab2 15197->15199 15200 13f067b0b 15198->15200 15203 13f067b2a 15198->15203 15201 13f05deb4 _set_errno_from_matherr 13 API calls 15199->15201 15202 13f05deb4 _set_errno_from_matherr 13 API calls 15200->15202 15204 13f067ab7 15201->15204 15205 13f067b10 15202->15205 15206 13f05be30 33 API calls 15203->15206 15207 13f063618 _invalid_parameter_noinfo 30 API calls 15204->15207 15208 13f063618 _invalid_parameter_noinfo 30 API calls 15205->15208 15210 13f067b37 15206->15210 15209 13f067ac2 15207->15209 15211 13f067b1b 15208->15211 15209->15100 15210->15211 15212 13f06d3f8 34 API calls 15210->15212 15211->15100 15212->15210 15214 13f0597d0 __scrt_get_show_window_mode 15213->15214 15215 13f06796a GetCurrentDirectoryW 15214->15215 15216 13f0679a8 15215->15216 15217 13f067981 15215->15217 15218 13f063680 _invalid_parameter_noinfo 13 API calls 15216->15218 15219 13f058680 _wfindfirst32i64 8 API calls 15217->15219 15220 13f0679b7 15218->15220 15223 13f067a15 15219->15223 15221 13f0679c1 GetCurrentDirectoryW 15220->15221 15222 13f0679d0 15220->15222 15221->15222 15224 13f0679d5 15221->15224 15225 13f05deb4 _set_errno_from_matherr 13 API calls 15222->15225 15223->15113 15226 13f0636f8 __free_lconv_mon 13 API calls 15224->15226 15225->15224 15226->15217 15228 13f054298 15227->15228 15229 13f05430b 15228->15229 15231 13f054490 42 API calls 15228->15231 15230 13f054310 GetTempPathW 15229->15230 15232 13f054325 15230->15232 15233 13f0542c4 15231->15233 15245 13f0543e6 15232->15245 15247 13f05a4f8 __vcrt_freefls 14 API calls 15232->15247 15251 13f054371 15232->15251 15313 13f060fcc 15232->15313 15316 13f055320 15232->15316 15281 13f053fb0 15233->15281 15235 13f0542cf 15248 13f054304 15235->15248 15303 13f05fd9c 15235->15303 15237 13f058680 _wfindfirst32i64 8 API calls 15240 13f05424d 15237->15240 15240->14953 15240->14959 15241 13f05a4f8 __vcrt_freefls 14 API calls 15243 13f0542f4 15241->15243 15243->15230 15244 13f0542f8 15243->15244 15246 13f051dd0 18 API calls 15244->15246 15249 13f0555c0 18 API calls 15245->15249 15246->15248 15247->15232 15248->15237 15250 13f0543f7 15249->15250 15252 13f05a4f8 __vcrt_freefls 14 API calls 15250->15252 15251->15248 15254 13f0554b0 16 API calls 15251->15254 15253 13f0543ff 15252->15253 15253->15248 15255 13f0554b0 16 API calls 15253->15255 15256 13f054387 15254->15256 15257 13f054415 15255->15257 15258 13f0543c9 SetEnvironmentVariableW 15256->15258 15259 13f05438c 15256->15259 15260 13f05444d SetEnvironmentVariableW 15257->15260 15261 13f05441a 15257->15261 15262 13f05a4f8 __vcrt_freefls 14 API calls 15258->15262 15263 13f0554b0 16 API calls 15259->15263 15265 13f054448 15260->15265 15264 13f0554b0 16 API calls 15261->15264 15262->15248 15266 13f05439c 15263->15266 15267 13f05442a 15264->15267 15268 13f05a4f8 __vcrt_freefls 14 API calls 15265->15268 15269 13f05fd9c 31 API calls 15266->15269 15271 13f05fd9c 31 API calls 15267->15271 15268->15248 15270 13f0543aa 15269->15270 15272 13f05a4f8 __vcrt_freefls 14 API calls 15270->15272 15273 13f054438 15271->15273 15274 13f0543b2 15272->15274 15275 13f05a4f8 __vcrt_freefls 14 API calls 15273->15275 15276 13f05a4f8 __vcrt_freefls 14 API calls 15274->15276 15277 13f054440 15275->15277 15278 13f0543ba 15276->15278 15279 13f05a4f8 __vcrt_freefls 14 API calls 15277->15279 15280 13f05a4f8 __vcrt_freefls 14 API calls 15278->15280 15279->15265 15280->15248 15282 13f053fbc 15281->15282 15283 13f0554b0 16 API calls 15282->15283 15284 13f053fde 15283->15284 15285 13f053fe6 15284->15285 15286 13f053ff9 ExpandEnvironmentStringsW 15284->15286 15287 13f051dd0 18 API calls 15285->15287 15288 13f05a4f8 __vcrt_freefls 14 API calls 15286->15288 15295 13f053ff2 15287->15295 15289 13f054022 15288->15289 15290 13f054026 15289->15290 15291 13f054039 15289->15291 15292 13f051dd0 18 API calls 15290->15292 15293 13f05ed58 39 API calls 15291->15293 15292->15295 15296 13f05404e 15293->15296 15294 13f058680 _wfindfirst32i64 8 API calls 15297 13f0540f2 15294->15297 15295->15294 15298 13f054056 15296->15298 15300 13f054066 __scrt_get_show_window_mode 15296->15300 15297->15235 15299 13f051dd0 18 API calls 15298->15299 15299->15295 15301 13f0540cc CreateDirectoryW 15300->15301 15302 13f0540a9 CreateDirectoryW 15300->15302 15301->15295 15302->15300 15304 13f05fda9 15303->15304 15305 13f05fdbc 15303->15305 15307 13f05deb4 _set_errno_from_matherr 13 API calls 15304->15307 15334 13f05fa18 15305->15334 15309 13f05fdae 15307->15309 15311 13f063618 _invalid_parameter_noinfo 30 API calls 15309->15311 15310 13f0542ea 15310->15241 15311->15310 15342 13f060c30 15313->15342 15317 13f058610 15316->15317 15318 13f055330 GetCurrentProcess OpenProcessToken 15317->15318 15319 13f0553f1 15318->15319 15320 13f05537b GetTokenInformation 15318->15320 15321 13f05a4f8 __vcrt_freefls 14 API calls 15319->15321 15322 13f0553a8 15320->15322 15323 13f05539d GetLastError 15320->15323 15324 13f0553f9 15321->15324 15322->15319 15327 13f0553be GetTokenInformation 15322->15327 15323->15319 15323->15322 15325 13f055404 CloseHandle 15324->15325 15326 13f05540a 15324->15326 15325->15326 15329 13f055433 LocalFree ConvertStringSecurityDescriptorToSecurityDescriptorW 15326->15329 15327->15319 15328 13f0553e4 ConvertSidToStringSidW 15327->15328 15328->15319 15330 13f055466 CreateDirectoryW 15329->15330 15331 13f055478 15329->15331 15330->15331 15332 13f058680 _wfindfirst32i64 8 API calls 15331->15332 15333 13f055491 15332->15333 15333->15232 15341 13f068a68 EnterCriticalSection 15334->15341 15385 13f0698f0 15342->15385 15435 13f0695e0 15385->15435 15456 13f068a68 EnterCriticalSection 15435->15456 15461 13f054550 15458->15461 15459 13f058680 _wfindfirst32i64 8 API calls 15460 13f054143 15459->15460 15460->14967 15460->14968 15469 13f054709 15461->15469 15499 13f05eae8 15461->15499 15463 13f0546b9 15464 13f0554b0 16 API calls 15463->15464 15466 13f0546d1 15464->15466 15465 13f0546f8 15468 13f052e30 98 API calls 15465->15468 15466->15465 15508 13f051ee0 15466->15508 15468->15469 15469->15459 15470 13f05eae8 37 API calls 15471 13f0545dd 15470->15471 15471->15463 15471->15469 15471->15470 15472 13f0554b0 16 API calls 15471->15472 15473 13f055320 32 API calls 15471->15473 15472->15471 15473->15471 15475 13f05a605 15474->15475 15476 13f05a615 15474->15476 15477 13f05deb4 _set_errno_from_matherr 13 API calls 15475->15477 15476->14983 15478 13f05a60a 15477->15478 15479 13f063618 _invalid_parameter_noinfo 30 API calls 15478->15479 15479->15476 15481 13f060ff0 15480->15481 15482 13f06102d 15481->15482 15483 13f06100c 15481->15483 15532 13f05b590 EnterCriticalSection 15482->15532 15484 13f05deb4 _set_errno_from_matherr 13 API calls 15483->15484 15486 13f061011 15484->15486 15488 13f063618 _invalid_parameter_noinfo 30 API calls 15486->15488 15490 13f06101b 15488->15490 15490->14973 15500 13f06699c 33 API calls 15499->15500 15502 13f05eafd 15500->15502 15501 13f0681d5 15519 13f058a18 15501->15519 15502->15501 15505 13f0680fc 15502->15505 15506 13f058680 _wfindfirst32i64 8 API calls 15505->15506 15507 13f0681ca 15506->15507 15507->15471 15509 13f051f00 __scrt_get_show_window_mode 15508->15509 15510 13f0554b0 16 API calls 15509->15510 15511 13f051f7a 15510->15511 15512 13f051f7f 15511->15512 15513 13f051fb9 MessageBoxA 15511->15513 15514 13f0554b0 16 API calls 15512->15514 15515 13f051fd3 15513->15515 15516 13f051f99 MessageBoxW 15514->15516 15517 13f058680 _wfindfirst32i64 8 API calls 15515->15517 15516->15515 15518 13f051fe3 15517->15518 15518->15465 15522 13f058a2c IsProcessorFeaturePresent 15519->15522 15523 13f058a42 15522->15523 15528 13f058ac8 RtlCaptureContext RtlLookupFunctionEntry 15523->15528 15529 13f058af8 RtlVirtualUnwind 15528->15529 15530 13f058a56 15528->15530 15529->15530 15531 13f058910 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15530->15531 15534 13f060a54 15533->15534 15550 13f060b07 memcpy_s 15533->15550 15535 13f060b17 15534->15535 15537 13f060a6b 15534->15537 15540 13f066b18 _invalid_parameter_noinfo 13 API calls 15535->15540 15535->15550 15536 13f05deb4 _set_errno_from_matherr 13 API calls 15538 13f054b80 15536->15538 15563 13f068a68 EnterCriticalSection 15537->15563 15538->14061 15542 13f060b33 15540->15542 15547 13f063738 _fread_nolock 14 API calls 15542->15547 15542->15550 15547->15550 15550->15536 15550->15538 15552 13f0605e9 15551->15552 15555 13f0605fe 15551->15555 15553 13f05de94 _fread_nolock 13 API calls 15552->15553 15554 13f0605ee 15553->15554 15557 13f05deb4 _set_errno_from_matherr 13 API calls 15554->15557 15556 13f05de94 _fread_nolock 13 API calls 15555->15556 15559 13f0605f6 15555->15559 15558 13f060639 15556->15558 15557->15559 15560 13f05deb4 _set_errno_from_matherr 13 API calls 15558->15560 15559->14071 15561 13f060641 15560->15561 15562 13f063618 _invalid_parameter_noinfo 30 API calls 15561->15562 15562->15559 15566 13f054d5c 15564->15566 15565 13f058680 _wfindfirst32i64 8 API calls 15567 13f054e28 15565->15567 15568 13f054dda 15566->15568 15569 13f054df9 15566->15569 15577 13f054df7 15566->15577 15567->14100 15570 13f0555c0 18 API calls 15568->15570 15571 13f060c08 15 API calls 15569->15571 15572 13f054ded 15570->15572 15573 13f054e01 15571->15573 15575 13f054730 37 API calls 15572->15575 15574 13f054e05 Sleep 15573->15574 15573->15577 15576 13f060c08 15 API calls 15574->15576 15575->15577 15576->15577 15577->15565 15579 13f060c16 GetLastError 15578->15579 15581 13f060c23 15578->15581 15580 13f05de44 _fread_nolock 13 API calls 15579->15580 15580->15581 15581->14100 15583 13f06010f 15582->15583 15584 13f06010a 15582->15584 15583->14089 15585 13f05deb4 _set_errno_from_matherr 13 API calls 15584->15585 15585->15583 15587 13f05fde2 GetLastError 15586->15587 15588 13f054a54 15586->15588 15589 13f05de44 _fread_nolock 13 API calls 15587->15589 15588->14094 15589->15588 15591 13f06699c 33 API calls 15590->15591 15592 13f06280d 15591->15592 15593 13f06292c 33 API calls 15592->15593 15594 13f062823 15593->15594 16102 13f069a44 16113 13f06f2fc 16102->16113 16114 13f06f327 16113->16114 16115 13f0636f8 __free_lconv_mon 13 API calls 16114->16115 16116 13f06f33f 16114->16116 16115->16114 16117 13f0636f8 __free_lconv_mon 13 API calls 16116->16117 16118 13f069a4d 16116->16118 16117->16116 16119 13f068a68 EnterCriticalSection 16118->16119 17090 13f067ccc 17091 13f067eb4 17090->17091 17093 13f067d0f _isindst 17090->17093 17092 13f05deb4 _set_errno_from_matherr 13 API calls 17091->17092 17108 13f067ea6 17092->17108 17093->17091 17096 13f067d8b _isindst 17093->17096 17094 13f058680 _wfindfirst32i64 8 API calls 17095 13f067ecf 17094->17095 17111 13f06df4c 17096->17111 17101 13f067ee0 17103 13f063638 _wfindfirst32i64 17 API calls 17101->17103 17105 13f067ef4 17103->17105 17108->17094 17109 13f067de8 17109->17108 17135 13f06df8c 17109->17135 17112 13f067da9 17111->17112 17113 13f06df5a 17111->17113 17117 13f06d518 17112->17117 17142 13f068a68 EnterCriticalSection 17113->17142 17118 13f06d521 17117->17118 17122 13f067dbe 17117->17122 17119 13f05deb4 _set_errno_from_matherr 13 API calls 17118->17119 17120 13f06d526 17119->17120 17121 13f063618 _invalid_parameter_noinfo 30 API calls 17120->17121 17121->17122 17122->17101 17123 13f06d548 17122->17123 17124 13f067dcf 17123->17124 17125 13f06d551 17123->17125 17124->17101 17129 13f06d578 17124->17129 17126 13f05deb4 _set_errno_from_matherr 13 API calls 17125->17126 17127 13f06d556 17126->17127 17128 13f063618 _invalid_parameter_noinfo 30 API calls 17127->17128 17128->17124 17130 13f06d581 17129->17130 17132 13f067de0 17129->17132 17131 13f05deb4 _set_errno_from_matherr 13 API calls 17130->17131 17133 13f06d586 17131->17133 17132->17101 17132->17109 17134 13f063618 _invalid_parameter_noinfo 30 API calls 17133->17134 17134->17132 17143 13f068a68 EnterCriticalSection 17135->17143 15595 13f059d98 15602 13f05a064 15595->15602 15598 13f059da5 15614 13f05a348 15602->15614 15604 13f059da1 15604->15598 15607 13f059ff8 15604->15607 15606 13f05a098 __vcrt_uninitialize_locks DeleteCriticalSection 15606->15604 15619 13f05a21c 15607->15619 15615 13f05a0d0 __vcrt_FlsAlloc 5 API calls 15614->15615 15616 13f05a37e 15615->15616 15617 13f05a393 InitializeCriticalSectionAndSpinCount 15616->15617 15618 13f05a07c 15616->15618 15617->15618 15618->15604 15618->15606 15620 13f05a0d0 __vcrt_FlsAlloc 5 API calls 15619->15620 15621 13f05a241 TlsAlloc 15620->15621 15623 13f061ce0 15624 13f061cf9 15623->15624 15625 13f061cf0 15623->15625 15625->15624 15629 13f06181c 15625->15629 15630 13f061835 15629->15630 15636 13f061831 15629->15636 15647 13f06acac GetEnvironmentStringsW 15630->15647 15633 13f061842 15635 13f0636f8 __free_lconv_mon 13 API calls 15633->15635 15635->15636 15636->15624 15639 13f061bb8 15636->15639 15638 13f0636f8 __free_lconv_mon 13 API calls 15638->15633 15640 13f061bd3 15639->15640 15645 13f061be6 15639->15645 15640->15624 15641 13f067c10 MultiByteToWideChar _fread_nolock 15641->15645 15642 13f063680 _invalid_parameter_noinfo 13 API calls 15642->15645 15643 13f061c5c 15644 13f0636f8 __free_lconv_mon 13 API calls 15643->15644 15644->15640 15645->15640 15645->15641 15645->15642 15645->15643 15646 13f0636f8 __free_lconv_mon 13 API calls 15645->15646 15646->15645 15648 13f06183a 15647->15648 15649 13f06acd0 15647->15649 15648->15633 15654 13f06198c 15648->15654 15650 13f063738 _fread_nolock 14 API calls 15649->15650 15652 13f06ad0a memcpy_s 15650->15652 15651 13f0636f8 __free_lconv_mon 13 API calls 15653 13f06ad2a FreeEnvironmentStringsW 15651->15653 15652->15651 15653->15648 15655 13f0619b4 15654->15655 15656 13f063680 _invalid_parameter_noinfo 13 API calls 15655->15656 15666 13f0619ef 15656->15666 15657 13f061a64 15658 13f0636f8 __free_lconv_mon 13 API calls 15657->15658 15659 13f06184f 15658->15659 15659->15638 15660 13f063680 _invalid_parameter_noinfo 13 API calls 15660->15666 15661 13f061a55 15680 13f061aa0 15661->15680 15665 13f0636f8 __free_lconv_mon 13 API calls 15665->15657 15666->15657 15666->15660 15666->15661 15667 13f061a8c 15666->15667 15668 13f0636f8 __free_lconv_mon 13 API calls 15666->15668 15671 13f068bf8 15666->15671 15669 13f063638 _wfindfirst32i64 17 API calls 15667->15669 15668->15666 15670 13f061a9e 15669->15670 15672 13f068c05 15671->15672 15673 13f068c0f 15671->15673 15672->15673 15678 13f068c2b 15672->15678 15674 13f05deb4 _set_errno_from_matherr 13 API calls 15673->15674 15675 13f068c17 15674->15675 15676 13f063618 _invalid_parameter_noinfo 30 API calls 15675->15676 15677 13f068c23 15676->15677 15677->15666 15678->15677 15679 13f05deb4 _set_errno_from_matherr 13 API calls 15678->15679 15679->15675 15681 13f061aa5 15680->15681 15682 13f061a5d 15680->15682 15683 13f061ace 15681->15683 15684 13f0636f8 __free_lconv_mon 13 API calls 15681->15684 15682->15665 15685 13f0636f8 __free_lconv_mon 13 API calls 15683->15685 15684->15681 15685->15682 16851 13f0606a0 16856 13f068a68 EnterCriticalSection 16851->16856 15686 13f061f5c 15687 13f061fc3 15686->15687 15688 13f061f79 GetModuleHandleW 15686->15688 15696 13f061e54 15687->15696 15688->15687 15694 13f061f86 15688->15694 15694->15687 15710 13f062064 GetModuleHandleExW 15694->15710 15716 13f068a68 EnterCriticalSection 15696->15716 15711 13f0620a9 15710->15711 15712 13f06208a GetProcAddress 15710->15712 15714 13f0620b3 FreeLibrary 15711->15714 15715 13f0620b9 15711->15715 15712->15711 15713 13f0620a1 15712->15713 15713->15711 15714->15715 15715->15687 16014 13f071b1b 16015 13f071b2a 16014->16015 16017 13f071b34 16014->16017 16018 13f068abc LeaveCriticalSection 16015->16018 16019 13f06681c 16020 13f066821 16019->16020 16021 13f066836 16019->16021 16025 13f06683c 16020->16025 16026 13f06687e 16025->16026 16027 13f066886 16025->16027 16028 13f0636f8 __free_lconv_mon 13 API calls 16026->16028 16029 13f0636f8 __free_lconv_mon 13 API calls 16027->16029 16028->16027 16030 13f066893 16029->16030 16031 13f0636f8 __free_lconv_mon 13 API calls 16030->16031 16032 13f0668a0 16031->16032 16033 13f0636f8 __free_lconv_mon 13 API calls 16032->16033 16034 13f0668ad 16033->16034 16035 13f0636f8 __free_lconv_mon 13 API calls 16034->16035 16036 13f0668ba 16035->16036 16037 13f0636f8 __free_lconv_mon 13 API calls 16036->16037 16038 13f0668c7 16037->16038 16039 13f0636f8 __free_lconv_mon 13 API calls 16038->16039 16040 13f0668d4 16039->16040 16041 13f0636f8 __free_lconv_mon 13 API calls 16040->16041 16042 13f0668e1 16041->16042 16043 13f0636f8 __free_lconv_mon 13 API calls 16042->16043 16044 13f0668f1 16043->16044 16045 13f0636f8 __free_lconv_mon 13 API calls 16044->16045 16046 13f066901 16045->16046 16051 13f0666ec 16046->16051 16065 13f068a68 EnterCriticalSection 16051->16065
                C-Code - Quality: 69%
                			E0000000113F05876C(intOrPtr* __rax, long long __rbx, void* __r8, long long _a8) {
                				char _v24;
                				void* _t9;
                				void* _t10;
                				void* _t11;
                				signed short _t21;
                				void* _t23;
                				void* _t27;
                				intOrPtr _t37;
                				intOrPtr* _t56;
                				long long _t57;
                				void* _t70;
                				void* _t72;
                				void* _t73;
                				void* _t81;
                
                				_t58 = __rbx;
                				_t56 = __rax;
                				E0000000113F0590F8(); // executed
                				SetUnhandledExceptionFilter(??);
                				goto 0x3f06225c;
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				_a8 = __rbx;
                				_t9 = E0000000113F058BE8(1); // executed
                				if (_t9 == 0) goto 0x3f0588d4;
                				dil = 0;
                				_v24 = dil;
                				_t10 = E0000000113F058BAC();
                				_t37 =  *0x3f0912a0; // 0x2
                				if (_t37 == 1) goto 0x3f0588df;
                				if (_t37 != 0) goto 0x3f058810;
                				 *0x3f0912a0 = 1;
                				_t11 = E0000000113F061E14(__rbx, 0x3f072380, 0x3f0723b8); // executed
                				if (_t11 == 0) goto 0x3f0587f1;
                				goto 0x3f0588c9;
                				E0000000113F061DB0(_t58, 0x3f072368, 0x3f072378, _t72, _t73); // executed
                				 *0x3f0912a0 = 2;
                				goto 0x3f058818;
                				dil = 1;
                				_v24 = dil;
                				E0000000113F058EFC(E0000000113F058D58(_t10, 0x3f072378));
                				if ( *_t56 == 0) goto 0x3f05884b;
                				if (E0000000113F058CC0(_t56, _t56) == 0) goto 0x3f05884b;
                				r8d = 0;
                				_t57 =  *_t56;
                				E0000000113F058F04( *0x3f072350(_t70));
                				if ( *_t57 == 0) goto 0x3f05886d;
                				if (E0000000113F058CC0(_t57, _t57) == 0) goto 0x3f05886d;
                				E0000000113F0620F4( *_t57);
                				_t21 = E0000000113F059060(0x3f072378);
                				E0000000113F061D5C();
                				r9d = _t21 & 0x0000ffff;
                				_t80 = _t57;
                				_t23 = E0000000113F051000(_t57, 0x13f050000, _t57, _t81); // executed
                				if (E0000000113F0590A4(_t57) == 0) goto 0x3f0588e9;
                				if (dil != 0) goto 0x3f0588a3;
                				E0000000113F0620D8(0x13f050000, 0x3f072378, _t57);
                				E0000000113F058D7C(1, 0);
                				_t27 = _t23;
                				if (E0000000113F0590A4(_t57) == 0) goto 0x3f0588f1;
                				if (_v24 != 0) goto 0x3f0588c7;
                				E0000000113F0620C8(0x13f050000, 0x3f072378, _t80);
                				return _t27;
                			}

















                0x13f05876c
                0x13f05876c
                0x13f058770
                0x13f058775
                0x13f058780
                0x13f058785
                0x13f058786
                0x13f058787
                0x13f058788
                0x13f058797
                0x13f05879e
                0x13f0587a4
                0x13f0587a7
                0x13f0587ac
                0x13f0587b3
                0x13f0587bc
                0x13f0587c4
                0x13f0587c6
                0x13f0587de
                0x13f0587e5
                0x13f0587ec
                0x13f0587ff
                0x13f058804
                0x13f05880e
                0x13f058810
                0x13f058813
                0x13f05881f
                0x13f05882b
                0x13f058837
                0x13f058839
                0x13f058842
                0x13f05884b
                0x13f058857
                0x13f058863
                0x13f058868
                0x13f05886d
                0x13f058875
                0x13f05887a
                0x13f05887d
                0x13f058889
                0x13f058897
                0x13f05889c
                0x13f05889e
                0x13f0588a7
                0x13f0588ac
                0x13f0588b9
                0x13f0588c0
                0x13f0588c2
                0x13f0588d3

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled_invalid_parameter_noinfo
                • String ID:
                • API String ID: 59578552-0
                • Opcode ID: ed82aac568f9e4e1cfdfc06df3119b0967ea7a1b2384f7998913628c2db1f86f
                • Instruction ID: 2ef9d6c54deedf9b8e2cae341aff6e62cbf23af1b7643ffd4e0e660f52075e83
                • Opcode Fuzzy Hash: ed82aac568f9e4e1cfdfc06df3119b0967ea7a1b2384f7998913628c2db1f86f
                • Instruction Fuzzy Hash: 39E0EC30E0A142D6FE2D376D48863DD12939B95334F70023EB129457D3C9AC47975A52
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressProc$ByteCharErrorFormatLastLibraryLoadMessageMultiWide
                • String ID: 8$ActivateActCtx$CreateActCtxW$Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$kernel32$win32_utils_from_utf8
                • API String ID: 476984482-1231727188
                • Opcode ID: 0548a4c0f8eb75113115b62862c40b8c16fe3ccc2b8c33da1473ff33f0839aab
                • Instruction ID: 75aa9acc26664c6809158947388aeeaa506ff9c16b9c218bae4e0b75357eeac2
                • Opcode Fuzzy Hash: 0548a4c0f8eb75113115b62862c40b8c16fe3ccc2b8c33da1473ff33f0839aab
                • Instruction Fuzzy Hash: E1417A31A14B8081FA18CB2AE81839963A3F7847A4F544379F96D437E6EF78C64AC740
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 24 13f051710-13f051731 25 13f051752-13f051768 call 13f05a50c 24->25 26 13f051733-13f05173e call 13f052e30 24->26 31 13f05176e-13f05177e call 13f05abb4 25->31 32 13f05182f-13f05183a call 13f05a4f8 25->32 30 13f051743-13f05174c 26->30 30->25 33 13f051861-13f051866 30->33 31->32 39 13f051784-13f051793 call 13f05b08c 31->39 32->33 40 13f05183c-13f05184c call 13f05abb4 32->40 34 13f0519d3-13f0519eb 33->34 39->32 45 13f051799 39->45 46 13f05184e-13f05185c call 13f051b30 40->46 47 13f05186b-13f051884 call 13f05a8e4 40->47 50 13f0517a0-13f0517b9 45->50 46->33 54 13f051886 47->54 55 13f0518a3-13f0518ff call 13f05abb4 call 13f05a50c 47->55 52 13f051817-13f051824 call 13f05a4f8 50->52 53 13f0517bb-13f0517cb call 13f05abb4 50->53 52->34 53->52 64 13f0517cd-13f0517db call 13f05a8e4 53->64 58 13f05188d-13f05189e call 13f051b30 54->58 71 13f051901-13f051919 call 13f051b30 55->71 72 13f05191e-13f051937 call 13f05a8e4 55->72 58->34 69 13f0517e0-13f0517e3 64->69 69->52 70 13f0517e5-13f0517ec 69->70 73 13f05180e-13f051815 70->73 74 13f0517ee-13f0517fc 70->74 71->34 82 13f051945-13f05195b call 13f05a628 72->82 83 13f051939-13f051940 72->83 73->50 73->52 78 13f051800-13f051803 74->78 80 13f051805-13f05180c 78->80 81 13f051829-13f05182c 78->81 80->73 80->78 81->32 86 13f05195d-13f05196e call 13f051dd0 82->86 87 13f051970-13f051978 82->87 83->58 86->34 89 13f0519c1-13f0519c7 87->89 90 13f05197a 87->90 91 13f0519d1 89->91 92 13f0519c9 call 13f05a598 89->92 94 13f051980-13f0519ab 90->94 91->34 99 13f0519ce 92->99 96 13f0519b5-13f0519bc call 13f051dd0 94->96 97 13f0519ad-13f0519b1 94->97 96->89 97->94 100 13f0519b3 97->100 99->91 100->89
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _fread_nolock$Message
                • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC.$Could not read from file.$Error on file.$failed to read cookie.$failed to seek to cookie position.$fread$fseek$malloc
                • API String ID: 677216364-63831892
                • Opcode ID: 4be35930f3c3cc1a7a8f9f153977e08747c6aa5c0a617e057d7157d4cd31378f
                • Instruction ID: cb9860a2fcb4c0244ac321aa5c12d1dcfe69c7968b8a870d159ee2140bb712ba
                • Opcode Fuzzy Hash: 4be35930f3c3cc1a7a8f9f153977e08747c6aa5c0a617e057d7157d4cd31378f
                • Instruction Fuzzy Hash: 02818C71B09610D6EA6CDB2DD5483E823A2FB45B94F44853AFB1D87B83DBB4D662C700
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 101 13f06e914-13f06e987 call 13f06e644 104 13f06e9a1-13f06e9ab call 13f0603e4 101->104 105 13f06e989-13f06e992 call 13f05de94 101->105 111 13f06e9c6-13f06ea2f CreateFileW 104->111 112 13f06e9ad-13f06e9c4 call 13f05de94 call 13f05deb4 104->112 110 13f06e995-13f06e99c call 13f05deb4 105->110 124 13f06ecda-13f06ecfa 110->124 115 13f06ea31-13f06ea37 111->115 116 13f06eaac-13f06eab7 GetFileType 111->116 112->110 121 13f06ea79-13f06eaa7 GetLastError call 13f05de44 115->121 122 13f06ea39-13f06ea3d 115->122 118 13f06eab9-13f06eaf4 GetLastError call 13f05de44 CloseHandle 116->118 119 13f06eb0a-13f06eb11 116->119 118->110 135 13f06eafa-13f06eb05 call 13f05deb4 118->135 127 13f06eb13-13f06eb17 119->127 128 13f06eb19-13f06eb1c 119->128 121->110 122->121 129 13f06ea3f-13f06ea77 CreateFileW 122->129 133 13f06eb22-13f06eb73 call 13f0602fc 127->133 128->133 134 13f06eb1e 128->134 129->116 129->121 139 13f06eb75-13f06eb81 call 13f06e850 133->139 140 13f06eb92-13f06ebc2 call 13f06e3b0 133->140 134->133 135->110 139->140 146 13f06eb83 139->146 147 13f06eb85-13f06eb8d call 13f0638b0 140->147 148 13f06ebc4-13f06ec07 140->148 146->147 147->124 150 13f06ec29-13f06ec34 148->150 151 13f06ec09-13f06ec0d 148->151 154 13f06ecd8 150->154 155 13f06ec3a-13f06ec3e 150->155 151->150 153 13f06ec0f-13f06ec24 151->153 153->150 154->124 155->154 156 13f06ec44-13f06ec89 CloseHandle CreateFileW 155->156 157 13f06ecbe-13f06ecd3 156->157 158 13f06ec8b-13f06ecb9 GetLastError call 13f05de44 call 13f060524 156->158 157->154 158->157
                C-Code - Quality: 42%
                			E0000000113F06E914(void* __ecx, void* __edi, void* __ebp, void* __eflags, long long __rbx, long long __rcx, signed int* __rdx, long long __rdi, long long __rsi, long long __r8) {
                				void* __rbp;
                				signed int _t152;
                				long _t165;
                				void* _t169;
                				intOrPtr _t171;
                				intOrPtr _t174;
                				void* _t185;
                				signed int _t188;
                				signed int _t189;
                				void* _t213;
                				void* _t217;
                				intOrPtr* _t238;
                				intOrPtr* _t241;
                				long long _t253;
                				long long _t261;
                				signed long long _t267;
                				signed long long _t281;
                				intOrPtr _t282;
                				signed long long _t283;
                				signed long long _t302;
                				signed int* _t307;
                				long long _t310;
                				void* _t312;
                				void* _t313;
                				intOrPtr* _t315;
                				void* _t316;
                				void* _t324;
                				void* _t326;
                				void* _t330;
                				void* _t334;
                
                				_t217 = __ebp;
                				_t213 = __edi;
                				_t238 = _t315;
                				 *((long long*)(_t238 + 8)) = __rbx;
                				 *((long long*)(_t238 + 0x10)) = __rsi;
                				 *((long long*)(_t238 + 0x20)) = __rdi;
                				 *((long long*)(_t238 + 0x18)) = __r8;
                				_t313 = _t238 - 0x47;
                				_t316 = _t315 - 0xb0;
                				r12d = r9d;
                				_t261 = __r8;
                				r9d =  *(_t313 + 0x77);
                				_t307 = __rdx;
                				r8d =  *(_t313 + 0x6f);
                				_t310 = __rcx;
                				E0000000113F06E644(r12d, __eflags, _t238, __r8, _t313 - 1, _t313);
                				asm("movups xmm0, [eax]");
                				asm("movsd xmm1, [eax+0x10]");
                				asm("movups [ebp-0x49], xmm0");
                				asm("psrldq xmm0, 0x8");
                				asm("dec cx");
                				asm("movsd [ebp-0x31], xmm1");
                				asm("movsd [ebp-0x39], xmm1");
                				 *(_t313 - 0x21) = _t334 >> 0x20;
                				if (r15d != 0xffffffff) goto 0x3f06e9a1;
                				E0000000113F05DE94(_t238);
                				 *_t238 = 0;
                				 *__rdx =  *__rdx | 0xffffffff;
                				E0000000113F05DEB4(_t238);
                				goto 0x3f06ecda;
                				_t152 = E0000000113F0603E4(r12d, _t238, __r8, __rdx, __rdx, _t310);
                				 *__rdx = _t152;
                				if (_t152 != 0xffffffff) goto 0x3f06e9c6;
                				E0000000113F05DE94(_t238);
                				 *_t238 = 0;
                				 *__rdx =  *__rdx | 0xffffffff;
                				E0000000113F05DEB4(_t238);
                				 *_t238 = 0x18;
                				goto 0x3f06e995;
                				r8d = r15d;
                				r14d = r14d |  *(_t313 - 0x39);
                				 *_t310 = 1;
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				 *(_t316 + 0x28) = r14d;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				 *((intOrPtr*)(_t313 - 0x19)) = 0x18;
                				 *((long long*)(_t313 - 0x11)) = _t310;
                				 *(_t313 - 9) =  !(r12d >> 7) & 0x00000001;
                				 *(_t313 - 0x29) =  *(_t313 - 0x39) >> 0x20;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??); // executed
                				_t188 =  *(_t313 - 0x45);
                				if (_t238 != 0xffffffff) goto 0x3f06eaac;
                				if ((_t188 & 0xc0000000) != 0xc0000000) goto 0x3f06ea79;
                				if ((r12b & 0x00000001) == 0) goto 0x3f06ea79;
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				asm("btr ebx, 0x1f");
                				 *(_t313 - 0x45) = _t188;
                				r8d = r15d;
                				 *(_t316 + 0x28) = r14d;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				CreateFileW(??, ??, ??, ??, ??, ??, ??);
                				if (_t238 != 0xffffffff) goto 0x3f06eaac;
                				_t267 =  *__rdx;
                				_t241 =  *((intOrPtr*)(0x3f0917a0 + (_t267 >> 6) * 8));
                				 *(_t241 + 0x38 + (_t267 + _t267 * 8) * 8) =  *(_t241 + 0x38 + (_t267 + _t267 * 8) * 8) & 0x000000fe;
                				E0000000113F05DE44(GetLastError(), _t241, _t261);
                				goto 0x3f06e995;
                				_t165 = GetFileType(_t334); // executed
                				if (_t165 != 0) goto 0x3f06eb0a;
                				_t189 = GetLastError();
                				E0000000113F05DE44(_t166, _t241, _t261);
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) & 0x000000fe;
                				CloseHandle(_t330);
                				if (_t189 != 0) goto 0x3f06e995;
                				_t169 = E0000000113F05DEB4(_t241);
                				 *_t241 = 0xd;
                				goto 0x3f06e995;
                				r14b =  *(_t313 - 0x49);
                				if (_t169 != 2) goto 0x3f06eb19;
                				r14b = r14b | 0x00000040;
                				goto 0x3f06eb22;
                				if (_t169 != 3) goto 0x3f06eb22;
                				r14b = r14b | 0x00000008;
                				E0000000113F0602FC(_t169, _t189,  *__rdx, _t261, _t238, __rdx, _t310, _t313, _t326, _t324);
                				r14b = r14b | 0x00000001;
                				 *(_t313 - 0x49) = r14b;
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x38 + ( *__rdx +  *__rdx * 8) * 8) = r14b;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)) + 0x39 + ( *__rdx +  *__rdx * 8) * 8)) = sil;
                				if ((r12b & 0x00000002) == 0) goto 0x3f06eb92;
                				_t171 = E0000000113F06E850(_t189,  *__rdx, r12d & 0x0000003f, _t261, _t310, _t313 - 0x19);
                				 *((intOrPtr*)(_t313 - 0x4d)) = _t171;
                				if (_t171 == 0) goto 0x3f06eb92;
                				E0000000113F0638B0( *_t307, r12d & 0x0000003f, _t213, _t171,  *((intOrPtr*)(0x3f0917a0 + ( *__rdx >> 6) * 8)), _t261, _t310);
                				goto 0x3f06ecda;
                				asm("movups xmm0, [ebp-0x49]");
                				asm("movsd xmm1, [ebp-0x31]");
                				r8d = r12d;
                				asm("movaps [ebp-0x1], xmm0");
                				 *((intOrPtr*)(_t313 - 0x51)) = sil;
                				asm("movsd [ebp+0xf], xmm1");
                				_t174 = E0000000113F06E3B0( *_t307, _t217, _t261, _t313 - 1, _t310, _t313 - 0x51);
                				_t278 =  *_t307;
                				 *((intOrPtr*)(_t313 - 0x4d)) = _t174;
                				if (_t174 != 0) goto 0x3f06eb85;
                				 *((char*)( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x39 + ( *_t307 + _t278 * 8) * 8)) =  *((intOrPtr*)(_t313 - 0x51));
                				_t281 =  *_t307;
                				_t302 = _t281 + _t281 * 8;
                				_t282 =  *((intOrPtr*)(0x3f0917a0 + (_t281 >> 6) * 8));
                				 *(_t282 + 0x3d + _t302 * 8) =  *(_t282 + 0x3d + _t302 * 8) & 0x000000fe;
                				 *(_t282 + 0x3d + _t302 * 8) =  *(_t282 + 0x3d + _t302 * 8) | r12d >> 0x00000010 & 0x00000001;
                				if ((r14b & 0x00000048) != 0) goto 0x3f06ec29;
                				if ((r12b & 0x00000008) == 0) goto 0x3f06ec29;
                				_t283 =  *_t307;
                				_t253 =  *((intOrPtr*)(0x3f0917a0 + (_t283 >> 6) * 8));
                				 *(_t253 + 0x38 + (_t283 + _t283 * 8) * 8) =  *(_t253 + 0x38 + (_t283 + _t283 * 8) * 8) | 0x00000020;
                				if ((_t189 & 0xc0000000) != 0xc0000000) goto 0x3f06ecd8;
                				if ((r12b & 0x00000001) == 0) goto 0x3f06ecd8;
                				CloseHandle(_t312);
                				r8d =  *(_t313 - 0x21);
                				asm("btr ebx, 0x1f");
                				 *((long long*)(_t316 + 0x30)) = _t310;
                				 *(_t316 + 0x28) = 0xc0000000;
                				 *((intOrPtr*)(_t316 + 0x20)) =  *((intOrPtr*)(_t313 - 0x41));
                				 *(_t313 - 0x45) = _t189;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??);
                				if (_t253 != 0xffffffff) goto 0x3f06ecbe;
                				_t185 = E0000000113F05DE44(GetLastError(), _t253, _t261);
                				 *( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x38 + ( *_t307 +  *_t307 * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x38 + ( *_t307 +  *_t307 * 8) * 8) & 0x000000fe;
                				E0000000113F060524(_t185, _t189,  *_t307, _t261, _t307, _t310);
                				goto 0x3f06e995;
                				 *((long long*)( *((intOrPtr*)(0x3f0917a0 + ( *_t307 >> 6) * 8)) + 0x28 + ( *_t307 +  *_t307 * 8) * 8)) = _t253;
                				return 0;
                			}

































                0x13f06e914
                0x13f06e914
                0x13f06e914
                0x13f06e917
                0x13f06e91b
                0x13f06e91f
                0x13f06e923
                0x13f06e930
                0x13f06e934
                0x13f06e93b
                0x13f06e93e
                0x13f06e941
                0x13f06e945
                0x13f06e948
                0x13f06e94c
                0x13f06e956
                0x13f06e95b
                0x13f06e95e
                0x13f06e963
                0x13f06e967
                0x13f06e96c
                0x13f06e971
                0x13f06e97a
                0x13f06e97f
                0x13f06e987
                0x13f06e989
                0x13f06e990
                0x13f06e992
                0x13f06e995
                0x13f06e99c
                0x13f06e9a1
                0x13f06e9a6
                0x13f06e9ab
                0x13f06e9ad
                0x13f06e9b4
                0x13f06e9b6
                0x13f06e9b9
                0x13f06e9be
                0x13f06e9c4
                0x13f06e9d8
                0x13f06e9e4
                0x13f06e9eb
                0x13f06e9f3
                0x13f06e9f8
                0x13f06e9fd
                0x13f06ea08
                0x13f06ea0f
                0x13f06ea13
                0x13f06ea16
                0x13f06ea1a
                0x13f06ea20
                0x13f06ea2f
                0x13f06ea37
                0x13f06ea3d
                0x13f06ea46
                0x13f06ea4b
                0x13f06ea4f
                0x13f06ea52
                0x13f06ea59
                0x13f06ea5e
                0x13f06ea6a
                0x13f06ea77
                0x13f06ea79
                0x13f06ea91
                0x13f06ea95
                0x13f06eaa2
                0x13f06eaa7
                0x13f06eaaf
                0x13f06eab7
                0x13f06eac1
                0x13f06eac3
                0x13f06eae4
                0x13f06eaec
                0x13f06eaf4
                0x13f06eafa
                0x13f06eaff
                0x13f06eb05
                0x13f06eb0a
                0x13f06eb11
                0x13f06eb13
                0x13f06eb17
                0x13f06eb1c
                0x13f06eb1e
                0x13f06eb27
                0x13f06eb39
                0x13f06eb44
                0x13f06eb50
                0x13f06eb6a
                0x13f06eb73
                0x13f06eb77
                0x13f06eb7c
                0x13f06eb81
                0x13f06eb85
                0x13f06eb8d
                0x13f06eb92
                0x13f06eb9c
                0x13f06eba5
                0x13f06eba8
                0x13f06ebac
                0x13f06ebb0
                0x13f06ebb5
                0x13f06ebba
                0x13f06ebbd
                0x13f06ebc2
                0x13f06ebd9
                0x13f06ebdd
                0x13f06ebea
                0x13f06ebee
                0x13f06ebfa
                0x13f06ebff
                0x13f06ec07
                0x13f06ec0d
                0x13f06ec0f
                0x13f06ec20
                0x13f06ec24
                0x13f06ec34
                0x13f06ec3e
                0x13f06ec47
                0x13f06ec55
                0x13f06ec59
                0x13f06ec5d
                0x13f06ec62
                0x13f06ec69
                0x13f06ec71
                0x13f06ec7c
                0x13f06ec89
                0x13f06ec93
                0x13f06ecad
                0x13f06ecb4
                0x13f06ecb9
                0x13f06ecd3
                0x13f06ecfa

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                • String ID: E4
                • API String ID: 1330151763-1217125225
                • Opcode ID: b5962c6797ef03967ed471b72d4fdb05eff1f6d83bd2944ca28bbdbd86a22b53
                • Instruction ID: 15539e83c6657c907463df9f9f22660e7c8e6bfe8ffc70b5ac7b0d6fc7354c0b
                • Opcode Fuzzy Hash: b5962c6797ef03967ed471b72d4fdb05eff1f6d83bd2944ca28bbdbd86a22b53
                • Instruction Fuzzy Hash: 73C1A136B20A4085EB18DF69C4903ED3772F749BA8F115229EF2A877D6DB38C656C340
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 16%
                			E0000000113F055030(void* __ecx, void* __rax, void* __r8, long long _a24, intOrPtr _a32, long long _a40, long long _a48, char _a56, signed int _a8248) {
                				long _t15;
                				long _t16;
                				void* _t22;
                				signed long long _t32;
                				long long _t37;
                				void* _t39;
                				void* _t47;
                				void* _t52;
                				void* _t53;
                				void* _t54;
                
                				_t22 = __ecx;
                				E0000000113F058610(__ecx, __rax, _t39, _t53, _t54);
                				_t32 =  *0x3f082018; // 0xe88b9cb90319
                				_a8248 = _t32 ^ _t47 - __rax;
                				if (_t22 != 0) goto 0x3f05505d;
                				_t15 = GetLastError();
                				_a40 = _t37;
                				r9d = 0x400;
                				_a32 = 0x1000;
                				r8d = _t15;
                				_a24 =  &_a56;
                				_t16 = FormatMessageW(??, ??, ??, ??, ??, ??, ??); // executed
                				if (_t16 != 0) goto 0x3f0550ac;
                				E0000000113F051C80(_t32 ^ _t47 - __rax, "FormatMessageW", "No error messages generated.\n", __r8, _t52);
                				goto 0x3f055105;
                				_a48 = _t37;
                				_a40 = _t37;
                				r9d = 0xffffffff;
                				_a32 = 0x1000;
                				_a24 = 0x3f08fd30;
                				if (WideCharToMultiByte(??, ??, ??, ??, ??, ??, ??, ??) != 0) goto 0x3f055102;
                				E0000000113F051C80("PyInstaller: FormatMessageW failed.", "WideCharToMultiByte", "Failed to encode wchar_t as UTF-8.\n",  &_a56, _t52);
                				goto 0x3f055105;
                				return E0000000113F058680(0xfde9, 0x3f08fd30, _a8248 ^ _t47 - __rax);
                			}













                0x13f055030
                0x13f055037
                0x13f05503f
                0x13f055049
                0x13f055055
                0x13f055057
                0x13f055064
                0x13f055069
                0x13f05506f
                0x13f055077
                0x13f05507a
                0x13f055086
                0x13f05508e
                0x13f05509e
                0x13f0550aa
                0x13f0550ac
                0x13f0550b6
                0x13f0550bb
                0x13f0550c8
                0x13f0550d2
                0x13f0550e4
                0x13f0550f4
                0x13f055100
                0x13f05511d

                APIs
                • GetLastError.KERNEL32(00000000,000000013F051D00), ref: 000000013F055057
                • FormatMessageW.KERNELBASE ref: 000000013F055086
                • WideCharToMultiByte.KERNEL32 ref: 000000013F0550DC
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$The specified module could not be found.$WideCharToMultiByte
                • API String ID: 2920928814-3888827218
                • Opcode ID: 9a4e6a48eaad6578da8f16e6fd4baa32d3c74e7be901146ed1c8cc6ac9b81eaf
                • Instruction ID: 4973b5f2d89f3819e102118dd613cd7edabfcd48ecd61caf572a314f54abb255
                • Opcode Fuzzy Hash: 9a4e6a48eaad6578da8f16e6fd4baa32d3c74e7be901146ed1c8cc6ac9b81eaf
                • Instruction Fuzzy Hash: C1213371A14A41D2FB689B69EC493D567A7F748384F84013DF54D826A7EB78C74BCB00
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 179 13f064204-13f06422a 180 13f064245-13f064249 179->180 181 13f06422c-13f064240 call 13f05de94 call 13f05deb4 179->181 183 13f064628-13f064634 call 13f05de94 call 13f05deb4 180->183 184 13f06424f-13f064256 180->184 199 13f06463f 181->199 201 13f06463a call 13f063618 183->201 184->183 187 13f06425c-13f06428e 184->187 187->183 188 13f064294-13f06429b 187->188 191 13f0642b4-13f0642b7 188->191 192 13f06429d-13f0642af call 13f05de94 call 13f05deb4 188->192 197 13f064624-13f064626 191->197 198 13f0642bd-13f0642bf 191->198 192->201 202 13f064642-13f064659 197->202 198->197 203 13f0642c5-13f0642c8 198->203 199->202 201->199 203->192 206 13f0642ca-13f0642f0 203->206 208 13f0642f2-13f0642f5 206->208 209 13f06432f-13f064337 206->209 212 13f0642f7-13f0642ff 208->212 213 13f06431d-13f06432a 208->213 210 13f064301-13f064318 call 13f05de94 call 13f05deb4 call 13f063618 209->210 211 13f064339-13f064361 call 13f063738 call 13f0636f8 * 2 209->211 240 13f0644b8 210->240 242 13f064363-13f064379 call 13f05deb4 call 13f05de94 211->242 243 13f06437e-13f0643af call 13f06495c 211->243 212->210 212->213 214 13f0643b3-13f0643c6 213->214 217 13f0643c8-13f0643d0 214->217 218 13f064442-13f06444c call 13f06b9b8 214->218 217->218 221 13f0643d2-13f0643d4 217->221 229 13f0644d6 218->229 230 13f064452-13f064467 218->230 221->218 227 13f0643d6-13f0643ed 221->227 227->218 232 13f0643ef-13f0643fb 227->232 238 13f0644db-13f0644fb ReadFile 229->238 230->229 234 13f064469-13f06447b GetConsoleMode 230->234 232->218 236 13f0643fd-13f0643ff 232->236 234->229 239 13f06447d-13f064485 234->239 236->218 241 13f064401-13f064419 236->241 244 13f064501-13f064509 238->244 245 13f0645ee-13f0645f7 GetLastError 238->245 239->238 248 13f064487-13f0644a9 ReadConsoleW 239->248 251 13f0644bb-13f0644c5 call 13f0636f8 240->251 241->218 252 13f06441b-13f064427 241->252 242->240 243->214 244->245 246 13f06450f 244->246 249 13f064614-13f064617 245->249 250 13f0645f9-13f06460f call 13f05deb4 call 13f05de94 245->250 254 13f064516-13f06452b 246->254 256 13f0644ab GetLastError 248->256 257 13f0644ca-13f0644d4 248->257 261 13f0644b1-13f0644b3 call 13f05de44 249->261 262 13f06461d-13f06461f 249->262 250->240 251->202 252->218 260 13f064429-13f06442b 252->260 254->251 264 13f06452d-13f064538 254->264 256->261 257->254 260->218 268 13f06442d-13f06443d 260->268 261->240 262->251 271 13f06455f-13f064567 264->271 272 13f06453a-13f064553 call 13f063f4c 264->272 268->218 275 13f0645dc-13f0645e9 call 13f063cd0 271->275 276 13f064569-13f06457b 271->276 279 13f064558-13f06455a 272->279 275->279 280 13f0645cf-13f0645d7 276->280 281 13f06457d 276->281 279->251 280->251 283 13f064582-13f064589 281->283 284 13f0645c5-13f0645c9 283->284 285 13f06458b-13f06458f 283->285 284->280 286 13f064591-13f064598 285->286 287 13f0645ab 285->287 286->287 288 13f06459a-13f06459e 286->288 289 13f0645b1-13f0645c1 287->289 288->287 291 13f0645a0-13f0645a9 288->291 289->283 290 13f0645c3 289->290 290->280 291->289
                C-Code - Quality: 58%
                			E0000000113F064204(void* __ebx, signed int __ecx, intOrPtr* __rax, long long __rbx, long long __rdx, long long __r9, char _a8, long long _a16, long long _a24, intOrPtr _a32) {
                				void* _v72;
                				long long _v80;
                				signed int _v88;
                				long long _v96;
                				void* _v104;
                				unsigned long long _v120;
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				signed char _t126;
                				char _t140;
                				int _t149;
                				void* _t150;
                				void* _t154;
                				char _t166;
                				char _t167;
                				signed int _t171;
                				void* _t194;
                				void* _t195;
                				void* _t196;
                				unsigned int _t198;
                				void* _t201;
                				long long _t206;
                				long long _t242;
                				signed long long _t249;
                				signed short* _t253;
                				intOrPtr* _t255;
                				char* _t258;
                				intOrPtr _t263;
                				signed long long _t276;
                				void* _t278;
                				unsigned long long _t283;
                				void* _t284;
                				signed long long _t290;
                				unsigned long long _t291;
                				signed short* _t293;
                				signed short* _t299;
                				signed short* _t301;
                				unsigned long long _t304;
                				signed long long _t305;
                				char* _t307;
                				char* _t308;
                				char* _t309;
                
                				_a24 = __rbx;
                				_a16 = __rdx;
                				r13d = r8d;
                				if (r12d != 0xfffffffe) goto 0x3f064245;
                				E0000000113F05DE94(__rax);
                				 *__rax = 0;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f06463f;
                				if (__ecx < 0) goto 0x3f064628;
                				_t201 = r12d -  *0x3f091ba0; // 0x40
                				if (_t201 >= 0) goto 0x3f064628;
                				_t3 = _t283 + 1; // 0x1
                				r9d = _t3;
                				_v80 = __r9;
                				_t289 = __ecx >> 6;
                				_v88 = __ecx >> 6;
                				_t305 = __ecx + __ecx * 8;
                				if ((r9b &  *(0x3f0917a0 + 0x38 + _t305 * 8)) == 0) goto 0x3f064628;
                				if (r13d - 0x7fffffff <= 0) goto 0x3f0642b4;
                				E0000000113F05DE94(__ecx);
                				 *__ecx = 0;
                				_t126 = E0000000113F05DEB4(__ecx);
                				 *__ecx = 0x16;
                				goto 0x3f06463a;
                				if (r13d == 0) goto 0x3f064624;
                				if ((_t126 & 0x00000002) != 0) goto 0x3f064624;
                				_t206 = __rdx;
                				if (_t206 == 0) goto 0x3f06429d;
                				r11d =  *((char*)(0x3f0917a0 + 0x39 + _t305 * 8));
                				_t242 =  *((intOrPtr*)(0x3f0917a0 + 0x28 + _t305 * 8));
                				_v96 = _t242;
                				_a8 = r11b;
                				if (_t206 == 0) goto 0x3f06432f;
                				if (r11d - r9d != r9d) goto 0x3f06431d;
                				if ((r9b &  !r13d) != 0) goto 0x3f06431d;
                				E0000000113F05DE94(_t242);
                				 *_t242 = 0;
                				E0000000113F05DEB4(_t242);
                				 *_t242 = 0x16;
                				E0000000113F063618();
                				goto 0x3f0644b8;
                				goto 0x3f0643b3;
                				if ((r9b &  !r13d) == 0) goto 0x3f064301;
                				_t194 =  <  ? 4 : r13d >> 1;
                				E0000000113F063738(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				_t258 = _t242;
                				E0000000113F0636F8(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				E0000000113F0636F8(_t242,  *((intOrPtr*)(0x3f0917a0 + _t289 * 8)));
                				_t307 = _t258;
                				if (_t258 != 0) goto 0x3f06437e;
                				E0000000113F05DEB4(_t242);
                				 *_t242 = 0xc;
                				E0000000113F05DE94(_t242);
                				 *_t242 = 8;
                				goto 0x3f0644b8;
                				r8d = 0x13f0917a1;
                				E0000000113F06495C(_t258, _t278, _t283);
                				_t290 = _v88;
                				r11b = _a8;
                				r9d = 1;
                				 *((long long*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x30 + _t305 * 8)) = _t242;
                				_t263 =  *((intOrPtr*)(0x3f0917a0 + _t290 * 8));
                				_v72 = _t307;
                				r10d = 0xa;
                				if (( *(_t263 + 0x38 + _t305 * 8) & 0x00000048) == 0) goto 0x3f064442;
                				_t140 =  *((intOrPtr*)(_t263 + 0x3a + _t305 * 8));
                				if (_t140 == r10b) goto 0x3f064442;
                				if (_t194 == 0) goto 0x3f064442;
                				 *_t307 = _t140;
                				_t195 = _t194 - 1;
                				_t308 = _t307 + __r9;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3a + _t305 * 8)) = r10b;
                				if (r11b == 0) goto 0x3f064442;
                				_t166 =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3b + _t305 * 8));
                				if (_t166 == r10b) goto 0x3f064442;
                				if (_t195 == 0) goto 0x3f064442;
                				 *_t308 = _t166;
                				_t309 = _t308 + __r9;
                				_t196 = _t195 - 1;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3b + _t305 * 8)) = r10b;
                				if (r11b != r9b) goto 0x3f064442;
                				_t167 =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3c + _t305 * 8));
                				if (_t167 == r10b) goto 0x3f064442;
                				if (_t196 == 0) goto 0x3f064442;
                				 *_t309 = _t167;
                				 *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t290 * 8)) + 0x3c + _t305 * 8)) = r10b;
                				if (E0000000113F06B9B8(r12d,  *((intOrPtr*)(0x3f0917a0 + _t290 * 8))) == 0) goto 0x3f0644d6;
                				_t249 =  *((intOrPtr*)(0x3f0917a0 + _v88 * 8));
                				if ( *((intOrPtr*)(_t249 + 0x38 + _t305 * 8)) - sil >= 0) goto 0x3f0644d6;
                				if (GetConsoleMode(??, ??) == 0) goto 0x3f0644d6;
                				if (_a8 != 2) goto 0x3f0644db;
                				_t198 = _t196 - 1 >> 1;
                				r8d = _t198;
                				_v120 = _t283;
                				if (ReadConsoleW(??, ??, ??, ??, ??) != 0) goto 0x3f0644ca;
                				E0000000113F05DE44(GetLastError(), _t249, _t258);
                				E0000000113F0636F8(_t249, _t258);
                				goto 0x3f064642;
                				goto 0x3f064516;
                				_v80 = sil;
                				r8d = _t198;
                				_v120 = _t283;
                				_t149 = ReadFile(??, ??, ??, ??, ??); // executed
                				if (_t149 == 0) goto 0x3f0645ee;
                				if (_a32 - r13d > 0) goto 0x3f0645ee;
                				if ( *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _v88 * 8)) + 0x38 + _t305 * 8)) - sil >= 0) goto 0x3f0644bb;
                				_t291 = _t278 + _t249 * 2 + _a32;
                				if (_a8 == 2) goto 0x3f06455f;
                				_t276 = _t309 + __r9;
                				_v120 = _t304 >> 1;
                				_t150 = E0000000113F063F4C(__ebx, r12d, _t278 + _t249 * 2 + _a32, _t198, _a8 - 2, _t258, _t276, _t278, _t283, _t284, _t291, _a16);
                				goto 0x3f0644bb;
                				if (_v80 == sil) goto 0x3f0645dc;
                				_t301 = _v72;
                				_t253 = _t301;
                				_t299 =  &(_t301[_t291 >> 1]);
                				if (_t301 - _t299 >= 0) goto 0x3f0645cf;
                				_t171 =  *_t253 & 0x0000ffff;
                				if (_t171 == 0x1a) goto 0x3f0645c5;
                				if (_t171 != 0xd) goto 0x3f0645ab;
                				_t293 =  &(_t253[1]);
                				if (_t293 - _t299 >= 0) goto 0x3f0645ab;
                				if ( *_t293 != 0xa) goto 0x3f0645ab;
                				r8d = 4;
                				goto 0x3f0645b1;
                				r8d = 2;
                				 *_t301 = 0xa;
                				if (_t253 + _t293 - _t299 < 0) goto 0x3f064582;
                				goto 0x3f0645cf;
                				_t255 =  *((intOrPtr*)(0x3f0917a0 + _t276 * 8));
                				 *(_t255 + 0x38 + _t305 * 8) =  *(_t255 + 0x38 + _t305 * 8) | 0x00000002;
                				goto 0x3f0644bb;
                				E0000000113F063CD0(_t150, r12d, _v72,  &(_t301[1]), 0x3f0917a0);
                				goto 0x3f064558;
                				if (GetLastError() != 5) goto 0x3f064614;
                				E0000000113F05DEB4(_t255);
                				 *_t255 = 9;
                				_t154 = E0000000113F05DE94(_t255);
                				 *_t255 = 5;
                				goto 0x3f0644b8;
                				if (_t154 != 0x6d) goto 0x3f0644b1;
                				goto 0x3f0644bb;
                				goto 0x3f064642;
                				E0000000113F05DE94(_t255);
                				 *_t255 = 0xa;
                				E0000000113F05DEB4(_t255);
                				 *_t255 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}














































                0x13f064204
                0x13f064209
                0x13f064223
                0x13f06422a
                0x13f06422c
                0x13f064233
                0x13f064235
                0x13f06423a
                0x13f064240
                0x13f064249
                0x13f06424f
                0x13f064256
                0x13f06425f
                0x13f06425f
                0x13f064266
                0x13f064275
                0x13f064279
                0x13f06427e
                0x13f06428e
                0x13f06429b
                0x13f06429d
                0x13f0642a2
                0x13f0642a4
                0x13f0642a9
                0x13f0642af
                0x13f0642b7
                0x13f0642bf
                0x13f0642c5
                0x13f0642c8
                0x13f0642ca
                0x13f0642d3
                0x13f0642db
                0x13f0642e5
                0x13f0642f0
                0x13f0642f5
                0x13f0642ff
                0x13f064301
                0x13f064306
                0x13f064308
                0x13f06430d
                0x13f064313
                0x13f064318
                0x13f06432a
                0x13f064337
                0x13f064340
                0x13f064345
                0x13f06434c
                0x13f06434f
                0x13f064356
                0x13f06435b
                0x13f064361
                0x13f064363
                0x13f064368
                0x13f06436e
                0x13f064373
                0x13f064379
                0x13f064383
                0x13f064387
                0x13f06438c
                0x13f064398
                0x13f0643a0
                0x13f0643aa
                0x13f0643af
                0x13f0643bb
                0x13f0643c0
                0x13f0643c6
                0x13f0643c8
                0x13f0643d0
                0x13f0643d4
                0x13f0643d6
                0x13f0643d9
                0x13f0643df
                0x13f0643e5
                0x13f0643ed
                0x13f0643f3
                0x13f0643fb
                0x13f0643ff
                0x13f064401
                0x13f06440c
                0x13f06440f
                0x13f064411
                0x13f064419
                0x13f06441f
                0x13f064427
                0x13f06442b
                0x13f06442d
                0x13f06443d
                0x13f06444c
                0x13f06445e
                0x13f064467
                0x13f06447b
                0x13f064485
                0x13f064494
                0x13f064499
                0x13f06449c
                0x13f0644a9
                0x13f0644b3
                0x13f0644be
                0x13f0644c5
                0x13f0644d4
                0x13f0644d6
                0x13f0644e8
                0x13f0644eb
                0x13f0644f3
                0x13f0644fb
                0x13f064509
                0x13f06452b
                0x13f064535
                0x13f064538
                0x13f064548
                0x13f06454e
                0x13f064553
                0x13f06455a
                0x13f064567
                0x13f064569
                0x13f06456e
                0x13f064574
                0x13f06457b
                0x13f064582
                0x13f064589
                0x13f06458f
                0x13f064591
                0x13f064598
                0x13f06459e
                0x13f0645a3
                0x13f0645a9
                0x13f0645ab
                0x13f0645b4
                0x13f0645c1
                0x13f0645c3
                0x13f0645c5
                0x13f0645c9
                0x13f0645d7
                0x13f0645e4
                0x13f0645e9
                0x13f0645f7
                0x13f0645f9
                0x13f0645fe
                0x13f064604
                0x13f064609
                0x13f06460f
                0x13f064617
                0x13f06461f
                0x13f064626
                0x13f064628
                0x13f06462d
                0x13f06462f
                0x13f064634
                0x13f064659

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: 2632b054db28317a037fde5efdf9a5a6db45c01851c481e3366dd64393a7b75e
                • Instruction ID: 80da37cd7c11a7457fbaf9b22fbc5e5f5e8125f7fd724138e0c90ffd6f2fe650
                • Opcode Fuzzy Hash: 2632b054db28317a037fde5efdf9a5a6db45c01851c481e3366dd64393a7b75e
                • Instruction Fuzzy Hash: 8FC12636A0478591EB699B1D9040BDE7BA3F780BE0F650129FA4A03797CF78CA57C701
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 79%
                			E0000000113F058788(intOrPtr* __rax, long long __rbx, void* __r8, long long _a8) {
                				char _v24;
                				void* _t8;
                				void* _t9;
                				void* _t10;
                				signed short _t20;
                				void* _t22;
                				void* _t26;
                				intOrPtr _t35;
                				intOrPtr* _t54;
                				intOrPtr* _t55;
                				void* _t68;
                				void* _t69;
                				void* _t75;
                
                				_t56 = __rbx;
                				_t54 = __rax;
                				_a8 = __rbx;
                				_t8 = E0000000113F058BE8(1); // executed
                				if (_t8 == 0) goto 0x3f0588d4;
                				dil = 0;
                				_v24 = dil;
                				_t9 = E0000000113F058BAC();
                				_t35 =  *0x3f0912a0; // 0x2
                				if (_t35 == 1) goto 0x3f0588df;
                				if (_t35 != 0) goto 0x3f058810;
                				 *0x3f0912a0 = 1;
                				_t10 = E0000000113F061E14(__rbx, 0x3f072380, 0x3f0723b8); // executed
                				if (_t10 == 0) goto 0x3f0587f1;
                				goto 0x3f0588c9;
                				E0000000113F061DB0(_t56, 0x3f072368, 0x3f072378, _t68, _t69); // executed
                				 *0x3f0912a0 = 2;
                				goto 0x3f058818;
                				dil = 1;
                				_v24 = dil;
                				E0000000113F058EFC(E0000000113F058D58(_t9, 0x3f072378));
                				if ( *_t54 == 0) goto 0x3f05884b;
                				if (E0000000113F058CC0(_t54, _t54) == 0) goto 0x3f05884b;
                				r8d = 0;
                				_t55 =  *_t54;
                				E0000000113F058F04( *0x3f072350());
                				if ( *_t55 == 0) goto 0x3f05886d;
                				if (E0000000113F058CC0(_t55, _t55) == 0) goto 0x3f05886d;
                				E0000000113F0620F4( *_t55);
                				_t20 = E0000000113F059060(0x3f072378);
                				E0000000113F061D5C();
                				r9d = _t20 & 0x0000ffff;
                				_t74 = _t55;
                				_t22 = E0000000113F051000(_t55, 0x13f050000, _t55, _t75); // executed
                				if (E0000000113F0590A4(_t55) == 0) goto 0x3f0588e9;
                				if (dil != 0) goto 0x3f0588a3;
                				E0000000113F0620D8(0x13f050000, 0x3f072378, _t55);
                				E0000000113F058D7C(1, 0);
                				_t26 = _t22;
                				if (E0000000113F0590A4(_t55) == 0) goto 0x3f0588f1;
                				if (_v24 != 0) goto 0x3f0588c7;
                				E0000000113F0620C8(0x13f050000, 0x3f072378, _t74);
                				return _t26;
                			}
















                0x13f058788
                0x13f058788
                0x13f058788
                0x13f058797
                0x13f05879e
                0x13f0587a4
                0x13f0587a7
                0x13f0587ac
                0x13f0587b3
                0x13f0587bc
                0x13f0587c4
                0x13f0587c6
                0x13f0587de
                0x13f0587e5
                0x13f0587ec
                0x13f0587ff
                0x13f058804
                0x13f05880e
                0x13f058810
                0x13f058813
                0x13f05881f
                0x13f05882b
                0x13f058837
                0x13f058839
                0x13f058842
                0x13f05884b
                0x13f058857
                0x13f058863
                0x13f058868
                0x13f05886d
                0x13f058875
                0x13f05887a
                0x13f05887d
                0x13f058889
                0x13f058897
                0x13f05889c
                0x13f05889e
                0x13f0588a7
                0x13f0588ac
                0x13f0588b9
                0x13f0588c0
                0x13f0588c2
                0x13f0588d3

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: __scrt_fastfail$__scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                • String ID:
                • API String ID: 2735655165-0
                • Opcode ID: 54703c015601a388242d526a7ec929817a87e24da4d50ebdd5dac0dcf281f813
                • Instruction ID: 6870d9aac9d6a030ae20ad25f86950bee77f0fbce46ba86ced8783e6fe0318dc
                • Opcode Fuzzy Hash: 54703c015601a388242d526a7ec929817a87e24da4d50ebdd5dac0dcf281f813
                • Instruction Fuzzy Hash: 78316F31E08208C5FA5CA76DDA993EA13D3DB55784F44403CBE4D4B2E7DAA88B0BC310
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 413 13f05a0d0-13f05a10d 414 13f05a113-13f05a116 413->414 415 13f05a1fd 413->415 416 13f05a1ff-13f05a21b 414->416 417 13f05a11c 414->417 415->416 418 13f05a11f 417->418 419 13f05a1f5 418->419 420 13f05a125-13f05a133 418->420 419->415 421 13f05a135-13f05a138 420->421 422 13f05a140-13f05a15f LoadLibraryExW 420->422 423 13f05a1d7-13f05a1e6 GetProcAddress 421->423 424 13f05a13e 421->424 425 13f05a1b7-13f05a1cc 422->425 426 13f05a161-13f05a16a GetLastError 422->426 423->419 428 13f05a1e8-13f05a1f3 423->428 429 13f05a1ab-13f05a1b2 424->429 425->423 427 13f05a1ce-13f05a1d1 FreeLibrary 425->427 430 13f05a199-13f05a1a3 426->430 431 13f05a16c-13f05a181 call 13f0633d8 426->431 427->423 428->416 429->418 430->429 431->430 434 13f05a183-13f05a197 LoadLibraryExW 431->434 434->425 434->430
                C-Code - Quality: 50%
                			E0000000113F05A0D0(void* __ecx, long long __rbx, void* __rdx, signed int __rsi, void* __r8, void* __r9) {
                				intOrPtr _t61;
                				intOrPtr _t65;
                				intOrPtr _t67;
                				intOrPtr _t68;
                				struct HINSTANCE__* _t81;
                				long long _t85;
                				void* _t89;
                				struct HINSTANCE__* _t94;
                				long _t97;
                				void* _t100;
                				signed long long _t101;
                				WCHAR* _t104;
                
                				 *((long long*)(_t89 + 8)) = __rbx;
                				 *((long long*)(_t89 + 0x10)) = _t85;
                				 *((long long*)(_t89 + 0x18)) = __rsi;
                				_t61 =  *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8));
                				_t101 = _t100 | 0xffffffff;
                				if (_t61 == _t101) goto 0x3f05a1fd;
                				if (_t61 != 0) goto 0x3f05a1ff;
                				if (__r8 == __r9) goto 0x3f05a1f5;
                				_t67 =  *((intOrPtr*)(0x13f050000 + 0x41448 + __rsi * 8));
                				if (_t67 == 0) goto 0x3f05a140;
                				if (_t67 != _t101) goto 0x3f05a1d7;
                				goto 0x3f05a1ab;
                				r8d = 0x800; // executed
                				LoadLibraryExW(_t104, _t100, _t97); // executed
                				_t68 = _t61;
                				if (_t61 != 0) goto 0x3f05a1b7;
                				if (GetLastError() != 0x57) goto 0x3f05a199;
                				_t14 = _t68 + 7; // 0x7
                				r8d = _t14;
                				if (E0000000113F0633D8(__r8) == 0) goto 0x3f05a199;
                				r8d = 0;
                				LoadLibraryExW(??, ??, ??);
                				if (_t61 != 0) goto 0x3f05a1b7;
                				 *((intOrPtr*)(0x13f050000 + 0x41448 + __rsi * 8)) = _t101;
                				goto 0x3f05a11f;
                				_t21 = 0x13f050000 + 0x41448 + __rsi * 8;
                				_t65 =  *_t21;
                				 *_t21 = _t61;
                				if (_t65 == 0) goto 0x3f05a1d7;
                				FreeLibrary(_t94);
                				GetProcAddress(_t81);
                				if (_t65 == 0) goto 0x3f05a1f5;
                				 *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8)) = _t65;
                				goto 0x3f05a1ff;
                				 *((intOrPtr*)(0x13f050000 + 0x41460 + _t81 * 8)) = _t101;
                				return 0;
                			}















                0x13f05a0d0
                0x13f05a0d5
                0x13f05a0da
                0x13f05a0fe
                0x13f05a106
                0x13f05a10d
                0x13f05a116
                0x13f05a11f
                0x13f05a128
                0x13f05a133
                0x13f05a138
                0x13f05a13e
                0x13f05a14d
                0x13f05a153
                0x13f05a159
                0x13f05a15f
                0x13f05a16a
                0x13f05a16c
                0x13f05a16c
                0x13f05a181
                0x13f05a183
                0x13f05a18b
                0x13f05a197
                0x13f05a1a3
                0x13f05a1b2
                0x13f05a1c1
                0x13f05a1c1
                0x13f05a1c1
                0x13f05a1cc
                0x13f05a1d1
                0x13f05a1dd
                0x13f05a1e6
                0x13f05a1eb
                0x13f05a1f3
                0x13f05a1f5
                0x13f05a21b

                APIs
                • LoadLibraryExW.KERNELBASE(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A153
                • GetLastError.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A161
                • LoadLibraryExW.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A18B
                • FreeLibrary.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A1D1
                • GetProcAddress.KERNEL32(?,?,?,000000013F05A37E,?,?,?,000000013F05A07C,?,?,?,?,000000013F059DA1), ref: 000000013F05A1DD
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Library$Load$AddressErrorFreeLastProc
                • String ID: api-ms-
                • API String ID: 2559590344-2084034818
                • Opcode ID: ab915c05323a93562967bdf0f1ca73c137925dd5d12ccf2297365f0bdfe17a08
                • Instruction ID: 2da50821bafe619e89dd74e3b274e295604f0c38f5278ef395f431fe9ebca5a5
                • Opcode Fuzzy Hash: ab915c05323a93562967bdf0f1ca73c137925dd5d12ccf2297365f0bdfe17a08
                • Instruction Fuzzy Hash: ED31F431B16A80C4EE29DB0AA8087D92396F744BA4F09013DFD1D1B792EF78D286C314
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 41%
                			E0000000113F051C80(void* __rax, long long __rcx, signed long long __rdx, long long __r8, long long __r9, long long _a8, signed long long _a16, char _a24, long long _a32, char _a1048, char _a2072, char _a4120, signed int _a6168, void* _a6224, char _a6232) {
                				void* __rbx;
                				void* __rsi;
                				void* _t27;
                				void* _t35;
                				signed long long _t44;
                				signed long long _t45;
                				long long _t46;
                				long long _t62;
                				void* _t64;
                				void* _t74;
                				void* _t75;
                
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				E0000000113F058610(_t35, __rax, __rcx, _t74, _t75);
                				_t65 = _t64 - __rax;
                				_t44 =  *0x3f082018; // 0xe88b9cb90319
                				_t45 = _t44 ^ _t64 - __rax;
                				_a6168 = _t45;
                				_t62 = __rcx;
                				E0000000113F051B20(GetLastError());
                				_a16 =  &_a6232;
                				r8d = 0x400;
                				_a8 = 0;
                				0x3f05ddec();
                				E0000000113F055030(_t24, _t45, __r8);
                				_a16 = _t45;
                				_a8 = _t62;
                				_t27 = E0000000113F051FF0(_t45,  &_a24,  &_a1048, "%s%s: %s",  &_a1048);
                				r8d = 0x800;
                				E0000000113F0597D0(_t27, 0,  &_a2072,  &_a1048, "%s%s: %s");
                				r8d = 0x400;
                				E0000000113F0554B0(_t45, _t46,  &_a4120,  &_a24,  &_a6232, "%s%s: %s");
                				if (_t45 == 0) goto 0x3f051d94;
                				r8d = 0x400;
                				E0000000113F0554B0(_t45, _t46,  &_a2072, "Fatal error detected",  &_a6232, "%s%s: %s");
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??); // executed
                				goto 0x3f051dae;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t45, _a6168 ^ _t65);
                			}














                0x13f051c80
                0x13f051c85
                0x13f051c8a
                0x13f051c97
                0x13f051c9c
                0x13f051c9f
                0x13f051ca6
                0x13f051ca9
                0x13f051cb1
                0x13f051cc4
                0x13f051cd9
                0x13f051cde
                0x13f051ce4
                0x13f051cf4
                0x13f051cfb
                0x13f051d00
                0x13f051d14
                0x13f051d23
                0x13f051d32
                0x13f051d38
                0x13f051d3d
                0x13f051d50
                0x13f051d58
                0x13f051d5a
                0x13f051d6f
                0x13f051d74
                0x13f051d8c
                0x13f051d92
                0x13f051d94
                0x13f051da8
                0x13f051dc8

                APIs
                • GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F055030: GetLastError.KERNEL32(00000000,000000013F051D00), ref: 000000013F055057
                  • Part of subcall function 000000013F055030: FormatMessageW.KERNELBASE ref: 000000013F055086
                  • Part of subcall function 000000013F0554B0: MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                • MessageBoxW.USER32 ref: 000000013F051D8C
                • MessageBoxA.USER32 ref: 000000013F051DA8
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                • String ID: %s%s: %s$Fatal error detected
                • API String ID: 2806210788-2410924014
                • Opcode ID: af1ef45adcd509569af5a1bbd9d83c3a8bd909cdc376dd231eebb3c67ffcea68
                • Instruction ID: 56b4da25d96d06a3063ad87f4840cb3b151669c4e5a0b28bec8d855d249879d9
                • Opcode Fuzzy Hash: af1ef45adcd509569af5a1bbd9d83c3a8bd909cdc376dd231eebb3c67ffcea68
                • Instruction Fuzzy Hash: 1531757262968481EB34DB14E4557DA63A5F784788F80502AB68D07A9BDF7CC34BCB40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 492 13f051000-13f052a1d call 13f05a4e8 call 13f05a4e0 call 13f055180 call 13f05a4e0 call 13f058610 call 13f05b520 call 13f05e914 call 13f051ae0 510 13f052a23-13f052a32 call 13f052d20 492->510 511 13f052abd 492->511 510->511 516 13f052a38-13f052a4c call 13f052c50 510->516 512 13f052ac2-13f052ae4 call 13f058680 511->512 516->511 520 13f052a4e-13f052a62 call 13f052ca0 516->520 520->511 523 13f052a64-13f052a8e call 13f054490 call 13f054af0 call 13f0519f0 520->523 530 13f052ae5-13f052af5 523->530 531 13f052a90-13f052aa2 call 13f0519f0 523->531 532 13f052af7-13f052b01 call 13f052960 530->532 533 13f052b0f-13f052b3e call 13f0554b0 SetDllDirectoryW call 13f05a4f8 530->533 531->530 538 13f052aa4-13f052ab8 call 13f051dd0 531->538 542 13f052b07 532->542 543 13f052bc2-13f052bc5 call 13f052790 532->543 547 13f052b40-13f052b4a 533->547 538->511 542->533 548 13f052bca-13f052bcc 543->548 549 13f052b53-13f052b55 547->549 550 13f052b4c-13f052b51 547->550 548->511 551 13f052bd2-13f052c0a call 13f054a80 call 13f054490 call 13f054d40 548->551 552 13f052b57-13f052b7a call 13f051ff0 549->552 553 13f052ba1-13f052bac call 13f0528d0 call 13f052540 549->553 550->547 550->549 551->511 569 13f052c10-13f052c31 call 13f0529c0 call 13f054b30 551->569 552->511 561 13f052b80-13f052b8a 552->561 566 13f052bb1-13f052bbd call 13f0528c0 553->566 564 13f052b90-13f052b9f 561->564 564->553 564->564 566->512 575 13f052c33-13f052c36 call 13f054730 569->575 576 13f052c3b-13f052c45 call 13f051aa0 569->576 575->576 576->512
                C-Code - Quality: 35%
                			E0000000113F051000(long long __rax, long long __rcx, void* __r8, void* __r9) {
                				void* __rbx;
                				void* __rbp;
                				void* _t12;
                				void* _t18;
                				long long _t25;
                				long long _t30;
                				long long _t34;
                				void* _t37;
                				void* _t40;
                				void* _t43;
                				void* _t45;
                				void* _t47;
                				void* _t48;
                				void* _t52;
                				void* _t55;
                
                				_t51 = __r9;
                				_t50 = __r8;
                				_t30 = __rcx;
                				_t25 = __rax;
                				E0000000113F05A4E0(E0000000113F055180(E0000000113F05A4E0(E0000000113F05A4E8(_t12)),  *_t25, _t25,  *_t25));
                				_t34 = _t25;
                				_t47 = _t45 - 0x20 + 0x20;
                				_pop(_t28);
                				goto 0x3f0529d0;
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				asm("int3");
                				 *((long long*)(_t47 + 0x10)) = _t34;
                				 *((long long*)(_t47 + 8)) = _t30;
                				_t48 = _t47 - 0x88;
                				_t29 = _t34;
                				 *((long long*)(_t48 + 0x50)) = _t25;
                				 *((long long*)(_t48 + 0x58)) = _t25;
                				 *((long long*)(_t48 + 0x60)) = _t25;
                				_t6 = _t25 + 0x58; // 0x58
                				r8d = _t6;
                				 *((intOrPtr*)(_t48 + 0x28)) = 0;
                				 *((long long*)(_t48 + 0x20)) = _t25;
                				_t18 = E0000000113F057370(_t25, _t34, _t48 + 0x20, "1.2.11", _t43, _t55);
                				r15d = _t18;
                				if (_t18 == 0) goto 0x3f0510c3;
                				r8d = _t18;
                				E0000000113F051DD0(_t25, "Failed to extract %s: inflateInit() failed with return code %d!\n", _t29 + 0x12, _t50, _t51, _t52, _t37, _t40, _t43);
                				_t11 = _t43 - 1; // -1
                				return _t11;
                			}


















                0x13f051000
                0x13f051000
                0x13f051000
                0x13f051000
                0x13f051020
                0x13f051025
                0x13f05102a
                0x13f05102e
                0x13f05102f
                0x13f051034
                0x13f051035
                0x13f051036
                0x13f051037
                0x13f051038
                0x13f051039
                0x13f05103a
                0x13f05103b
                0x13f05103c
                0x13f05103d
                0x13f05103e
                0x13f05103f
                0x13f051040
                0x13f051045
                0x13f051052
                0x13f05105e
                0x13f051061
                0x13f051069
                0x13f051075
                0x13f05107a
                0x13f05107a
                0x13f05107e
                0x13f051087
                0x13f051091
                0x13f051096
                0x13f05109b
                0x13f0510a1
                0x13f0510ab
                0x13f0510b0
                0x13f0510c2

                APIs
                  • Part of subcall function 000000013F052D20: GetModuleFileNameW.KERNEL32(?,000000013F052A30), ref: 000000013F052D51
                • SetDllDirectoryW.KERNEL32 ref: 000000013F052B22
                  • Part of subcall function 000000013F054490: GetEnvironmentVariableW.KERNEL32(000000013F052A70), ref: 000000013F0544CA
                  • Part of subcall function 000000013F054490: ExpandEnvironmentStringsW.KERNEL32 ref: 000000013F0544E7
                  • Part of subcall function 000000013F054AF0: SetEnvironmentVariableW.KERNEL32(00000000,000000013F052A7F), ref: 000000013F054B0F
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Environment$Variable$DirectoryExpandFileMessageModuleNameStrings
                • String ID: Cannot open self %s or archive %s$_MEIPASS2
                • API String ID: 2418257720-930416966
                • Opcode ID: aeeebb821bd49b9263e7299665f93f1221176dc422c62ce37b5a3a647fd868b1
                • Instruction ID: be53e6809965bd585d6bcdd22ee6825968f3fa68aca584083275057845ff3d02
                • Opcode Fuzzy Hash: aeeebb821bd49b9263e7299665f93f1221176dc422c62ce37b5a3a647fd868b1
                • Instruction Fuzzy Hash: 1C616031B08684D2FE2DAB6995593EAA397AB847C4F444039FA4D47787EFA8C707C700
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 580 13f06602c-13f066065 call 13f065b5c 582 13f06606a-13f06606d 580->582 583 13f0660c1-13f0660ed call 13f066108 LCMapStringW 582->583 584 13f06606f-13f0660bf 582->584 588 13f0660f3-13f066107 583->588 584->588
                C-Code - Quality: 20%
                			E0000000113F06602C(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, void* __r8, long long _a8, long long _a16, long long _a24, long long _a40, intOrPtr _a48, long long _a56, long long _a64, long long _a72) {
                				long long _v24;
                				long long _v32;
                				long long _v40;
                				intOrPtr _v48;
                				long long _v56;
                				void* _t26;
                				void* _t38;
                				void* _t53;
                
                				_t40 = __rbx;
                				_t38 = __rax;
                				_a8 = __rbx;
                				_a16 = __rbp;
                				_a24 = __rsi;
                				_t26 = r9d;
                				_t53 = __rcx;
                				E0000000113F065B5C(0x14, __rbx, "LCMapStringEx", __rsi, 0x3f078640, "LCMapStringEx"); // executed
                				if (_t38 == 0) goto 0x3f0660c1;
                				r9d = _t26;
                				_v24 = _a72;
                				_v32 = _a64;
                				_v40 = _a56;
                				_v48 = _a48;
                				_v56 = _a40;
                				 *0x3f072350();
                				goto 0x3f0660f3;
                				E0000000113F066108(0, 0, _t38, _t40, _t53);
                				r9d = _t26;
                				_v48 = _a48;
                				_v56 = _a40;
                				return LCMapStringW(??, ??, ??, ??, ??, ??);
                			}











                0x13f06602c
                0x13f06602c
                0x13f06602c
                0x13f066031
                0x13f066036
                0x13f066040
                0x13f06604f
                0x13f066065
                0x13f06606d
                0x13f066077
                0x13f066084
                0x13f06608c
                0x13f066099
                0x13f0660a5
                0x13f0660b1
                0x13f0660b9
                0x13f0660bf
                0x13f0660c6
                0x13f0660cd
                0x13f0660da
                0x13f0660e8
                0x13f066107

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Stringtry_get_function
                • String ID: LCMapStringEx
                • API String ID: 2588686239-3893581201
                • Opcode ID: 85cdc4dcf88f56ab021be3ad67fb762049591e1a090dd458c10f686554ff6dbc
                • Instruction ID: 2b10b749720e5ee0807af2929fd264fdca316d93fe7d8711c05e687772ccd4ca
                • Opcode Fuzzy Hash: 85cdc4dcf88f56ab021be3ad67fb762049591e1a090dd458c10f686554ff6dbc
                • Instruction Fuzzy Hash: 00114D32608BC086D764CB1AF48039AB7A1F7C9B90F14412AFE8D43B1ADF38C6458B40
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 43%
                			E0000000113F0648B8(void* __ebx, signed long long __ecx, void* __edx, void* __eflags, signed int __rax, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16, intOrPtr _a32) {
                				int _t19;
                				void* _t21;
                				signed long long _t38;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t38 = __ecx;
                				E0000000113F0605E0(__ebx, __rax);
                				if (__rax != 0xffffffff) goto 0x3f0648ee;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f064941;
                				r9d = r8d;
                				_t19 = SetFilePointerEx(??, ??, ??, ??); // executed
                				if (_t19 != 0) goto 0x3f064915;
                				_t21 = E0000000113F05DE44(GetLastError(), __rax | 0xffffffff, __ecx);
                				goto 0x3f0648e8;
                				if (_a32 == 0xffffffff) goto 0x3f0648e8;
                				 *( *((intOrPtr*)(0x3f0917a0 + (_t38 >> 6) * 8)) + 0x38 + (_t38 + _t38 * 8) * 8) =  *( *((intOrPtr*)(0x3f0917a0 + (_t38 >> 6) * 8)) + 0x38 + (_t38 + _t38 * 8) * 8) & 0x000000fd;
                				return _t21;
                			}






                0x13f0648b8
                0x13f0648bd
                0x13f0648c7
                0x13f0648d2
                0x13f0648db
                0x13f0648dd
                0x13f0648e2
                0x13f0648ec
                0x13f0648ee
                0x13f0648fc
                0x13f064904
                0x13f06490e
                0x13f064913
                0x13f06491e
                0x13f06493c
                0x13f064950

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID: E4
                • API String ID: 2976181284-1217125225
                • Opcode ID: 815bd49431f8a3675ace55cb510c49b1852bc6ea244e038e73d8330aa86f6717
                • Instruction ID: c0bc9aef89a229a835e193a3106de9073b2c9b7f418bd094b09e59c1f2f1cf6d
                • Opcode Fuzzy Hash: 815bd49431f8a3675ace55cb510c49b1852bc6ea244e038e73d8330aa86f6717
                • Instruction Fuzzy Hash: E901A175B14A8081EE189B2DE84439D6662E781BF0F64533ABA7E077E6DE34C6978300
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 19%
                			E0000000113F05E0F4(long long __rax, long long __rbx, void* __rcx, void* __rdx, long long __rsi, void* __r8, long long _a8, long long _a24) {
                				void* _v40;
                				char _v88;
                				long long _v104;
                				intOrPtr _v112;
                				intOrPtr _v120;
                				signed int _t15;
                				long long _t34;
                				long long _t36;
                				void* _t58;
                
                				_t44 = __rdx;
                				_t34 = __rax;
                				_a8 = __rbx;
                				_a24 = __rsi;
                				if (__rdx != 0) goto 0x3f05e139;
                				E0000000113F05DE94(__rax);
                				 *((intOrPtr*)(__rax)) = 0;
                				E0000000113F05DEB4(__rax);
                				 *((intOrPtr*)(__rax)) = 0x16;
                				_t15 = E0000000113F063618();
                				goto 0x3f05e1e9;
                				r15d = 0x30;
                				r8d = r15d;
                				E0000000113F0597D0(_t15 | 0xffffffff, 0,  &_v88, __rdx, __r8);
                				asm("movups xmm0, [ebp-0x30]");
                				asm("movups xmm1, [ebp-0x20]");
                				asm("movups [edi], xmm0");
                				asm("movups xmm0, [ebp-0x10]");
                				asm("movups [edi+0x10], xmm1");
                				asm("movups [edi+0x20], xmm0");
                				if (__rcx == 0) goto 0x3f05e11a;
                				_v104 = __rsi;
                				_v112 = 0x2000000;
                				r8d = _t58 - 0x29;
                				r9d = 0;
                				_v120 = 3;
                				CreateFileW(??, ??, ??, ??, ??, ??, ??); // executed
                				_t36 = _t34;
                				if (_t34 == 0xffffffff) goto 0x3f05e202;
                				if (E0000000113F05E288(_t58 + 0x00000050 | 0xffffffff, _t36, __rcx, _t34, __rdx) != 0) goto 0x3f05e1d8;
                				E0000000113F0597D0(_t19, 0,  &_v88, _t44, _t58);
                				asm("movups xmm0, [ebp-0x30]");
                				asm("movups xmm1, [ebp-0x20]");
                				asm("movups [edi], xmm0");
                				asm("movups xmm0, [ebp-0x10]");
                				asm("movups [edi+0x10], xmm1");
                				asm("movups [edi+0x20], xmm0");
                				if (_t36 == 0xffffffff) goto 0x3f05e1e7;
                				CloseHandle(??);
                				return 0xffffffff;
                			}












                0x13f05e0f4
                0x13f05e0f4
                0x13f05e0f4
                0x13f05e0f9
                0x13f05e118
                0x13f05e11a
                0x13f05e11f
                0x13f05e121
                0x13f05e126
                0x13f05e12c
                0x13f05e134
                0x13f05e139
                0x13f05e143
                0x13f05e148
                0x13f05e14d
                0x13f05e151
                0x13f05e155
                0x13f05e158
                0x13f05e15c
                0x13f05e160
                0x13f05e167
                0x13f05e169
                0x13f05e172
                0x13f05e17a
                0x13f05e17e
                0x13f05e181
                0x13f05e18c
                0x13f05e192
                0x13f05e19c
                0x13f05e1ae
                0x13f05e1b9
                0x13f05e1be
                0x13f05e1c5
                0x13f05e1c9
                0x13f05e1cc
                0x13f05e1d0
                0x13f05e1d4
                0x13f05e1dc
                0x13f05e1e1
                0x13f05e201

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CloseCreateDriveFileHandleType_invalid_parameter_noinfo
                • String ID:
                • API String ID: 2907017715-0
                • Opcode ID: 17b0cef8747b0a15318aa22f557b382b895876ede5cd1af7a5dc8cb71c1ff519
                • Instruction ID: 0523c1878ce527ac40272c3772e556643139cd68a5a25f8d085d123d64819036
                • Opcode Fuzzy Hash: 17b0cef8747b0a15318aa22f557b382b895876ede5cd1af7a5dc8cb71c1ff519
                • Instruction Fuzzy Hash: 3241F132E0875086F7189F3999047D82762F7587A8F009728FFAD13AC7DB789292C704
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 68%
                			E0000000113F0586A4(intOrPtr* __rax) {
                				void* __rbx;
                				void* _t2;
                				intOrPtr _t6;
                				void* _t20;
                				intOrPtr* _t32;
                				void* _t33;
                				void* _t34;
                				void* _t37;
                				void* _t38;
                
                				_t32 = __rax;
                				E0000000113F0613A0(_t2, 2);
                				E0000000113F05F130(E0000000113F058EB0(), __rax, _t34);
                				_t6 = E0000000113F054D40();
                				E0000000113F062288(_t6);
                				 *_t32 = _t6;
                				if (E0000000113F058C34(1, _t32) == 0) goto 0x3f05874f;
                				E0000000113F059164(_t33);
                				E0000000113F058DE4(E0000000113F058C34(1, _t32), _t32);
                				if (E0000000113F06162C(E0000000113F058EA8(), _t32, _t33, E0000000113F0591A0, _t37, _t38) != 0) goto 0x3f05874f;
                				E0000000113F058EB8();
                				if (E0000000113F058EF0() == 0) goto 0x3f058717;
                				E0000000113F0529C0(E0000000113F0529C0(E0000000113F061400(_t13, 0x13f054d40)));
                				E0000000113F0621E8(E0000000113F054D40(), _t32, 0x13f054d40);
                				if (E0000000113F058EC8() == 0) goto 0x3f05873b; // executed
                				0x3f061d54(); // executed
                				_t20 = E0000000113F054D40();
                				0x3f05909c();
                				if (_t20 != 0) goto 0x3f05874f;
                				return _t20;
                			}












                0x13f0586a4
                0x13f0586af
                0x13f0586bb
                0x13f0586c0
                0x13f0586c7
                0x13f0586d1
                0x13f0586da
                0x13f0586dc
                0x13f0586e8
                0x13f0586fb
                0x13f0586fd
                0x13f058709
                0x13f05871c
                0x13f058728
                0x13f058734
                0x13f058736
                0x13f05873b
                0x13f058740
                0x13f058747
                0x13f05874e

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Initialize__scrt_fastfail_invalid_parameter_noinfo_set_fmode
                • String ID:
                • API String ID: 1714861634-0
                • Opcode ID: 4ca034c3268443245ee24b29e896d00d50891b666733e8bc72cb19cc8a401450
                • Instruction ID: 08b860cebe7163ced5e95ab3608d0e8e50fe7e28ebc5d11f88a216289a9cbcd7
                • Opcode Fuzzy Hash: 4ca034c3268443245ee24b29e896d00d50891b666733e8bc72cb19cc8a401450
                • Instruction Fuzzy Hash: 8B119234E08119C1FE5D77BD8A9F3E902938F94355F50043CB95D8A6D3EEA88B474262
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 71%
                			E0000000113F0638B0(signed int __ecx, void* __edx, void* __edi, void* __eflags, void* __rax, long long __rbx, void* __rsi, long long _a8) {
                				void* __rdi;
                				int _t20;
                				long _t27;
                				intOrPtr _t49;
                
                				_a8 = __rbx;
                				E0000000113F0605E0(__edi, __rax);
                				if (__rax != 0xffffffff) goto 0x3f0638ce;
                				goto 0x3f063928;
                				_t49 =  *0x3f0917a0; // 0x3445e0
                				if (__edi != 1) goto 0x3f0638e8;
                				if (( *(_t49 + 0xc8) & dil) != 0) goto 0x3f0638f5;
                				if (__edi != 2) goto 0x3f06390c;
                				if (( *(_t49 + 0x80) & 0x00000001) == 0) goto 0x3f06390c;
                				E0000000113F0605E0(2, _t49);
                				E0000000113F0605E0(1, _t49);
                				if (_t49 == _t49) goto 0x3f0638ca;
                				E0000000113F0605E0(__edi, _t49);
                				_t20 = CloseHandle(??); // executed
                				if (_t20 != 0) goto 0x3f0638ca;
                				_t27 = GetLastError();
                				E0000000113F060524(_t21, _t27, __edi, _t49, __ecx, __rsi);
                				 *((char*)( *((intOrPtr*)(0x3f0917a0 + (__ecx >> 6) * 8)) + 0x38 + (__ecx + __ecx * 8) * 8)) = 0;
                				if (_t27 == 0) goto 0x3f063960;
                				E0000000113F05DE44(_t27, _t49, _t49);
                				goto 0x3f063962;
                				return 0;
                			}







                0x13f0638b0
                0x13f0638bf
                0x13f0638c8
                0x13f0638cc
                0x13f0638ce
                0x13f0638dd
                0x13f0638e6
                0x13f0638ea
                0x13f0638f3
                0x13f0638f5
                0x13f063902
                0x13f06390a
                0x13f06390e
                0x13f063916
                0x13f06391e
                0x13f063926
                0x13f06392a
                0x13f06394b
                0x13f063952
                0x13f063956
                0x13f06395e
                0x13f06396c

                APIs
                • CloseHandle.KERNELBASE ref: 000000013F063916
                • GetLastError.KERNEL32(?,?,?,000000013F0637E3,?,?,00000000,000000013F06388B,?,?,?,?,?,?,000000013F05A566), ref: 000000013F063920
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CloseErrorHandleLast
                • String ID: E4
                • API String ID: 918212764-1217125225
                • Opcode ID: 12c23d5105a88acb804e74ebf782837962daae1713f2c50e447738db6b1d22c8
                • Instruction ID: 150107e017d6371c7abc96b82e8d9d0d7c37246cc3babd130d4cf8faf08785e2
                • Opcode Fuzzy Hash: 12c23d5105a88acb804e74ebf782837962daae1713f2c50e447738db6b1d22c8
                • Instruction Fuzzy Hash: 5A118E31F0064041FEAC577D95913FE1293DB847B4F24123EFA6A463D3DE6886868650
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 21%
                			E0000000113F062018() {
                				void* _t3;
                				void* _t8;
                
                				_t3 = E0000000113F06AD4C(); // executed
                				if (_t3 == 1) goto 0x3f062052;
                				if (( *( *[gs:0x60] + 0xbc) >> 0x00000008 & 0x00000001) != 0) goto 0x3f062052;
                				GetCurrentProcess();
                				E0000000113F062064(TerminateProcess(??, ??), _t8,  *[gs:0x60]);
                				ExitProcess(??);
                			}





                0x13f062020
                0x13f062028
                0x13f06203f
                0x13f062041
                0x13f062054
                0x13f06205b

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: d8a0b14cd86ab3ec898dca1a1510d615acac720a3763545de0ced35dc975d291
                • Instruction ID: e95f9d17d26043adfb3077e07a75581413dc5bcd712088bdb5dddd3dc75e117d
                • Opcode Fuzzy Hash: d8a0b14cd86ab3ec898dca1a1510d615acac720a3763545de0ced35dc975d291
                • Instruction Fuzzy Hash: DCE09A30B0070486FE5C6B299D953A923A3FB98751F20547CA94646753CE3DD64BCA11
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 63%
                			E0000000113F06A410(long long __rbx, void* __rcx, long long __rsi) {
                				void* _t97;
                				signed int _t99;
                				signed int _t120;
                				signed long long _t125;
                				long long _t129;
                				char* _t135;
                				void* _t136;
                				void* _t141;
                				signed char* _t145;
                				signed char* _t146;
                				void* _t147;
                				long long _t148;
                				int _t151;
                				void* _t152;
                				void* _t154;
                				signed long long _t155;
                				void* _t157;
                				void* _t160;
                				void* _t161;
                
                				_t148 = __rsi;
                				 *((long long*)(_t154 + 0x10)) = __rbx;
                				 *((long long*)(_t154 + 0x18)) = __rsi;
                				_t152 = _t154 - 0x680;
                				_t155 = _t154 - 0x780;
                				_t125 =  *0x3f082018; // 0xe88b9cb90319
                				 *(_t152 + 0x670) = _t125 ^ _t155;
                				if ( *((intOrPtr*)(__rcx + 4)) == 0xfde9) goto 0x3f06a58c;
                				if (GetCPInfo(_t151) == 0) goto 0x3f06a58c;
                				_t135 = _t155 + 0x70;
                				 *_t135 = 0;
                				_t136 = _t135 + 1;
                				if (1 - 0x100 < 0) goto 0x3f06a46c;
                				_t141 = _t155 + 0x56;
                				 *((char*)(_t155 + 0x70)) = 0x20;
                				goto 0x3f06a4a9;
                				r8d =  *(_t141 + 1) & 0x000000ff;
                				_t99 =  *(_t155 + 0x56) & 0x000000ff;
                				goto 0x3f06a49e;
                				if (_t99 - 0x100 >= 0) goto 0x3f06a4a3;
                				 *((char*)(_t155 + _t136 + 0x70)) = 0x20;
                				if (_t99 + 1 - r8d <= 0) goto 0x3f06a491;
                				_t118 =  *((intOrPtr*)(_t141 + 2));
                				if ( *((intOrPtr*)(_t141 + 2)) != 0) goto 0x3f06a487;
                				_t157 = _t155 + 0x70;
                				 *(_t155 + 0x30) =  *(_t155 + 0x30) & 0x00000000;
                				r9d = 0x100;
                				 *((intOrPtr*)(_t155 + 0x28)) =  *((intOrPtr*)(__rcx + 4));
                				 *(_t155 + 0x20) = _t152 + 0x270;
                				E0000000113F06B0C0(1,  *((intOrPtr*)(_t141 + 2)), __rcx, _t136, _t147, __rsi, _t157, _t160, _t161);
                				 *(_t155 + 0x40) =  *(_t155 + 0x40) & 0x00000000;
                				r8d = 0x100;
                				 *((intOrPtr*)(_t155 + 0x38)) =  *((intOrPtr*)(__rcx + 4));
                				 *(_t155 + 0x30) = 0x100;
                				 *((long long*)(_t155 + 0x28)) = _t152 + 0x70;
                				 *(_t155 + 0x20) = 0x100;
                				E0000000113F06FA58(_t97, 0, 1,  *((intOrPtr*)(_t141 + 2)), _t152 + 0x70, __rcx, _t136,  *((intOrPtr*)(__rcx + 0x220)), _t148, _t155 + 0x70, _t160, _t161); // executed
                				 *(_t155 + 0x40) =  *(_t155 + 0x40) & 0x00000000;
                				r8d = 0x200;
                				 *((intOrPtr*)(_t155 + 0x38)) =  *((intOrPtr*)(__rcx + 4));
                				_t129 = _t152 + 0x170;
                				 *(_t155 + 0x30) = 0x100;
                				 *((long long*)(_t155 + 0x28)) = _t129;
                				 *(_t155 + 0x20) = 0x100;
                				E0000000113F06FA58(_t97, 0, 1, _t118, _t129, __rcx, _t136,  *((intOrPtr*)(__rcx + 0x220)), _t148, _t155 + 0x70, _t160, _t161);
                				_t145 = _t152 + 0x270;
                				if (( *_t145 & 0x00000001) == 0) goto 0x3f06a561;
                				 *(_t129 + __rcx + 0x18) =  *(_t129 + __rcx + 0x18) | 0x00000010;
                				goto 0x3f06a576;
                				_t120 =  *_t145 & 0x00000002;
                				if (_t120 == 0) goto 0x3f06a574;
                				 *(_t129 + __rcx + 0x18) =  *(_t129 + __rcx + 0x18) | 0x00000020;
                				goto 0x3f06a576;
                				 *((char*)(_t129 + __rcx + 0x118)) = 0;
                				_t146 =  &(_t145[2]);
                				if (_t120 != 0) goto 0x3f06a551;
                				goto 0x3f06a5cf;
                				_t60 =  &(_t146[1]); // 0x1
                				_t61 = _t146 - 0x61; // -97
                				r8d = _t61;
                				_t62 = _t157 + 0x20; // -65
                				if (_t62 - 0x19 > 0) goto 0x3f06a5ad;
                				 *(_t136 + __rcx + 0x18) =  *(_t136 + __rcx + 0x18) | 0x00000010;
                				goto 0x3f06a5bf;
                				if (r8d - 0x19 > 0) goto 0x3f06a5bd;
                				 *(_t136 + __rcx + 0x18) =  *(_t136 + __rcx + 0x18) | 0x00000020;
                				goto 0x3f06a5bf;
                				 *((char*)(_t136 + __rcx + 0x118)) = 0;
                				if (1 - 0x100 < 0) goto 0x3f06a596;
                				return E0000000113F058680(_t60, _t129 + 1,  *(_t152 + 0x670) ^ _t155);
                			}






















                0x13f06a410
                0x13f06a410
                0x13f06a415
                0x13f06a41b
                0x13f06a423
                0x13f06a42a
                0x13f06a434
                0x13f06a447
                0x13f06a45a
                0x13f06a462
                0x13f06a46c
                0x13f06a470
                0x13f06a475
                0x13f06a47b
                0x13f06a480
                0x13f06a485
                0x13f06a487
                0x13f06a48c
                0x13f06a48f
                0x13f06a493
                0x13f06a497
                0x13f06a4a1
                0x13f06a4a9
                0x13f06a4ab
                0x13f06a4b0
                0x13f06a4b5
                0x13f06a4ba
                0x13f06a4bd
                0x13f06a4cf
                0x13f06a4d4
                0x13f06a4d9
                0x13f06a4e6
                0x13f06a4f2
                0x13f06a4fa
                0x13f06a4fe
                0x13f06a503
                0x13f06a507
                0x13f06a50c
                0x13f06a519
                0x13f06a528
                0x13f06a52c
                0x13f06a533
                0x13f06a537
                0x13f06a53c
                0x13f06a540
                0x13f06a54a
                0x13f06a554
                0x13f06a556
                0x13f06a55f
                0x13f06a561
                0x13f06a564
                0x13f06a566
                0x13f06a572
                0x13f06a576
                0x13f06a57d
                0x13f06a588
                0x13f06a58a
                0x13f06a593
                0x13f06a596
                0x13f06a596
                0x13f06a59a
                0x13f06a5a1
                0x13f06a5a3
                0x13f06a5ab
                0x13f06a5b1
                0x13f06a5b3
                0x13f06a5bb
                0x13f06a5bf
                0x13f06a5cd
                0x13f06a5f2

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Info
                • String ID:
                • API String ID: 1807457897-3916222277
                • Opcode ID: 84283770675b39abde34306101d49113749eaddf3cfaacc9ae08736a8dacc304
                • Instruction ID: 7ec0d295fe1abd9d910ffc2544a467a482e392685abdd93c791239a0ae385feb
                • Opcode Fuzzy Hash: 84283770675b39abde34306101d49113749eaddf3cfaacc9ae08736a8dacc304
                • Instruction Fuzzy Hash: 90510972B1C6D086E729DF28E0443DE7BE1F345754F64412DF68957A8ACB38C646CB90
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 67%
                			E0000000113F06465C(void* __ebx, void* __edi, signed int __esi, intOrPtr* __rax, long long __rbx, signed char** __rcx, long long __rdi, long long __rsi, void* __r12, long long _a8, long long _a16, long long _a24) {
                				void* _t55;
                				signed int _t56;
                				void* _t76;
                				signed int _t78;
                				intOrPtr* _t95;
                				signed char* _t97;
                				signed char** _t115;
                
                				_t95 = __rax;
                				_t76 = __edi;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_a24 = __rdi;
                				_t115 = __rcx;
                				if (__rcx != 0) goto 0x3f06468e;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x0000000d & 0x00000001) == 0) goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x0000000c & 0x00000001) != 0) goto 0x3f0647ab;
                				if (( *(__rcx + 0x14) >> 0x00000001 & 0x00000001) == 0) goto 0x3f0646bd;
                				asm("lock or dword [ecx+0x14], 0x10");
                				goto 0x3f0647ab;
                				asm("lock or dword [ecx+0x14], 0x1");
                				if (( *(__rcx + 0x14) & 0x000004c0) != 0) goto 0x3f0646d1;
                				E0000000113F06BA18( *(__rcx + 0x14) & 0x000004c0, __rax, __rbx, __rcx);
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(__rcx + 8));
                				_t55 = E0000000113F0628A4(__rax, __rcx);
                				r8d =  *((intOrPtr*)(__rcx + 0x20));
                				_t56 = E0000000113F0640E8(__ebx, _t55, _t76,  *((intOrPtr*)(__rcx + 8)),  *((intOrPtr*)(__rcx + 8)), __rcx, __r12); // executed
                				_t115[2] = _t56;
                				_t19 = _t95 + 1; // 0x1
                				if (_t19 - 1 <= 0) goto 0x3f064799;
                				_t78 = __esi | 0xffffffff;
                				if ((_t115[2] & 0x00000006) != 0) goto 0x3f064764;
                				if (E0000000113F0628A4(_t95, _t115) == _t78) goto 0x3f06474f;
                				if (E0000000113F0628A4(_t95, _t115) == 0xfffffffe) goto 0x3f06474f;
                				E0000000113F0628A4(_t95, _t115);
                				E0000000113F0628A4(_t95, _t115);
                				goto 0x3f064756;
                				if (( *0x13F0822A8 & 0x00000082) != 0x82) goto 0x3f064764;
                				asm("lock or dword [edi+0x14], 0x20");
                				if (_t115[4] != 0x200) goto 0x3f064788;
                				if ((_t115[2] >> 0x00000006 & 0x00000001) == 0) goto 0x3f064788;
                				if ((_t115[2] >> 0x00000008 & 0x00000001) != 0) goto 0x3f064788;
                				_t115[4] = 0x1000;
                				_t115[2] =  &(_t115[2][_t78]);
                				_t97 =  *_t115;
                				 *_t115 =  &(_t97[1]);
                				goto 0x3f0647ae;
                				asm("sbb eax, eax");
                				asm("lock or [edi+0x14], eax");
                				_t115[2] = _t115[2] & 0x00000000;
                				return  *_t97 & 0x000000ff | 0xffffffff;
                			}










                0x13f06465c
                0x13f06465c
                0x13f06465c
                0x13f064661
                0x13f064666
                0x13f064671
                0x13f064677
                0x13f064679
                0x13f06467e
                0x13f064684
                0x13f064689
                0x13f064696
                0x13f0646a4
                0x13f0646b1
                0x13f0646b3
                0x13f0646b8
                0x13f0646bd
                0x13f0646ca
                0x13f0646cc
                0x13f0646d8
                0x13f0646db
                0x13f0646e0
                0x13f0646e9
                0x13f0646ee
                0x13f0646f1
                0x13f0646f7
                0x13f064700
                0x13f064705
                0x13f064711
                0x13f06471e
                0x13f064723
                0x13f064739
                0x13f06474d
                0x13f06475d
                0x13f06475f
                0x13f06476b
                0x13f064775
                0x13f06477f
                0x13f064781
                0x13f064788
                0x13f06478b
                0x13f064794
                0x13f064797
                0x13f06479b
                0x13f0647a3
                0x13f0647a7
                0x13f0647c5

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: 4244ad875760342c4100683810c7ec801059967c090cb9e901b964c8b0113e2c
                • Instruction ID: 56cac348fb6702a6b22e88cdba881cab2740bc81491a606f70907a57557b50e9
                • Opcode Fuzzy Hash: 4244ad875760342c4100683810c7ec801059967c090cb9e901b964c8b0113e2c
                • Instruction Fuzzy Hash: 5D41D03AA1160497EE2CDB1CDA407EC37A2F786BA4F240229FB4587792CB34D663C740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 52%
                			E0000000113F05AC10(void* __esi, signed int __rax, long long __rbx, signed int __rcx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                				void* _t50;
                				void* _t56;
                				signed long long _t74;
                				intOrPtr _t80;
                				intOrPtr* _t81;
                				signed long long _t88;
                				void* _t92;
                				signed long long _t93;
                				signed long long _t94;
                				signed long long _t98;
                				signed long long _t100;
                				void* _t102;
                				void* _t108;
                				void* _t110;
                
                				_t92 = __rdx;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				if (__rcx != 0) goto 0x3f05ac40;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				_t74 = __rax | 0xffffffff;
                				goto 0x3f05ad2f;
                				_t100 = E0000000113F0628A4(_t74, __rcx);
                				if ( *(__rcx + 0x10) >= 0) goto 0x3f05ac52;
                				 *(__rcx + 0x10) =  *(__rcx + 0x10) & 0x00000000;
                				_t6 = _t92 + 1; // 0x1, executed
                				r8d = _t6;
                				0x3f064954(); // executed
                				if (_t74 < 0) goto 0x3f05ac37;
                				if (( *(__rcx + 0x14) & 0x000000c0) != 0) goto 0x3f05ac7d;
                				_t98 = _t74 -  *(__rcx + 0x10);
                				goto 0x3f05ad2f;
                				_t88 = _t100 >> 6;
                				_t110 =  *__rcx -  *((intOrPtr*)(__rcx + 8));
                				_t93 = _t100 + _t100 * 8;
                				sil =  *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t88 * 8)) + 0x39 + _t93 * 8));
                				if (( *(__rcx + 0x14) & 0x00000003) == 0) goto 0x3f05acf1;
                				if (sil != 1) goto 0x3f05acca;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t88 * 8)) + 0x3d + _t93 * 8) & 0x00000002) == 0) goto 0x3f05acca;
                				_t94 = _t98;
                				_t50 = E0000000113F05AE8C(__esi,  *((intOrPtr*)(0x3f0917a0 + _t88 * 8)), __rcx, __rcx, _t94, _t100, _t102, _t108, _t110);
                				goto 0x3f05ad2f;
                				_t80 =  *((intOrPtr*)(0x3f0917a0 + __rcx * 8));
                				if ( *((char*)(_t80 + 0x38 + _t94 * 8)) >= 0) goto 0x3f05ace7;
                				r8b = sil;
                				E0000000113F05B008(_t50,  *((intOrPtr*)(__rcx + 8)),  *__rcx, 0x3f0917a0, _t108);
                				if (_t98 != 0) goto 0x3f05ad0b;
                				_t81 = _t110 + _t80;
                				goto 0x3f05ad2f;
                				if (( *(__rcx + 0x14) >> 0x00000002 & 0x00000001) != 0) goto 0x3f05ace7;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 0x16;
                				goto 0x3f05ac37;
                				if (( *(__rcx + 0x14) & 0x00000001) == 0) goto 0x3f05ad22;
                				_t56 = E0000000113F05AD40(__esi, __rcx, __rcx, _t98, _t110 + _t80);
                				goto 0x3f05ad2f;
                				if (sil != 1) goto 0x3f05ad2b;
                				return _t56;
                			}

















                0x13f05ac10
                0x13f05ac10
                0x13f05ac15
                0x13f05ac25
                0x13f05ac27
                0x13f05ac2c
                0x13f05ac32
                0x13f05ac37
                0x13f05ac3b
                0x13f05ac49
                0x13f05ac4c
                0x13f05ac4e
                0x13f05ac56
                0x13f05ac56
                0x13f05ac5a
                0x13f05ac65
                0x13f05ac6c
                0x13f05ac72
                0x13f05ac78
                0x13f05ac90
                0x13f05ac94
                0x13f05ac98
                0x13f05aca0
                0x13f05acaa
                0x13f05acb0
                0x13f05acbb
                0x13f05acbd
                0x13f05acc3
                0x13f05acc8
                0x13f05acca
                0x13f05acd3
                0x13f05acd8
                0x13f05acdf
                0x13f05acea
                0x13f05acec
                0x13f05acef
                0x13f05acf9
                0x13f05acfb
                0x13f05ad00
                0x13f05ad06
                0x13f05ad10
                0x13f05ad1b
                0x13f05ad20
                0x13f05ad26
                0x13f05ad3e

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: 1af53d1f7e59a9d11f33a225be346b3d5a6844df69b3366722f3e679c06060e1
                • Instruction ID: 8e49222d33ba03a0aa8ca14566918f8696f05cd18ce31147da14bfdfb6c85803
                • Opcode Fuzzy Hash: 1af53d1f7e59a9d11f33a225be346b3d5a6844df69b3366722f3e679c06060e1
                • Instruction Fuzzy Hash: 9B31C472A08644C6EF58EA2DD4183E86792EB44FE8F404139F91E177D7DAB4CA43C310
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 86%
                			E0000000113F0640E8(signed int __ebx, signed int __ecx, void* __edi, signed int __rbx, void* __rdx, signed int __rdi, signed int __r12, void* _a16, void* _a24, void* _a32) {
                				void* _t44;
                				void* _t47;
                				signed int* _t52;
                				signed int* _t54;
                				signed int* _t56;
                				signed int* _t65;
                				void* _t68;
                				signed long long _t73;
                				void* _t75;
                				void* _t77;
                				signed long long _t79;
                
                				_t44 = __edi;
                				_t52 = _t65;
                				_t52[4] = __rbx;
                				_t52[6] = __rdi;
                				_t52[8] = __r12;
                				_t52[2] = __ecx;
                				r14d = r8d;
                				if (__edi != 0xfffffffe) goto 0x3f06412a;
                				E0000000113F05DE94(_t52);
                				 *_t52 =  *_t52 & 0x00000000;
                				E0000000113F05DEB4(_t52);
                				 *_t52 = 9;
                				goto 0x3f0641e4;
                				if (__ecx < 0) goto 0x3f0641cc;
                				_t47 = _t44 -  *0x3f091ba0; // 0x40
                				if (_t47 >= 0) goto 0x3f0641cc;
                				_t79 = __ecx >> 6;
                				_t73 = __ecx + __ecx * 8;
                				_t54 =  *((intOrPtr*)(0x3f0917a0 + _t79 * 8));
                				if (( *(_t54 + 0x38 + _t73 * 8) & 0x00000001) == 0) goto 0x3f0641cc;
                				if (r14d - 0x7fffffff <= 0) goto 0x3f064180;
                				E0000000113F05DE94(_t54);
                				 *_t54 =  *_t54 & 0x00000000;
                				E0000000113F05DEB4(_t54);
                				 *_t54 = 0x16;
                				goto 0x3f0641df;
                				E0000000113F0602D4();
                				_t56 =  *((intOrPtr*)(0x3f0917a0 + _t79 * 8));
                				if (( *(0x3f0917a0 + 0x38 + _t73 * 8) & 0x00000001) != 0) goto 0x3f0641b2;
                				E0000000113F05DEB4(_t56);
                				 *0x3f0917a0 = 9;
                				E0000000113F05DE94(_t56);
                				 *0x3f0917a0 =  *0x3f0917a0 & 0x00000000;
                				goto 0x3f0641c1;
                				r8d = r14d;
                				E0000000113F064204(__ebx | 0xffffffff, __edi, _t56, __rbx, __rdx, _t68, _t77, _t75); // executed
                				E0000000113F0603BC();
                				goto 0x3f0641e7;
                				E0000000113F05DE94(_t56);
                				 *0x3f0917a0 =  *0x3f0917a0 & 0x00000000;
                				E0000000113F05DEB4(_t56);
                				 *_t56 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}














                0x13f0640e8
                0x13f0640e8
                0x13f0640eb
                0x13f0640ef
                0x13f0640f3
                0x13f0640f7
                0x13f064104
                0x13f064110
                0x13f064112
                0x13f064117
                0x13f06411a
                0x13f06411f
                0x13f064125
                0x13f06412c
                0x13f064132
                0x13f064138
                0x13f064144
                0x13f064152
                0x13f064156
                0x13f064160
                0x13f064169
                0x13f06416b
                0x13f064170
                0x13f064173
                0x13f064178
                0x13f06417e
                0x13f064182
                0x13f064191
                0x13f06419b
                0x13f06419d
                0x13f0641a2
                0x13f0641a8
                0x13f0641ad
                0x13f0641b0
                0x13f0641b2
                0x13f0641ba
                0x13f0641c3
                0x13f0641ca
                0x13f0641cc
                0x13f0641d1
                0x13f0641d4
                0x13f0641d9
                0x13f064200

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: 4977609802220c77958fcbd3692edb3fa6271fa71f28f519ce4552e3dbef245d
                • Instruction ID: 11a1496a8d28bd9748ca49c50118b6eaa429933e8c15dd85fc7974796203022b
                • Opcode Fuzzy Hash: 4977609802220c77958fcbd3692edb3fa6271fa71f28f519ce4552e3dbef245d
                • Instruction Fuzzy Hash: D731A435E0560085F719AB5DC8417ED2A63E7A0BB5F61022EFA29073D3DBB88A428710
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 77%
                			E0000000113F0647C8(void* __ebx, signed int __ecx, signed int* __rax, long long __rbx, void* __rdx, long long __rsi, signed int _a8, long long _a16, long long _a24) {
                				void* _t36;
                				void* _t39;
                				signed int* _t46;
                				signed int* _t47;
                				signed long long _t59;
                				signed long long _t64;
                
                				_t31 = __ebx;
                				_a16 = __rbx;
                				_a24 = __rsi;
                				_a8 = __ecx;
                				r14d = r8d;
                				if (__ebx != 0xfffffffe) goto 0x3f064809;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f06489b;
                				if (__ecx < 0) goto 0x3f064883;
                				_t39 = _t31 -  *0x3f091ba0; // 0x40
                				if (_t39 >= 0) goto 0x3f064883;
                				_t59 = __ecx >> 6;
                				_t64 = __ecx + __ecx * 8;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t59 * 8)) + 0x38 + _t64 * 8) & 0x00000001) == 0) goto 0x3f064883;
                				E0000000113F0602D4();
                				_t46 =  *((intOrPtr*)(0x3f0917a0 + _t59 * 8));
                				if (( *(_t46 + 0x38 + _t64 * 8) & 0x00000001) != 0) goto 0x3f064867;
                				E0000000113F05DEB4(_t46);
                				 *_t46 = 9;
                				E0000000113F05DE94(_t46);
                				 *_t46 =  *_t46 & 0x00000000;
                				goto 0x3f064877;
                				r8d = r14d;
                				E0000000113F0648B8(__ebx, __ebx, _t36,  *(_t46 + 0x38 + _t64 * 8) & 0x00000001, _t46, __ecx, __rdx, _t59); // executed
                				E0000000113F0603BC();
                				_t47 = _t46;
                				goto 0x3f06489f;
                				E0000000113F05DE94(_t47);
                				 *_t47 =  *_t47 & 0x00000000;
                				E0000000113F05DEB4(_t47);
                				 *_t47 = 9;
                				return E0000000113F063618();
                			}









                0x13f0647c8
                0x13f0647c8
                0x13f0647cd
                0x13f0647d2
                0x13f0647e3
                0x13f0647ef
                0x13f0647f1
                0x13f0647f6
                0x13f0647f9
                0x13f0647fe
                0x13f064804
                0x13f06480b
                0x13f06480d
                0x13f064813
                0x13f06481b
                0x13f064829
                0x13f064838
                0x13f06483c
                0x13f064845
                0x13f064850
                0x13f064852
                0x13f064857
                0x13f06485d
                0x13f064862
                0x13f064865
                0x13f064867
                0x13f06486f
                0x13f064879
                0x13f06487e
                0x13f064881
                0x13f064883
                0x13f064888
                0x13f06488b
                0x13f064890
                0x13f0648b6

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: E4
                • API String ID: 0-1217125225
                • Opcode ID: 41d14df0cf39d0762983fa5336a71e560962de6775d4bb3ab1ce58456a5dbab7
                • Instruction ID: abe8fc0f767cc3eb8e16f2712fe7dd4a7af550dbaaed89e28b1a2dcadaf5a880
                • Opcode Fuzzy Hash: 41d14df0cf39d0762983fa5336a71e560962de6775d4bb3ab1ce58456a5dbab7
                • Instruction Fuzzy Hash: 6721D032E092908AF74DAF5A984179D2663E740BB1F64463EBD39073D3C7B8CA438740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06E2EC(intOrPtr* __rax, long long __rbx, long long _a8, intOrPtr _a40) {
                
                				_a8 = __rbx;
                				if (_a40 != 0) goto 0x3f06e321;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				return 0x16;
                			}



                0x13f06e2ec
                0x13f06e301
                0x13f06e303
                0x13f06e30d
                0x13f06e30f
                0x13f06e320

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: 40ce2b9f8d7f1843f3634450a6ce58fbba5b5d9cb33207c58e91754079f57d88
                • Instruction ID: 72c7f81eca507cbc56da13bcf85eb021ecc8cb8f44a58c213cbe0a991bbb1a20
                • Opcode Fuzzy Hash: 40ce2b9f8d7f1843f3634450a6ce58fbba5b5d9cb33207c58e91754079f57d88
                • Instruction Fuzzy Hash: A8219632A1478087EB698F1CD5447A977A2F784B64F644239FA99476DBDB3DC6028B00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06022C(void* __ecx, intOrPtr* __rax, long long __rbx, long long __rdi, long long __rsi, long long _a8, long long _a16, long long _a24) {
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_a24 = __rdi;
                				if (__ecx - 0x2000 < 0) goto 0x3f060274;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				E0000000113F063618();
                				return 9;
                			}



                0x13f06022c
                0x13f060231
                0x13f060236
                0x13f060249
                0x13f06024b
                0x13f060255
                0x13f060257
                0x13f060273

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3215553584-1217125225
                • Opcode ID: c4bb4eedc5c79a63ec1b8a6b24d731bcc6c6bba80e5bb120582e4ad56882732c
                • Instruction ID: d6496c5ebcee155660ebd25d75bdebe6ccd1efcb74af19d62b0c842e99456b68
                • Opcode Fuzzy Hash: c4bb4eedc5c79a63ec1b8a6b24d731bcc6c6bba80e5bb120582e4ad56882732c
                • Instruction Fuzzy Hash: 4C11BC32A4664186F3089B1CE58039AA7A3FB40794F65053CFA59477B3EB38DA52CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 77%
                			E0000000113F06380C(signed int __ecx, char __edx, signed int* __rax, void* __rbx, char _a8, void* _a16, char _a24, char _a32) {
                				signed int* _v24;
                				void* _t31;
                				signed int* _t38;
                
                				_t28 = __edx;
                				_a8 = __ecx;
                				if (__edx != 0xfffffffe) goto 0x3f063831;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 9;
                				goto 0x3f0638a5;
                				if (__ecx < 0) goto 0x3f06388d;
                				_t31 = _t28 -  *0x3f091ba0; // 0x40
                				if (_t31 >= 0) goto 0x3f06388d;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + (__ecx >> 6) * 8)) + 0x38 + (__ecx + __ecx * 8) * 8) & 0x00000001) == 0) goto 0x3f06388d;
                				_t38 =  &_a8;
                				_a24 = __edx;
                				_a32 = __edx;
                				_v24 = _t38;
                				E0000000113F063798(__edx, __rbx,  &_a32,  &_v24,  &_a24); // executed
                				goto 0x3f0638a8;
                				E0000000113F05DE94(_t38);
                				 *_t38 =  *_t38 & 0x00000000;
                				E0000000113F05DEB4(_t38);
                				 *_t38 = 9;
                				return E0000000113F063618() | 0xffffffff;
                			}






                0x13f06380c
                0x13f06380c
                0x13f06381a
                0x13f06381c
                0x13f063821
                0x13f063824
                0x13f063829
                0x13f06382f
                0x13f063833
                0x13f063835
                0x13f06383b
                0x13f06385e
                0x13f063860
                0x13f063865
                0x13f063869
                0x13f063877
                0x13f063886
                0x13f06388b
                0x13f06388d
                0x13f063892
                0x13f063895
                0x13f06389a
                0x13f0638ac

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: E4
                • API String ID: 0-1217125225
                • Opcode ID: baa15f1439ff166155ec0188a7d574a9c1398128c9aa2f8b05e9bd1ad3ef2240
                • Instruction ID: a8f3d14ecec724ca21dfdf4c3b4fc856a1278137379330a4decb38a81608d5c3
                • Opcode Fuzzy Hash: baa15f1439ff166155ec0188a7d574a9c1398128c9aa2f8b05e9bd1ad3ef2240
                • Instruction Fuzzy Hash: F3118F7290978099EA1CAF68D4403DD7762EB90761FA0423BF659063E7D7B9C646CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F065D34() {
                				void* _t4;
                				void* _t7;
                				void* _t11;
                
                				E0000000113F065B5C(0x1c, _t7, "AppPolicyGetProcessTerminationMethod", _t11, 0x3f078674, "AppPolicyGetProcessTerminationMethod"); // executed
                				if (_t4 == 0) goto 0x3f065d77;
                				goto ( *0x3f072350);
                			}






                0x13f065d57
                0x13f065d5f
                0x13f065d70

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: AppPolicyGetProcessTerminationMethod
                • API String ID: 2742660187-2031265017
                • Opcode ID: 60f8f55c1d09f95549388ba841670d9caef90142e0006adc000e97f6f4fdf900
                • Instruction ID: ff35c0ceb1d50f3b052556c5d95ea710cce2da0aae98ff5319d3a09bfc9553bf
                • Opcode Fuzzy Hash: 60f8f55c1d09f95549388ba841670d9caef90142e0006adc000e97f6f4fdf900
                • Instruction Fuzzy Hash: 07E08671F01904E1FE1C47B9A9443E11253D71C774F581779B9380A3D29A388BDBC740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F065E9C() {
                				void* _t4;
                				void* _t7;
                				void* _t10;
                
                				E0000000113F065B5C(3, _t7, "FlsAlloc", _t10, 0x3f078618, 0x3f078620); // executed
                				if (_t4 == 0) goto 0x3f065ed8;
                				goto ( *0x3f072350);
                			}






                0x13f065ebf
                0x13f065ec7
                0x13f065ed1

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: FlsAlloc
                • API String ID: 2742660187-671089009
                • Opcode ID: 37c484a0395dd07e5c7ef60d257afc346ca23f1fe52009b66039b7293385320f
                • Instruction ID: dff309963f684b50f4645d280839f267075f2676b0b97b29e5b141c19e790f58
                • Opcode Fuzzy Hash: 37c484a0395dd07e5c7ef60d257afc346ca23f1fe52009b66039b7293385320f
                • Instruction Fuzzy Hash: CCE0EC71E01908D1FA1D5B99A9513E413A3F70C754F5810B9BA180A2A3EA38879FCB54
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 88%
                			E0000000113F06A8EC(void* __ecx, void* __esp, void* __eflags, signed long long __rbx, void* __rdx, void* __r8, void* __r10, void* _a12, long long _a24) {
                				signed long long _v64;
                				signed int _v76;
                				char _v94;
                				char _v100;
                				void* __rsi;
                				void* __rbp;
                				void* _t50;
                				void* _t86;
                				intOrPtr _t89;
                				void* _t93;
                				void* _t108;
                				signed char _t109;
                				intOrPtr _t111;
                				signed char _t117;
                				void* _t118;
                				signed long long _t120;
                				signed long long _t130;
                				signed long long _t131;
                				signed long long _t135;
                				signed char* _t139;
                				char* _t148;
                				signed char* _t150;
                				void* _t156;
                				void* _t157;
                				void* _t158;
                				void* _t161;
                				signed char* _t163;
                				signed long long _t167;
                
                				_t161 = __r8;
                				_t131 = __rbx;
                				_a24 = __rbx;
                				_t120 =  *0x3f082018; // 0xe88b9cb90319
                				_v64 = _t120 ^ _t158 - 0x00000040;
                				_t156 = __rdx;
                				_t50 = E0000000113F06A300(__ecx, __eflags, _t120 ^ _t158 - 0x00000040);
                				_t86 = _t50;
                				if (_t50 == 0) goto 0x3f06ab76;
                				r14d = 0;
                				_t3 = _t131 + 1; // 0x1
                				_t93 = _t3;
                				if ( *0x3f082890 == _t86) goto 0x3f06aa89;
                				r14d = r14d + _t93;
                				if (r14d - 5 < 0) goto 0x3f06a933;
                				if (_t86 == 0xfde8) goto 0x3f06aa81;
                				if (IsValidCodePage(??) == 0) goto 0x3f06aa81;
                				if (_t86 != 0xfde9) goto 0x3f06a99c;
                				 *((long long*)(__rdx + 4)) = 0x13f0828c0;
                				 *((long long*)(__rdx + 0x220)) = __rbx;
                				 *((intOrPtr*)(__rdx + 0x18)) = 0;
                				 *((short*)(__rdx + 0x1c)) = 0;
                				_t8 = _t156 + 0xc; // 0xc
                				memset(_t86, 0, 6);
                				E0000000113F06A410(__rbx, __rdx, __rdx); // executed
                				goto 0x3f06ab7e;
                				_t148 =  &_v100;
                				if (GetCPInfo(??, ??) == 0) goto 0x3f06aa75;
                				_t10 = _t156 + 0x18; // 0x18
                				r8d = 0x101;
                				E0000000113F0597D0(_t56, 0, _t10, _t148, _t161);
                				 *((intOrPtr*)(_t156 + 4)) = _t86 + 6;
                				 *(_t156 + 0x220) = _t131;
                				if (_v100 != 2) goto 0x3f06aa6b;
                				_t139 =  &_v94;
                				if (_v94 == 0) goto 0x3f06aa0e;
                				if (_t139[1] == 0) goto 0x3f06aa0e;
                				_t108 = ( *_t139 & 0x000000ff) - (_t139[1] & 0x000000ff);
                				if (_t108 > 0) goto 0x3f06aa06;
                				 *(_t8 + _t156 + 0x18) =  *(_t8 + _t156 + 0x18) | 0x00000004;
                				_t89 = _t148 + 1 + _t93;
                				if (_t108 != 0) goto 0x3f06a9fa;
                				_t109 = _t139[2];
                				if (_t109 != 0) goto 0x3f06a9e2;
                				_t24 = _t156 + 0x1a; // 0x1a
                				 *_t24 =  *_t24 | 0x00000008;
                				if (_t109 != 0) goto 0x3f06aa17;
                				if (_t109 == 0) goto 0x3f06aa5b;
                				if (_t109 == 0) goto 0x3f06aa52;
                				if (_t109 == 0) goto 0x3f06aa49;
                				if ( *((intOrPtr*)(_t156 + 4)) - 0x393 == _t93) goto 0x3f06aa40;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				goto 0x3f06aa62;
                				_t130 =  *0x3f079338; // 0x13f079358
                				 *(_t156 + 0x220) = _t130;
                				goto 0x3f06aa6d;
                				 *((intOrPtr*)(_t156 + 8)) = 0;
                				goto 0x3f06a980;
                				_t111 =  *0x3f091fe0; // 0x0
                				if (_t111 != 0) goto 0x3f06ab76;
                				goto 0x3f06ab80;
                				_t28 = _t156 + 0x18; // 0x18
                				r8d = 0x101;
                				E0000000113F0597D0((_t139[1] & 0x000000ff) - ( *_t139 & 0x000000ff) | 0xffffffff, 0, _t28, _t148 - _t157, _t161);
                				r14d = 4;
                				_t167 = _t130 + _t130 * 2 << 4;
                				_t163 = 0x13f0828a0 + _t167;
                				_t150 = _t163;
                				if ( *_t163 == 0) goto 0x3f06aaff;
                				if (_t150[1] == 0) goto 0x3f06aaff;
                				r8d =  *_t150 & 0x000000ff;
                				if (r8d - (_t150[1] & 0x000000ff) > 0) goto 0x3f06aaf7;
                				_t34 = _t161 + 1; // 0x81
                				r10d = _t34;
                				if (r10d - 0x101 >= 0) goto 0x3f06aaf7;
                				r8d = r8d;
                				 *(__r10 + _t156 + 0x18) =  *(__r10 + _t156 + 0x18) |  *0x3f082880;
                				r10d = r10d;
                				if (r8d - (_t150[1] & 0x000000ff) <= 0) goto 0x3f06aad7;
                				_t117 = _t150[2];
                				if (_t117 != 0) goto 0x3f06aac1;
                				if (_t117 != 0) goto 0x3f06aab9;
                				 *((intOrPtr*)(_t156 + 4)) = _t89;
                				 *((intOrPtr*)(_t156 + 8)) = 0;
                				if (_t117 == 0) goto 0x3f06ab42;
                				if (_t117 == 0) goto 0x3f06ab39;
                				if (_t117 == 0) goto 0x3f06ab30;
                				_t118 = _t89 - 0x393;
                				if (_t118 != 0) goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				goto 0x3f06ab49;
                				_t135 =  *0x3f079338; // 0x13f079358
                				 *(_t156 + 0x220) = _t135;
                				_t43 = _t156 + 0xc; // 0x10
                				 *_t43 =  *(_t167 - _t156 + 0x3f082890 + _t43 - 8) & 0x0000ffff;
                				if (_t118 != 0) goto 0x3f06ab60;
                				goto 0x3f06a98f;
                				E0000000113F06A380(_t89 - 0x393, __esp + 0xc, _t118, _t130, _t135, _t156, _t43 + 2, _t156);
                				return E0000000113F058680(6, _t130, _v76 ^ _t158 - 0x00000040);
                			}































                0x13f06a8ec
                0x13f06a8ec
                0x13f06a8ec
                0x13f06a900
                0x13f06a90a
                0x13f06a90f
                0x13f06a912
                0x13f06a919
                0x13f06a91d
                0x13f06a92a
                0x13f06a930
                0x13f06a930
                0x13f06a935
                0x13f06a93b
                0x13f06a946
                0x13f06a94e
                0x13f06a95f
                0x13f06a96c
                0x13f06a96e
                0x13f06a972
                0x13f06a979
                0x13f06a97c
                0x13f06a980
                0x13f06a98c
                0x13f06a992
                0x13f06a997
                0x13f06a99c
                0x13f06a9ab
                0x13f06a9b3
                0x13f06a9b7
                0x13f06a9bd
                0x13f06a9c7
                0x13f06a9ca
                0x13f06a9d1
                0x13f06a9d7
                0x13f06a9e0
                0x13f06a9e5
                0x13f06a9ee
                0x13f06a9f0
                0x13f06a9fa
                0x13f06a9ff
                0x13f06aa04
                0x13f06aa0a
                0x13f06aa0c
                0x13f06aa0e
                0x13f06aa17
                0x13f06aa20
                0x13f06aa2b
                0x13f06aa30
                0x13f06aa35
                0x13f06aa39
                0x13f06aa3e
                0x13f06aa47
                0x13f06aa50
                0x13f06aa59
                0x13f06aa5b
                0x13f06aa62
                0x13f06aa69
                0x13f06aa6d
                0x13f06aa70
                0x13f06aa75
                0x13f06aa7b
                0x13f06aa84
                0x13f06aa8b
                0x13f06aa8f
                0x13f06aa95
                0x13f06aaa8
                0x13f06aab2
                0x13f06aab6
                0x13f06aab9
                0x13f06aabf
                0x13f06aac4
                0x13f06aac6
                0x13f06aad1
                0x13f06aad3
                0x13f06aad3
                0x13f06aade
                0x13f06aae3
                0x13f06aae6
                0x13f06aaeb
                0x13f06aaf5
                0x13f06aafb
                0x13f06aafd
                0x13f06ab09
                0x13f06ab0b
                0x13f06ab0e
                0x13f06ab17
                0x13f06ab1c
                0x13f06ab21
                0x13f06ab23
                0x13f06ab25
                0x13f06ab2e
                0x13f06ab37
                0x13f06ab40
                0x13f06ab42
                0x13f06ab4c
                0x13f06ab53
                0x13f06ab65
                0x13f06ab6f
                0x13f06ab71
                0x13f06ab79
                0x13f06aba4

                APIs
                  • Part of subcall function 000000013F06A300: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,000000013F06A624,?,?,?,?,00000000,?,?,000000013F06A8C2), ref: 000000013F06A32A
                • IsValidCodePage.KERNEL32(00000000,00000001,00000000,?,00000000,00000001,?,000000013F06A6D7,?,?,?,?,00000000,?,?,000000013F06A8C2), ref: 000000013F06A957
                • GetCPInfo.KERNEL32(?,000000013F06A6D7,?,?,?,?,00000000,?,?,000000013F06A8C2,?,?,?,?,000000013F0617CE), ref: 000000013F06A9A3
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CodeInfoPageValid
                • String ID:
                • API String ID: 546120528-0
                • Opcode ID: b227e7d3ad4ff2527b227c516facdf3534cd8e7aeb2d123029d3623963e68f84
                • Instruction ID: ca17ade743f08203c9858fe35b0fa00df02dda59099983784433bbe1f363656c
                • Opcode Fuzzy Hash: b227e7d3ad4ff2527b227c516facdf3534cd8e7aeb2d123029d3623963e68f84
                • Instruction Fuzzy Hash: BD819E72B0428086E76DAF2D95543E9B7A3E344760F68413EE68A57693DB78CB478700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A654(intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, void* __r8, long long __r9, long long _a8, long long _a32) {
                
                				_a8 = __rbx;
                				_a32 = __r9;
                				if (__r8 == 0) goto 0x3f05a695;
                				if (__r9 == 0) goto 0x3f05a695;
                				if (__rcx != 0) goto 0x3f05a6ac;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				return 0;
                			}



                0x13f05a654
                0x13f05a659
                0x13f05a679
                0x13f05a67e
                0x13f05a683
                0x13f05a685
                0x13f05a68a
                0x13f05a690
                0x13f05a6ab

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 9592a9192376ab8ed3866bcce3ce43f042c8573d9d4793acd55ca655b7edca00
                • Instruction ID: 3132e9841739948963f4545db7151b5c45122c05cd2c94d7866afd093f9c9883
                • Opcode Fuzzy Hash: 9592a9192376ab8ed3866bcce3ce43f042c8573d9d4793acd55ca655b7edca00
                • Instruction Fuzzy Hash: 2E61C831B09644C9FA3C9E3D94087EA6693B784BB8F144239BD6D277D7DBB8C6438601
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F06ACAC(signed int __rax, long long __rbx, long long __rsi, void* __r11) {
                				void* _t12;
                				signed long long _t26;
                				WCHAR* _t35;
                				long long _t41;
                				void* _t50;
                
                				 *((long long*)(_t50 + 8)) = __rbx;
                				 *((long long*)(_t50 + 0x10)) = _t41;
                				 *((long long*)(_t50 + 0x18)) = __rsi;
                				GetEnvironmentStringsW(); // executed
                				if (__rax == 0) goto 0x3f06ad33;
                				if ( *__rax == 0) goto 0x3f06acf5;
                				_t26 = (__rax | 0xffffffff) + 1;
                				if ( *((intOrPtr*)(__rax + _t26 * 2)) != 0) goto 0x3f06acdc;
                				_t44 = __rax + _t26 * 2 + 2;
                				if ( *((intOrPtr*)(__rax + _t26 * 2 + 2)) != 0) goto 0x3f06acd8;
                				_t12 = E0000000113F063738(_t26, (_t44 - __rax + 2 >> 1) + (_t44 - __rax + 2 >> 1));
                				if (_t26 == 0) goto 0x3f06ad23;
                				E0000000113F0593C0(_t12, _t26, __rax, (_t44 - __rax + 2 >> 1) + (_t44 - __rax + 2 >> 1));
                				E0000000113F0636F8(_t26, _t26);
                				return FreeEnvironmentStringsW(_t35);
                			}








                0x13f06acac
                0x13f06acb1
                0x13f06acb6
                0x13f06acc0
                0x13f06acce
                0x13f06acd6
                0x13f06acdc
                0x13f06ace4
                0x13f06aceb
                0x13f06acf3
                0x13f06ad05
                0x13f06ad10
                0x13f06ad1b
                0x13f06ad25
                0x13f06ad4a

                APIs
                • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,000000013F06183A,?,?,TMP,000000013F061D02,?,?,?,?,000000013F06977C,?,?,TMP), ref: 000000013F06ACC0
                • FreeEnvironmentStringsW.KERNEL32(?,?,00000000,000000013F06183A,?,?,TMP,000000013F061D02,?,?,?,?,000000013F06977C,?,?,TMP), ref: 000000013F06AD2D
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: EnvironmentStrings$Free
                • String ID:
                • API String ID: 3328510275-0
                • Opcode ID: 307b7ef8cee239da5e234536b8579ff61633f67395710cc746748c429829e94e
                • Instruction ID: 19671bd8e601cb9335e58da16b5a018f584a6324f855038d921224d345c6d28e
                • Opcode Fuzzy Hash: 307b7ef8cee239da5e234536b8579ff61633f67395710cc746748c429829e94e
                • Instruction Fuzzy Hash: 84018C31F4565089DE29BF2965043D96261EB44BF0F9C4638BE6A177C6DE28C6428740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 79%
                			E0000000113F059FF8() {
                				intOrPtr _t2;
                				void* _t11;
                				void* _t12;
                
                				E0000000113F05A21C(); // executed
                				 *0x3f082040 = _t2;
                				if (_t2 == 0xffffffff) goto 0x3f05a038;
                				if (E0000000113F05A2F4(_t2, _t2 - 0xffffffff, _t11, _t12, 0x3f091330) == 0) goto 0x3f05a033;
                				 *0x3f0913a8 = 0xfffffffe;
                				goto 0x3f05a03a;
                				E0000000113F05A040();
                				return 0;
                			}






                0x13f05a003
                0x13f05a008
                0x13f05a011
                0x13f05a023
                0x13f05a025
                0x13f05a031
                0x13f05a033
                0x13f05a03e

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                • String ID:
                • API String ID: 3765095794-0
                • Opcode ID: 1254310bdd7980890fdd32061b20a1cd37b18f601ae636acbf53c5b8c47d7338
                • Instruction ID: a204a790082a1b61847ffa42d7848ca8c0461029055ab3977419a6129bdb63ad
                • Opcode Fuzzy Hash: 1254310bdd7980890fdd32061b20a1cd37b18f601ae636acbf53c5b8c47d7338
                • Instruction Fuzzy Hash: 2BE04F30E18201D5EE1C6B3C9C8A3D523632745350FA05A3EB02DA21F3EAA9834B9700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F05A064() {
                				void* _t1;
                				void* _t6;
                				void* _t9;
                				void* _t10;
                				void* _t12;
                
                				r8d = 0;
                				_t1 = E0000000113F05A348(0xfa0, _t6, _t9, _t10, 0x3f0913b0, _t12); // executed
                				if (_t1 == 0) goto 0x3f05a08a;
                				 *0x3f0913d8 =  *0x3f0913d8 + 1;
                				goto 0x3f05a091;
                				E0000000113F05A098();
                				return 0;
                			}








                0x13f05a068
                0x13f05a077
                0x13f05a07e
                0x13f05a080
                0x13f05a088
                0x13f05a08a
                0x13f05a095

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CriticalInitializeSection__vcrt___vcrt_uninitialize_locks
                • String ID:
                • API String ID: 1232245925-0
                • Opcode ID: c12b0918a402b92c512b9c5bee1e4429491ab56cb47ece2fa303f3a71b730ad6
                • Instruction ID: 4153ce4970e373e66b8915b6a6d61e5409e3b4a93302298e34d3d1f7c54c4363
                • Opcode Fuzzy Hash: c12b0918a402b92c512b9c5bee1e4429491ab56cb47ece2fa303f3a71b730ad6
                • Instruction Fuzzy Hash: A2D05E38F28252C5FA583729A9453E603625706300FA0207CF80852A939858834B5A11
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 90%
                			E0000000113F05EED8(void* __esi, signed int __rax, long long __rbx, signed int* __rcx, long long __rdx, long long __rsi, void* __r8, void* __r9, signed int* _a8, void* _a16, long long _a24, long long _a32) {
                				void* _v40;
                				intOrPtr _v48;
                				intOrPtr* _v64;
                				char _v72;
                				intOrPtr _v80;
                				signed int* _v88;
                				void* __rbp;
                				signed int _t44;
                				signed int _t46;
                				void* _t47;
                				void* _t48;
                				intOrPtr _t49;
                				intOrPtr* _t82;
                				intOrPtr* _t83;
                				intOrPtr* _t84;
                				intOrPtr _t87;
                				intOrPtr _t98;
                				signed int* _t109;
                				signed char* _t112;
                				signed int* _t131;
                				void* _t136;
                
                				_t86 = __rbx;
                				r8d = 0x40;
                				goto 0x3f05ee0c;
                				asm("int3");
                				_a24 = __rbx;
                				_a32 = __rsi;
                				_a16 = __rdx;
                				_push(_t131);
                				r12d = 0;
                				_t49 = r12d;
                				if (__rcx == 0) goto 0x3f05ef23;
                				if (__r8 != 0) goto 0x3f05ef1f;
                				goto 0x3f05f0cb;
                				 *__rcx = r12w;
                				if (__rdx != 0) goto 0x3f05ef41;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05f0cb;
                				E0000000113F05BE30(__rax | 0xffffffff, __rbx,  &_v72, __r9, __rsi, _t136);
                				_t82 = _v64;
                				if ( *((intOrPtr*)(_t82 + 0xc)) != 0xfde9) goto 0x3f05ef7b;
                				_a8 = _t131;
                				E0000000113F0688A8(_t82, _t86, __rcx,  &_a16, __r8,  &_a8);
                				_t87 = _t82;
                				goto 0x3f05f0b7;
                				if (__rcx == 0) goto 0x3f05f068;
                				if ( *((intOrPtr*)(_t82 + 0x138)) != _t131) goto 0x3f05efbc;
                				if (__r8 == 0) goto 0x3f05f0b7;
                				_t98 = _a16;
                				_t44 =  *(_t87 + _t98) & 0x000000ff;
                				 *__rcx = _t44;
                				if ( *(_t87 + _t98) == r12b) goto 0x3f05f0b7;
                				_t109 =  &(__rcx[0]);
                				if (_t87 + 1 - __r8 < 0) goto 0x3f05ef9a;
                				goto 0x3f05f0b7;
                				_v80 = r14d;
                				r9d = _t49;
                				_v88 = _t109;
                				E0000000113F067C10();
                				if (_t44 != 0) goto 0x3f05f0b3;
                				if (GetLastError() != 0x7a) goto 0x3f05f052;
                				r15d = r14d;
                				_t112 = _a16;
                				if (r14d == 0) goto 0x3f05f02a;
                				r15d = r15d - 1;
                				if ( *_t112 == r12b) goto 0x3f05f026;
                				_t46 = E0000000113F068820( *_t112 & 0x000000ff,  *_t112 - r12b, _t82);
                				if (_t46 == 0) goto 0x3f05f01e;
                				if (_t112[1] == r12b) goto 0x3f05f052;
                				if (r15d != 0) goto 0x3f05effe;
                				_t83 = _v64;
                				_v80 = r14d;
                				r9d = __esi - r8d;
                				_v88 = _t109;
                				E0000000113F067C10();
                				if (_t46 != 0) goto 0x3f05f063;
                				_t47 = E0000000113F05DEB4(_t83);
                				 *_t83 = 0x2a;
                				 *_t109 = r12w;
                				goto 0x3f05f0b7;
                				goto 0x3f05f0b7;
                				if ( *((intOrPtr*)(_t83 + 0x138)) != _t131) goto 0x3f05f084;
                				_t84 = _a16;
                				if ( *((intOrPtr*)(_t84 + (_t46 | 0xffffffff) + 1)) != r12b) goto 0x3f05f079;
                				goto 0x3f05f0b7;
                				r9d = _t49;
                				_v80 = r12d;
                				_v88 = _t131;
                				E0000000113F067C10();
                				if (_t47 != 0) goto 0x3f05f0b3;
                				_t48 = E0000000113F05DEB4(_t84);
                				 *_t84 = 0x2a;
                				goto 0x3f05f0b7;
                				if (_v48 == r12b) goto 0x3f05f0c8;
                				 *(_v72 + 0x3a8) =  *(_v72 + 0x3a8) & 0xfffffffd;
                				return _t48;
                			}
























                0x13f05eed8
                0x13f05eed8
                0x13f05eede
                0x13f05eee3
                0x13f05eee4
                0x13f05eee9
                0x13f05eeee
                0x13f05eef5
                0x13f05ef02
                0x13f05ef0b
                0x13f05ef11
                0x13f05ef16
                0x13f05ef1a
                0x13f05ef1f
                0x13f05ef26
                0x13f05ef28
                0x13f05ef2d
                0x13f05ef33
                0x13f05ef3c
                0x13f05ef48
                0x13f05ef4d
                0x13f05ef5a
                0x13f05ef60
                0x13f05ef6e
                0x13f05ef73
                0x13f05ef76
                0x13f05ef7e
                0x13f05ef8b
                0x13f05ef90
                0x13f05ef96
                0x13f05ef9a
                0x13f05ef9e
                0x13f05efa5
                0x13f05efae
                0x13f05efb5
                0x13f05efb7
                0x13f05efc4
                0x13f05efc9
                0x13f05efcc
                0x13f05efd4
                0x13f05efde
                0x13f05efed
                0x13f05eff3
                0x13f05eff6
                0x13f05effc
                0x13f05effe
                0x13f05f004
                0x13f05f00d
                0x13f05f014
                0x13f05f01c
                0x13f05f024
                0x13f05f02a
                0x13f05f031
                0x13f05f036
                0x13f05f03e
                0x13f05f046
                0x13f05f050
                0x13f05f052
                0x13f05f057
                0x13f05f05d
                0x13f05f061
                0x13f05f066
                0x13f05f073
                0x13f05f075
                0x13f05f080
                0x13f05f082
                0x13f05f088
                0x13f05f08b
                0x13f05f095
                0x13f05f09a
                0x13f05f0a4
                0x13f05f0a6
                0x13f05f0ab
                0x13f05f0b1
                0x13f05f0bb
                0x13f05f0c1
                0x13f05f0e3

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 7df556c0d348d1beda6807f23c8e79ba11cfd1c186763496cc31a09365199704
                • Instruction ID: 3a79b87e4f11b509aa93496ff3748245321c75d8ece1e5f81863d9934e85e413
                • Opcode Fuzzy Hash: 7df556c0d348d1beda6807f23c8e79ba11cfd1c186763496cc31a09365199704
                • Instruction Fuzzy Hash: A0119331A2D690C1FE689F1994043E9A2A3F788B84F184439FACC47787CBFCCA028744
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 54%
                			E0000000113F061F5C(void* __ecx, char __edx, intOrPtr* __rax, long long __rbx, long long _a8, char _a16, char _a24, char _a32) {
                				long long _v24;
                				long long _v32;
                				char _v40;
                				char _v48;
                				char _v52;
                				void* _v56;
                				void* _t27;
                				intOrPtr* _t49;
                
                				_a8 = __rbx;
                				_a24 = r8d;
                				_a16 = __edx;
                				if (r8d != 0) goto 0x3f061fc3;
                				GetModuleHandleW(??);
                				if (__rax == 0) goto 0x3f061fc3;
                				if ( *__rax != 0x5a4d) goto 0x3f061fc3;
                				_t49 =  *((intOrPtr*)(__rax + 0x3c)) + __rax;
                				if ( *_t49 != 0x4550) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0x18)) != 0x20b) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0x84)) - 0xe <= 0) goto 0x3f061fc3;
                				if ( *((intOrPtr*)(_t49 + 0xf8)) == 0) goto 0x3f061fc3;
                				E0000000113F062064(0x20b, __ecx, __rax);
                				_a32 = 0;
                				_v40 =  &_a16;
                				_v32 =  &_a24;
                				_v24 =  &_a32;
                				_v52 = 2;
                				_v48 = 2;
                				_t27 = E0000000113F061E54(__rbx,  &_v48,  &_v40,  &_v52);
                				if (_a24 == 0) goto 0x3f062010;
                				return _t27;
                			}











                0x13f061f5c
                0x13f061f61
                0x13f061f66
                0x13f061f77
                0x13f061f7b
                0x13f061f84
                0x13f061f8e
                0x13f061f94
                0x13f061f9d
                0x13f061fa8
                0x13f061fb1
                0x13f061fba
                0x13f061fbe
                0x13f061fc7
                0x13f061fcb
                0x13f061fd7
                0x13f061fe3
                0x13f061ff4
                0x13f061ff7
                0x13f061ffa
                0x13f062003
                0x13f06200f

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: HandleModule$AddressFreeLibraryProc
                • String ID:
                • API String ID: 3947729631-0
                • Opcode ID: 96c8622230f8d0a29d8ebf61705925c0eebb8d9b7dd56cf7d700869a6918ff5f
                • Instruction ID: eb8d9009ad883ca6edca1a2f2ce1c51f808c5e4a4b38d88717a6cf10558d7d36
                • Opcode Fuzzy Hash: 96c8622230f8d0a29d8ebf61705925c0eebb8d9b7dd56cf7d700869a6918ff5f
                • Instruction Fuzzy Hash: 67215E32F00B048AEB19DF68C4447ED37E1E744B58F64453AF64942A86DB78C696CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A904(long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, void* __r8, void* __r9, long long __r14, void* _a8, void* _a16, void* _a24, void* _a32, intOrPtr _a40) {
                				void* _t10;
                				intOrPtr* _t21;
                				intOrPtr* _t33;
                
                				_t21 = _t33;
                				 *((long long*)(_t21 + 8)) = __rbx;
                				 *((long long*)(_t21 + 0x10)) = __rsi;
                				 *((long long*)(_t21 + 0x18)) = __rdi;
                				 *((long long*)(_t21 + 0x20)) = __r14;
                				if (__r8 == 0) goto 0x3f05a95d;
                				if (__r9 == 0) goto 0x3f05a95d;
                				if (_a40 != 0) goto 0x3f05a97a;
                				if (__rdx == 0xffffffff) goto 0x3f05a94d;
                				E0000000113F0597D0(_t10, 0, __rcx, __rdx, __rdx);
                				E0000000113F05DEB4(_t21);
                				 *_t21 = 0x16;
                				E0000000113F063618();
                				return 0;
                			}






                0x13f05a904
                0x13f05a907
                0x13f05a90b
                0x13f05a90f
                0x13f05a913
                0x13f05a92c
                0x13f05a931
                0x13f05a93b
                0x13f05a941
                0x13f05a948
                0x13f05a94d
                0x13f05a952
                0x13f05a958
                0x13f05a979

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 3b19a35de722f54a59c54440c76d5920a2459c1532597614150d4e04d015219f
                • Instruction ID: 61af9ee3f5630537aff99ef00fe1ce6fc10c63ef9dd9e030eeed152d631052a0
                • Opcode Fuzzy Hash: 3b19a35de722f54a59c54440c76d5920a2459c1532597614150d4e04d015219f
                • Instruction Fuzzy Hash: A401DB71A08750C1E90CDB5A98053D9A792BB99FE0F484639BE6C53BD7DAB8C6038700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E0000000113F05A514(void* __edi, signed int* __rax, long long __rbx, void* __rcx, long long _a8) {
                				signed int _t14;
                				void* _t17;
                				char _t22;
                				void* _t34;
                				void* _t41;
                
                				_t32 = __rax;
                				_a8 = __rbx;
                				_t34 = __rcx;
                				if (__rcx != 0) goto 0x3f05a53b;
                				E0000000113F05DEB4(__rax);
                				 *((intOrPtr*)(__rax)) = 0x16;
                				E0000000113F063618();
                				goto 0x3f05a58c;
                				if (( *(__rcx + 0x14) >> 0x0000000d & 0x00000001) == 0) goto 0x3f05a582;
                				_t14 = E0000000113F05F570(__rcx, __rcx, _t41);
                				E0000000113F063AD0(__rax, _t34);
                				_t17 = E0000000113F06380C(E0000000113F0628A4(__rax, _t34), _t22, _t32, _t34); // executed
                				if (_t17 >= 0) goto 0x3f05a56f;
                				goto 0x3f05a582;
                				if ( *(_t34 + 0x28) == 0) goto 0x3f05a582;
                				E0000000113F0636F8(_t32,  *(_t34 + 0x28));
                				 *(_t34 + 0x28) =  *(_t34 + 0x28) & 0x00000000;
                				E0000000113F0639C8(_t32, _t34);
                				return _t14 | 0xffffffff;
                			}








                0x13f05a514
                0x13f05a514
                0x13f05a51e
                0x13f05a524
                0x13f05a526
                0x13f05a52b
                0x13f05a531
                0x13f05a539
                0x13f05a546
                0x13f05a548
                0x13f05a552
                0x13f05a561
                0x13f05a568
                0x13f05a56d
                0x13f05a576
                0x13f05a578
                0x13f05a57d
                0x13f05a585
                0x13f05a596

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 7ef3ccd1ac1bed16d6370468c32bb1ff6fc61e9fff27b3bad9c6e96d3558709b
                • Instruction ID: dbe684ae9495f9d0183a2047bd902e24c33615fef150e9167047c4f69d523e01
                • Opcode Fuzzy Hash: 7ef3ccd1ac1bed16d6370468c32bb1ff6fc61e9fff27b3bad9c6e96d3558709b
                • Instruction Fuzzy Hash: 45016231E0950181FE1CAA7DA8557ED1652DF867B4F750339B92A973D3DEA8CA038281
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F063680(void* __eax, signed int __rcx, signed int __rdx) {
                				intOrPtr* _t22;
                				signed int _t29;
                
                				_t29 = __rdx;
                				if (__rcx == 0) goto 0x3f06369f;
                				_t1 = _t29 - 0x20; // -32
                				_t22 = _t1;
                				if (_t22 - __rdx < 0) goto 0x3f0636e2;
                				_t25 =  ==  ? _t22 : __rcx * __rdx;
                				goto 0x3f0636c6;
                				if (E0000000113F062254() == 0) goto 0x3f0636e2;
                				if (E0000000113F06B7DC(_t22,  ==  ? _t22 : __rcx * __rdx) == 0) goto 0x3f0636e2;
                				RtlAllocateHeap(??, ??, ??); // executed
                				if (_t22 == 0) goto 0x3f0636b1;
                				goto 0x3f0636ef;
                				E0000000113F05DEB4(_t22);
                				 *_t22 = 0xc;
                				return 0;
                			}





                0x13f063680
                0x13f06368f
                0x13f063693
                0x13f063693
                0x13f06369d
                0x13f0636ab
                0x13f0636af
                0x13f0636b8
                0x13f0636c4
                0x13f0636d5
                0x13f0636de
                0x13f0636e0
                0x13f0636e2
                0x13f0636e7
                0x13f0636f4

                APIs
                • RtlAllocateHeap.NTDLL(?,?,00000000,000000013F066B75,?,?,00000000,000000013F05DEBD,?,?,?,?,000000013F06371D), ref: 000000013F0636D5
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 22fdccc01b6c5cd9d7faacf021f2115726698ea6659f548e9be8320ebb690d82
                • Instruction ID: 23e12640c6b0a0b8af8c2ba6e90397b6eb5a47e99105ebc5487d5962e5aacd6a
                • Opcode Fuzzy Hash: 22fdccc01b6c5cd9d7faacf021f2115726698ea6659f548e9be8320ebb690d82
                • Instruction Fuzzy Hash: 89F09074B0920241FE5C677E98143E54283AB84BA0F2C9039790A863D3DE2CC74B8250
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A9AC(intOrPtr* __rax, long long __rbx, long long __rcx, void* __rdx, long long __rsi, long long _a8, long long _a16, long long _a24) {
                
                				_a16 = __rbx;
                				_a24 = __rsi;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05a9f1;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618() | 0xffffffff;
                			}



                0x13f05a9ac
                0x13f05a9b1
                0x13f05a9b6
                0x13f05a9cc
                0x13f05a9ce
                0x13f05a9d3
                0x13f05a9f0

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 1c4f546164ca18eae1802da82eedabbf0edbc4d1040e53119b7d29f856b21f91
                • Instruction ID: 335f1a3b7bda16d0b987b3be193bce286eaf119711d25d5b598f4b3c66d45b28
                • Opcode Fuzzy Hash: 1c4f546164ca18eae1802da82eedabbf0edbc4d1040e53119b7d29f856b21f91
                • Instruction Fuzzy Hash: 29F05031B0C690C0FA0CFB6DA4053DD62539B84BE0F284538B919477C7DAB4C9438740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05A598(intOrPtr* __rax, long long __rbx, long long __rcx, long long _a8, long long _a16) {
                
                				_a16 = __rbx;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05a5cd;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618() | 0xffffffff;
                			}



                0x13f05a598
                0x13f05a59d
                0x13f05a5ad
                0x13f05a5af
                0x13f05a5b4
                0x13f05a5cc

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: fc7da8ec63c9c5b682ca52e1ccd79e569d800c3ce5658d96a493e4382fd44d1d
                • Instruction ID: b45f07b30eee2dc7e326084c365ca0b807199ef5370f6a072a01b30f2155f44f
                • Opcode Fuzzy Hash: fc7da8ec63c9c5b682ca52e1ccd79e569d800c3ce5658d96a493e4382fd44d1d
                • Instruction Fuzzy Hash: E9F0A771A0C640C1FD1CFB7DA4197ED22929B467A0F281538BA5A573C7DAB4CA43C760
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F063738(intOrPtr* __rax, void* __rcx) {
                
                				if (__rcx - 0xffffffe0 > 0) goto 0x3f063783;
                				_t16 =  ==  ? __rax : __rcx;
                				goto 0x3f06376a;
                				if (E0000000113F062254() == 0) goto 0x3f063783;
                				if (E0000000113F06B7DC(__rax,  ==  ? __rax : __rcx) == 0) goto 0x3f063783;
                				RtlAllocateHeap(??, ??, ??); // executed
                				if (__rax == 0) goto 0x3f063755;
                				goto 0x3f063790;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0xc;
                				return 0;
                			}



                0x13f063745
                0x13f06374f
                0x13f063753
                0x13f06375c
                0x13f063768
                0x13f063776
                0x13f06377f
                0x13f063781
                0x13f063783
                0x13f063788
                0x13f063795

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 855555bc9c6b2c79e1fca54c008a68dcd0ef600c7b511f7160d1a3476ce6a968
                • Instruction ID: 658f22cbc25a16959517ba0c56c77799befbc1bc2f4a365129d84b1ef1137fb6
                • Opcode Fuzzy Hash: 855555bc9c6b2c79e1fca54c008a68dcd0ef600c7b511f7160d1a3476ce6a968
                • Instruction Fuzzy Hash: 7CF01CB5F0520545FE7C6B7D9D153E91293DB847B0F28463C7D26863C3DA6CC6478190
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F05ABBC(intOrPtr* __rax, long long __rbx, long long __rcx, long long _a8, long long _a16) {
                
                				_a16 = __rbx;
                				_a8 = __rcx;
                				if (__rcx != 0) goto 0x3f05abf2;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				return E0000000113F063618();
                			}



                0x13f05abbc
                0x13f05abc1
                0x13f05abd1
                0x13f05abd3
                0x13f05abd8
                0x13f05abf1

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 8ca066f28509e4cbb3c6e40597d390f45de9b8431ff5c17b9964ba57cc5e951d
                • Instruction ID: 8399b5e7182da84bfa16a431f19c29abb7f90593a9b19cc23e17efec41f59ca4
                • Opcode Fuzzy Hash: 8ca066f28509e4cbb3c6e40597d390f45de9b8431ff5c17b9964ba57cc5e951d
                • Instruction Fuzzy Hash: EFE09230A0D640C4FD0CBB6DA8093EA22139B447F0F185B38BA3D077C3DAB8C6928740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 48%
                			E0000000113F054CF0(long long __rax, long long __rbx, void* __rcx, long long _a8) {
                				void* _t9;
                				void* _t19;
                				void* _t21;
                				void* _t25;
                
                				_a8 = __rbx;
                				_t19 = __rcx;
                				r8d = 0;
                				E0000000113F0554B0(__rax, __rbx, __rcx, __rcx, _t21, _t25);
                				_t2 = _t19 + 8; // 0x8, executed
                				r8d = _t2;
                				LoadLibraryExW(??, ??, ??); // executed
                				return E0000000113F05A4F8(_t9, __rax, __rax, __rax);
                			}







                0x13f054cf0
                0x13f054cfa
                0x13f054cfd
                0x13f054d02
                0x13f054d0f
                0x13f054d0f
                0x13f054d13
                0x13f054d31

                APIs
                  • Part of subcall function 000000013F0554B0: MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                • LoadLibraryExW.KERNELBASE(?,000000013F052BB1), ref: 000000013F054D13
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharLibraryLoadMultiWide
                • String ID:
                • API String ID: 2592636585-0
                • Opcode ID: 100c3e64c55b8023b4ef579388f276ba6cf4db76cd4a6628be3bfe4ba5d7c970
                • Instruction ID: bb8a1c53d3a6a24291e60e5749f27a909b2c55fa8d925ebb312d42bed3c43824
                • Opcode Fuzzy Hash: 100c3e64c55b8023b4ef579388f276ba6cf4db76cd4a6628be3bfe4ba5d7c970
                • Instruction Fuzzy Hash: EFE08631B1418082DE1C97ABA9097AAA252AB88BC4F489039AE5D07757DD28D5D18E00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F066BE4(intOrPtr __eax, void* __ecx, void* __rax) {
                				void* _t13;
                				void* _t15;
                				void* _t16;
                				void* _t17;
                
                				E0000000113F065E9C(); // executed
                				 *0x3f0822b8 = __eax;
                				if (__eax != 0xffffffff) goto 0x3f066c03;
                				goto 0x3f066c18;
                				E0000000113F066B18(__rax, _t13, 0x13f06681c, _t15, _t16, _t17);
                				if (__rax != 0) goto 0x3f066c16;
                				E0000000113F066C20();
                				goto 0x3f066bff;
                				return 1;
                			}







                0x13f066bef
                0x13f066bf4
                0x13f066bfd
                0x13f066c01
                0x13f066c03
                0x13f066c0b
                0x13f066c0f
                0x13f066c14
                0x13f066c1c

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: __vcrt_uninitialize_ptdtry_get_function
                • String ID:
                • API String ID: 4056716597-0
                • Opcode ID: beb66c14742b2adbb37354a522f89f272634b3a2c3c382bf3c8d097eeb669d58
                • Instruction ID: e7b8ebdab3663dff1b00968086fa9662a2367be2786f05108035b010da65cc6f
                • Opcode Fuzzy Hash: beb66c14742b2adbb37354a522f89f272634b3a2c3c382bf3c8d097eeb669d58
                • Instruction Fuzzy Hash: BCE0E270E05A00E0FE5C7B3D59623FC5283EB6A330FB01A3DF01A4A2E3E52947835640
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 92%
                			E0000000113F06DA94(void* __ecx, void* __eflags, intOrPtr* __rax, signed int __rbx, signed char* __rcx, void* __r9, long long _a8, signed int _a16, signed int _a24) {
                				void* _t28;
                				signed int _t37;
                				signed int _t40;
                				intOrPtr _t41;
                				intOrPtr _t43;
                				void* _t44;
                				void* _t49;
                				void* _t50;
                				signed int _t66;
                				signed char* _t72;
                				signed char _t80;
                				intOrPtr _t92;
                				intOrPtr* _t94;
                				signed char* _t96;
                				signed int* _t97;
                				signed long long _t99;
                				intOrPtr* _t103;
                				char* _t104;
                				intOrPtr* _t105;
                				intOrPtr* _t106;
                				void* _t107;
                				intOrPtr* _t108;
                				signed char* _t113;
                				signed char* _t125;
                				void* _t137;
                				intOrPtr* _t138;
                
                				_t94 = __rax;
                				_a8 = __rbx;
                				E0000000113F06D510(_t28);
                				_a16 = _a16 & 0x00000000;
                				_a24 = _a24 & 0x00000000;
                				_t138 = _t94;
                				if (E0000000113F06D578(_t94,  &_a16) != 0) goto 0x3f06dc84;
                				if (E0000000113F06D518(_t94,  &_a24) != 0) goto 0x3f06dc84;
                				_t113 =  *0x3f092018;
                				_t72 = _t113;
                				if (_t72 == 0) goto 0x3f06db0e;
                				r9d = __rcx[_t113 - __rcx] & 0x000000ff;
                				if (_t72 != 0) goto 0x3f06db06;
                				_t96 =  &(__rcx[1]);
                				if (r9d != 0) goto 0x3f06daf1;
                				if (( *__rcx & 0x000000ff) - r9d == 0) goto 0x3f06dc73;
                				E0000000113F0636F8(_t96, _t113);
                				_t99 = __rbx | 0xffffffff;
                				if (__rcx[_t99 + 1] != 0) goto 0x3f06db1a;
                				E0000000113F063738(_t96, _t99 + 2);
                				 *0x3f092018 = _t96;
                				E0000000113F0636F8(_t96, _t99 + 2);
                				if ( *0x3f092018 == 0) goto 0x3f06dc73;
                				_t100 = _t99 + 1;
                				if (__rcx[_t99 + 1] != 0) goto 0x3f06db49;
                				if (E0000000113F0628CC(_t96,  *0x3f092018, _t99 + 2, __rcx) != 0) goto 0x3f06dc84;
                				_t12 =  &(_t96[3]); // 0x3
                				r13d = _t12;
                				r9d = r13d;
                				if (E0000000113F067860(_t96, _t100,  *_t138, _t99 + 2, __rcx, __r9) != 0) goto 0x3f06dc84;
                				_t80 =  *__rcx;
                				if (_t80 == 0) goto 0x3f06db94;
                				_t125 =  &(__rcx[1]);
                				if (_t80 != 0) goto 0x3f06db86;
                				sil =  *_t125;
                				_t103 =  !=  ? _t125 :  &(_t125[1]);
                				_t37 = E0000000113F0633AC(_t103);
                				dil = 0x30;
                				_a16 = _t37 * 0xe10;
                				if ( *_t103 == 0x2b) goto 0x3f06dbc5;
                				if ( *_t103 - dil - 9 > 0) goto 0x3f06dbca;
                				_t104 = _t103 + 1;
                				goto 0x3f06dbb7;
                				if ( *_t104 != 0x3a) goto 0x3f06dc28;
                				_t105 = _t104 + 1;
                				_t40 = E0000000113F0633AC(_t105);
                				_t41 =  *_t105;
                				_a16 = _a16 + _t40 * 0x3c;
                				if (_t41 - dil < 0) goto 0x3f06dc01;
                				if (_t41 - 0x39 > 0) goto 0x3f06dc01;
                				_t106 = _t105 + 1;
                				_t43 =  *_t106;
                				if (_t43 - dil >= 0) goto 0x3f06dbee;
                				if (_t43 != 0x3a) goto 0x3f06dc28;
                				_t107 = _t106 + 1;
                				_t44 = E0000000113F0633AC(_t107);
                				_t66 = _a16 + _t44;
                				_a16 = _t66;
                				goto 0x3f06dc21;
                				if (_t44 - 0x39 > 0) goto 0x3f06dc28;
                				_t108 = _t107 + 1;
                				if ( *_t108 - dil >= 0) goto 0x3f06dc1a;
                				if (sil != 0x2d) goto 0x3f06dc33;
                				_a16 =  ~_t66;
                				_t92 =  *_t108;
                				_a24 = 0 | _t92 != 0x00000000;
                				_t97 =  *((intOrPtr*)(_t138 + 8));
                				if (_t92 == 0) goto 0x3f06dc5c;
                				if (E0000000113F067860(_t97, _t108, _t97, _t99 + 2, _t108, _t137) != 0) goto 0x3f06dc84;
                				goto 0x3f06dc5f;
                				 *_t97 = 0;
                				_t49 = E0000000113F06D508(_t48);
                				 *_t97 = _a16;
                				_t50 = E0000000113F06D4F8(_t49);
                				 *_t97 = _a24;
                				return _t50;
                			}





























                0x13f06da94
                0x13f06da94
                0x13f06daaa
                0x13f06daaf
                0x13f06dab7
                0x13f06dabb
                0x13f06dac5
                0x13f06dad6
                0x13f06dadc
                0x13f06dae3
                0x13f06dae6
                0x13f06daf4
                0x13f06dafc
                0x13f06dafe
                0x13f06db04
                0x13f06db08
                0x13f06db0e
                0x13f06db13
                0x13f06db21
                0x13f06db26
                0x13f06db2d
                0x13f06db34
                0x13f06db43
                0x13f06db49
                0x13f06db50
                0x13f06db60
                0x13f06db69
                0x13f06db69
                0x13f06db6d
                0x13f06db80
                0x13f06db86
                0x13f06db89
                0x13f06db8b
                0x13f06db92
                0x13f06db94
                0x13f06db9f
                0x13f06dba6
                0x13f06dbb1
                0x13f06dbb4
                0x13f06dbba
                0x13f06dbc3
                0x13f06dbc5
                0x13f06dbc8
                0x13f06dbcd
                0x13f06dbcf
                0x13f06dbd5
                0x13f06dbe0
                0x13f06dbe4
                0x13f06dbea
                0x13f06dbf3
                0x13f06dbf5
                0x13f06dbf8
                0x13f06dbff
                0x13f06dc03
                0x13f06dc05
                0x13f06dc0b
                0x13f06dc13
                0x13f06dc15
                0x13f06dc18
                0x13f06dc1c
                0x13f06dc1e
                0x13f06dc26
                0x13f06dc2c
                0x13f06dc30
                0x13f06dc35
                0x13f06dc3a
                0x13f06dc3d
                0x13f06dc41
                0x13f06dc58
                0x13f06dc5a
                0x13f06dc5c
                0x13f06dc62
                0x13f06dc67
                0x13f06dc6c
                0x13f06dc71
                0x13f06dc83

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
                • String ID: ?
                • API String ID: 435049134-1684325040
                • Opcode ID: 38e2042b0ff6ae9a5f4cb751f21e0ba64c972248f475a824aa9eaa995cf69163
                • Instruction ID: a9fb58ace4dfcad9577d1f6ff923818e482cd9d6fa4adebd5a21734e7789f11d
                • Opcode Fuzzy Hash: 38e2042b0ff6ae9a5f4cb751f21e0ba64c972248f475a824aa9eaa995cf69163
                • Instruction Fuzzy Hash: 4DD1D132A016808AFB689F2DD8403D93B93E7847A8FA4513DFA6957797DB38C643C740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 49%
                			E0000000113F054280(void* __ecx, void* __edx, void* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, void* __r8, void* __r9, intOrPtr _a8, char _a16, long long _a24, long long _a32, char _a56, signed int _a8248, void* _a8264) {
                				void* __rsi;
                				void* _t17;
                				long _t21;
                				void* _t60;
                				signed long long _t72;
                				signed long long _t73;
                				intOrPtr _t122;
                				void* _t124;
                				void* _t126;
                				void* _t132;
                				void* _t133;
                				void* _t135;
                
                				_t131 = __r9;
                				_t74 = __rbx;
                				_t50 = __ecx;
                				_a24 = __rbx;
                				_a32 = __rbp;
                				E0000000113F058610(__ecx, __rax, __rcx, _t132, _t133);
                				_t127 = _t126 - __rax;
                				_t72 =  *0x3f082018; // 0xe88b9cb90319
                				_t73 = _t72 ^ _t126 - __rax;
                				_a8248 = _t73;
                				_t124 = __rdx;
                				_t135 = __rcx;
                				if (__rdx == 0) goto 0x3f05430b;
                				E0000000113F054490(_t73, "TMP");
                				E0000000113F053FB0(__edx, _t73, __rbx, _t124, __r8);
                				if (_t73 == 0) goto 0x3f0543df;
                				_t17 = E0000000113F05FD9C(_t50, _t73, L"TMP", _t73);
                				E0000000113F05A4F8(_t60, _t73, _t74, _t73);
                				if (_t17 == 0) goto 0x3f054310;
                				E0000000113F051DD0(_t73, "LOADER: Failed to set the TMP environment variable.\n", _t73, __r8, __r9);
                				goto 0x3f054468;
                				_t122 = _a8;
                				_t21 = GetTempPathW(??, ??);
                				0x3f062824();
                				r9d = _t21;
                				E0000000113F054E40(_t73,  &_a16,  &_a56, L"_MEI%d", _t131);
                				E0000000113F060FCC(_t131);
                				if (E0000000113F055320(_t73, _t74, _t73) == 0) goto 0x3f0543e6;
                				E0000000113F05A4F8(_t60, _t73, _t74, _t73);
                				if (1 - 5 < 0) goto 0x3f054340;
                				if (_t124 == 0) goto 0x3f0543df;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t74, _t73, "TMP", _t122, L"_MEI%d");
                				if (_t122 == 0) goto 0x3f0543c9;
                				r8d = 0;
                				_t119 = _t73;
                				E0000000113F0554B0(_t73, _t74, _t73, _t122, _t122, L"_MEI%d");
                				E0000000113F05FD9C(0, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t122);
                				goto 0x3f054468;
                				SetEnvironmentVariableW(??, ??);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				goto 0x3f054468;
                				r8d = 0x1000;
                				E0000000113F0555C0(_t60, _t73, _t135, _t73, _t122, _t124, L"_MEI%d");
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				if (_t124 == 0) goto 0x3f054463;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t73, _t73, "TMP", _t122, L"_MEI%d");
                				if (_t122 == 0) goto 0x3f05444d;
                				r8d = 0;
                				E0000000113F0554B0(_t73, _t73, _t119, _t122, _t122, L"_MEI%d");
                				E0000000113F05FD9C(0, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				goto 0x3f05445e;
                				SetEnvironmentVariableW(??, ??);
                				E0000000113F05A4F8(_t60, _t73, _t73, _t73);
                				return E0000000113F058680(0, _t73, _a8248 ^ _t127);
                			}















                0x13f054280
                0x13f054280
                0x13f054280
                0x13f054280
                0x13f054285
                0x13f054293
                0x13f054298
                0x13f05429b
                0x13f0542a2
                0x13f0542a5
                0x13f0542ad
                0x13f0542b0
                0x13f0542b6
                0x13f0542bf
                0x13f0542ca
                0x13f0542d5
                0x13f0542e5
                0x13f0542ef
                0x13f0542f6
                0x13f0542ff
                0x13f054306
                0x13f05430b
                0x13f05431a
                0x13f054320
                0x13f054325
                0x13f054339
                0x13f05434a
                0x13f05435c
                0x13f054365
                0x13f05436f
                0x13f054374
                0x13f054376
                0x13f054382
                0x13f05438a
                0x13f05438c
                0x13f054394
                0x13f054397
                0x13f0543a5
                0x13f0543ad
                0x13f0543b5
                0x13f0543bd
                0x13f0543c4
                0x13f0543d1
                0x13f0543da
                0x13f0543e1
                0x13f0543e6
                0x13f0543f2
                0x13f0543fa
                0x13f054402
                0x13f054404
                0x13f054410
                0x13f054418
                0x13f05441a
                0x13f054425
                0x13f054433
                0x13f05443b
                0x13f054443
                0x13f05444b
                0x13f054455
                0x13f05445e
                0x13f05448f

                APIs
                • GetTempPathW.KERNEL32 ref: 000000013F05431A
                  • Part of subcall function 000000013F054490: GetEnvironmentVariableW.KERNEL32(000000013F052A70), ref: 000000013F0544CA
                  • Part of subcall function 000000013F054490: ExpandEnvironmentStringsW.KERNEL32 ref: 000000013F0544E7
                  • Part of subcall function 000000013F05FD9C: _invalid_parameter_noinfo.LIBCMT ref: 000000013F05FDB5
                • SetEnvironmentVariableW.KERNEL32(?,00000000,?,000000013F05424D), ref: 000000013F0543D1
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                • API String ID: 3752271684-1116378104
                • Opcode ID: d3a823962dac19f049f5fee197ce45340bd72d4b5843dc3096ad67d0e1713d60
                • Instruction ID: 081fc1d446df283455334073b4abffd1fb9b0f31d0962c9c6831c79985b2ef89
                • Opcode Fuzzy Hash: d3a823962dac19f049f5fee197ce45340bd72d4b5843dc3096ad67d0e1713d60
                • Instruction Fuzzy Hash: 5D51C234B09650C4FE1CA76EA96D7E952535B85BC0F84143C7C0E4BB97DEA8C6478B10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 84%
                			E0000000113F069BE4(void* __ecx, long long __rbx, intOrPtr* __rcx, void** __rdx) {
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				void* __r15;
                				signed int _t63;
                				signed int _t73;
                				int _t78;
                				void* _t100;
                				signed long long _t127;
                				signed long long _t128;
                				intOrPtr _t129;
                				signed short* _t130;
                				signed long long _t134;
                				signed long long _t136;
                				signed long long _t146;
                				void* _t151;
                				signed short* _t156;
                				signed short* _t157;
                				signed short* _t158;
                				void* _t171;
                				signed long long _t173;
                				void* _t193;
                				void* _t196;
                				intOrPtr _t198;
                				intOrPtr _t202;
                				void* _t204;
                				void* _t205;
                				void* _t207;
                				signed long long _t208;
                				void* _t210;
                				void* _t225;
                				void* _t234;
                				signed short* _t235;
                				signed long long _t236;
                				union _FINDEX_INFO_LEVELS _t239;
                				intOrPtr* _t243;
                				WCHAR* _t245;
                				signed long long _t250;
                				intOrPtr* _t251;
                
                				 *((long long*)(_t207 + 0x18)) = __rbx;
                				_t205 = _t207 - 0x1c0;
                				_t208 = _t207 - 0x2c0;
                				_t127 =  *0x3f082018; // 0xe88b9cb90319
                				_t128 = _t127 ^ _t208;
                				 *(_t205 + 0x1b8) = _t128;
                				 *(_t208 + 0x58) = __rdx;
                				if (__rdx != 0) goto 0x3f069c39;
                				E0000000113F05DEB4(_t128);
                				_t5 = _t193 + 0x16; // 0x16
                				 *_t128 = _t5;
                				E0000000113F063618();
                				goto 0x3f069f6f;
                				asm("xorps xmm0, xmm0");
                				 *__rdx = _t193;
                				_t129 =  *((intOrPtr*)(__rcx));
                				asm("movdqu [esp+0x30], xmm0");
                				 *(_t208 + 0x40) = _t193;
                				if (_t129 == 0) goto 0x3f069e30;
                				 *(_t205 + 0x1b0) = 0x3f002a;
                				 *((short*)(_t205 + 0x1b4)) = 0;
                				E0000000113F067A2C(_t129, _t205 + 0x1b0);
                				_t235 =  *((intOrPtr*)(__rcx));
                				if (_t129 != 0) goto 0x3f069cbc;
                				r8d = 0;
                				_t156 = _t235;
                				_t63 = E0000000113F069FB0(0x801, _t156, _t205 + 0x1b0,  *((intOrPtr*)(_t208 + 0x38)), _t210, _t208 + 0x30);
                				_t198 =  *((intOrPtr*)(_t208 + 0x38));
                				r15d = _t63;
                				goto 0x3f069e1d;
                				if (_t129 == _t235) goto 0x3f069ce0;
                				_t100 = ( *_t156 & 0x0000ffff) - 0x2f - 0x2d;
                				if (_t100 > 0) goto 0x3f069cd7;
                				asm("dec eax");
                				if (_t100 < 0) goto 0x3f069ce0;
                				_t157 = _t156 - 2;
                				if (_t157 != _t235) goto 0x3f069cc1;
                				if (( *_t157 & 0x0000ffff) != 0x3a) goto 0x3f069d0c;
                				_t130 =  &(_t235[1]);
                				if (_t157 == _t130) goto 0x3f069d0c;
                				r8d = 0;
                				_t158 = _t235;
                				r15d = E0000000113F069FB0(0x801, _t158, _t205 + 0x1b0, _t198, _t210, _t208 + 0x30);
                				goto 0x3f069e10;
                				if (0xffffffffffffffd1 - 0x2d > 0) goto 0x3f069d21;
                				asm("dec eax");
                				if (0xffffffffffffffd1 - 0x2d < 0) goto 0x3f069d24;
                				 *((intOrPtr*)(_t208 + 0x28)) = 0;
                				 *(_t208 + 0x20) = _t193;
                				asm("dec ebp");
                				r9d = 0;
                				_t246 = _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001;
                				 *(_t208 + 0x48) = _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001;
                				FindFirstFileExW(_t245, _t239, _t234);
                				if (_t130 == 0xffffffff) goto 0x3f069cf2;
                				 *(_t208 + 0x50) = _t198 -  *((intOrPtr*)(_t208 + 0x30)) >> 3;
                				if ( *((short*)(_t205 - 0x74)) != 0x2e) goto 0x3f069d85;
                				if ( *((intOrPtr*)(_t205 - 0x72)) == 0) goto 0x3f069da5;
                				if ( *((short*)(_t205 - 0x72)) != 0x2e) goto 0x3f069d85;
                				if ( *((intOrPtr*)(_t205 - 0x70)) == 0) goto 0x3f069da5;
                				_t73 = E0000000113F069FB0(_t130, _t205 - 0x74, _t235, _t198 -  *((intOrPtr*)(_t208 + 0x30)) >> 3, _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001, _t208 + 0x30);
                				r15d = _t73;
                				if (_t73 != 0) goto 0x3f069e07;
                				if (FindNextFileW(_t225) != 0) goto 0x3f069d6b;
                				if ( *(_t208 + 0x50) !=  *((intOrPtr*)(_t208 + 0x38)) -  *((intOrPtr*)(_t208 + 0x30)) >> 3) goto 0x3f069de0;
                				FindClose(_t193);
                				goto 0x3f069e23;
                				r8d = 8;
                				E0000000113F06F390(_t130,  *((intOrPtr*)(_t208 + 0x30)) +  *(_t208 + 0x50) * 8, ( *((intOrPtr*)(_t208 + 0x38)) -  *((intOrPtr*)(_t208 + 0x30)) >> 3) -  *(_t208 + 0x50), _t193,  *((intOrPtr*)(_t208 + 0x38)), _t205, _t245 & (_t158 - _t235 >> 0x00000001) + 0x00000001, 0x13f069bd0,  *(_t208 + 0x48));
                				FindClose(_t196);
                				r15d = 0;
                				goto 0x3f069e1a;
                				_t78 = FindClose(_t204);
                				_t202 =  *((intOrPtr*)(_t208 + 0x38));
                				_t243 =  *((intOrPtr*)(_t208 + 0x30));
                				if (r15d != 0) goto 0x3f069f31;
                				goto 0x3f069c57;
                				 *(_t205 + 0x1b0) = _t193;
                				_t134 = _t202 - _t243;
                				_t250 = (_t134 >> 3) + 1;
                				_t171 =  >  ? _t193 : _t134 + 7 >> 3;
                				if (_t171 == 0) goto 0x3f069e8e;
                				_t136 = (_t134 | 0xffffffff) + 1;
                				if ( *((intOrPtr*)( *_t243 + _t136 * 2)) != 0) goto 0x3f069e6b;
                				if (_t193 + 1 != _t171) goto 0x3f069e64;
                				 *(_t205 + 0x1b0) = _t193 + 1 + _t136;
                				r8d = 2;
                				E0000000113F0615CC(_t78, _t250, _t193 + 1 + _t136, _t246);
                				_t146 = _t136;
                				if (_t136 != 0) goto 0x3f069ead;
                				r15d = r15d | 0xffffffff;
                				goto 0x3f069f2a;
                				_t173 = _t136 + _t250 * 8;
                				_t251 = _t243;
                				 *(_t208 + 0x48) = _t173;
                				_t236 = _t173;
                				if (_t243 == _t202) goto 0x3f069f1f;
                				 *(_t208 + 0x50) = _t136 - _t243;
                				if ( *((intOrPtr*)( *_t251 + ((__rcx + 0x00000008 | 0xffffffff) + 1) * 2)) != 0) goto 0x3f069ed0;
                				if (E0000000113F069AEC(_t236 - _t173 >> 1, _t146, _t236,  *(_t205 + 0x1b0) - (_t236 - _t173 >> 1),  *_t251, (__rcx + 0x00000008 | 0xffffffff) + 2) != 0) goto 0x3f069f99;
                				 *( *(_t208 + 0x50) + _t251) = _t236;
                				if (_t251 + 8 != _t202) goto 0x3f069ec9;
                				r15d = 0;
                				 *( *(_t208 + 0x58)) = _t146;
                				E0000000113F0636F8( *(_t208 + 0x58),  *(_t208 + 0x48));
                				_t151 =  >  ? _t193 : _t202 - _t243 + 7 >> 3;
                				if (_t151 == 0) goto 0x3f069f64;
                				E0000000113F0636F8( *(_t208 + 0x58),  *_t243);
                				if (_t193 + 1 != _t151) goto 0x3f069f4e;
                				E0000000113F0636F8( *(_t208 + 0x58), _t243);
                				return E0000000113F058680(0,  *(_t208 + 0x58),  *(_t205 + 0x1b8) ^ _t208);
                			}










































                0x13f069be4
                0x13f069bf4
                0x13f069bfc
                0x13f069c03
                0x13f069c0a
                0x13f069c0d
                0x13f069c16
                0x13f069c21
                0x13f069c23
                0x13f069c28
                0x13f069c2b
                0x13f069c2d
                0x13f069c34
                0x13f069c39
                0x13f069c3c
                0x13f069c3f
                0x13f069c42
                0x13f069c52
                0x13f069c5a
                0x13f069c67
                0x13f069c74
                0x13f069c85
                0x13f069c8a
                0x13f069c94
                0x13f069c9b
                0x13f069ca0
                0x13f069ca3
                0x13f069ca8
                0x13f069cad
                0x13f069cb7
                0x13f069cbf
                0x13f069cc8
                0x13f069ccc
                0x13f069cd1
                0x13f069cd5
                0x13f069cd7
                0x13f069cde
                0x13f069ce7
                0x13f069ce9
                0x13f069cf0
                0x13f069cf7
                0x13f069cfc
                0x13f069d04
                0x13f069d07
                0x13f069d14
                0x13f069d19
                0x13f069d1f
                0x13f069d27
                0x13f069d36
                0x13f069d3d
                0x13f069d40
                0x13f069d43
                0x13f069d4b
                0x13f069d50
                0x13f069d5d
                0x13f069d66
                0x13f069d70
                0x13f069d76
                0x13f069d7d
                0x13f069d83
                0x13f069d94
                0x13f069d99
                0x13f069d9e
                0x13f069db5
                0x13f069dd3
                0x13f069dd8
                0x13f069dde
                0x13f069dee
                0x13f069df4
                0x13f069dfc
                0x13f069e02
                0x13f069e05
                0x13f069e0a
                0x13f069e10
                0x13f069e15
                0x13f069e1d
                0x13f069e2b
                0x13f069e33
                0x13f069e3a
                0x13f069e4d
                0x13f069e5b
                0x13f069e62
                0x13f069e6b
                0x13f069e73
                0x13f069e85
                0x13f069e87
                0x13f069e8e
                0x13f069e9a
                0x13f069e9f
                0x13f069ea5
                0x13f069ea7
                0x13f069eab
                0x13f069ead
                0x13f069eb1
                0x13f069eb4
                0x13f069eb9
                0x13f069ebf
                0x13f069ec4
                0x13f069ed8
                0x13f069efd
                0x13f069f0d
                0x13f069f1d
                0x13f069f24
                0x13f069f27
                0x13f069f2c
                0x13f069f45
                0x13f069f4c
                0x13f069f52
                0x13f069f62
                0x13f069f67
                0x13f069f98

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID:
                • API String ID: 3215553584-0
                • Opcode ID: 9526af689086623cab50b0e7262e9f8bcce43e23622d80ef4c365d3bf23931be
                • Instruction ID: 84f4bf70fe616a4129f29427b833d3432ad60b741ba032a1582bf884cd596542
                • Opcode Fuzzy Hash: 9526af689086623cab50b0e7262e9f8bcce43e23622d80ef4c365d3bf23931be
                • Instruction Fuzzy Hash: F8A1D872B1469481EE68CF2AA4003DAA3A2F744BF4F654539FE9947FC6DB78C646C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 65%
                			E0000000113F063404(void* __ecx, intOrPtr __edx, long long __rbx, void* __rdx, long long __rsi, void* __r8) {
                				void* _t36;
                				void* _t37;
                				void* _t38;
                				int _t40;
                				signed long long _t62;
                				long long _t65;
                				_Unknown_base(*)()* _t85;
                				void* _t89;
                				void* _t90;
                				void* _t92;
                				signed long long _t93;
                				struct _EXCEPTION_POINTERS* _t99;
                
                				 *((long long*)(_t92 + 0x10)) = __rbx;
                				 *((long long*)(_t92 + 0x18)) = __rsi;
                				_t90 = _t92 - 0x4f0;
                				_t93 = _t92 - 0x5f0;
                				_t62 =  *0x3f082018; // 0xe88b9cb90319
                				 *(_t90 + 0x4e0) = _t62 ^ _t93;
                				if (__ecx == 0xffffffff) goto 0x3f063443;
                				_t37 = E0000000113F058F0C(_t36);
                				r8d = 0x98;
                				_t38 = E0000000113F0597D0(_t37, 0, _t93 + 0x70, __rdx, __r8);
                				r8d = 0x4d0;
                				E0000000113F0597D0(_t38, 0, _t90 + 0x10, __rdx, __r8);
                				 *((long long*)(_t93 + 0x48)) = _t93 + 0x70;
                				_t65 = _t90 + 0x10;
                				 *((long long*)(_t93 + 0x50)) = _t65;
                				__imp__RtlCaptureContext();
                				r8d = 0;
                				__imp__RtlLookupFunctionEntry();
                				if (_t65 == 0) goto 0x3f0634d6;
                				 *(_t93 + 0x38) =  *(_t93 + 0x38) & 0x00000000;
                				 *((long long*)(_t93 + 0x30)) = _t93 + 0x58;
                				 *((long long*)(_t93 + 0x28)) = _t93 + 0x60;
                				 *((long long*)(_t93 + 0x20)) = _t90 + 0x10;
                				__imp__RtlVirtualUnwind();
                				 *((long long*)(_t90 + 0x108)) =  *((intOrPtr*)(_t90 + 0x508));
                				 *((intOrPtr*)(_t93 + 0x70)) = __edx;
                				 *((long long*)(_t90 + 0xa8)) = _t90 + 0x510;
                				 *((long long*)(_t90 - 0x80)) =  *((intOrPtr*)(_t90 + 0x508));
                				 *((intOrPtr*)(_t93 + 0x74)) = r8d;
                				_t40 = IsDebuggerPresent();
                				SetUnhandledExceptionFilter(_t85, _t89);
                				if (UnhandledExceptionFilter(_t99) != 0) goto 0x3f063538;
                				if (_t40 != 0) goto 0x3f063538;
                				if (__ecx == 0xffffffff) goto 0x3f063538;
                				E0000000113F058F0C(_t42);
                				return E0000000113F058680(__ecx,  *((intOrPtr*)(_t90 + 0x508)),  *(_t90 + 0x4e0) ^ _t93);
                			}















                0x13f063404
                0x13f063409
                0x13f063412
                0x13f06341a
                0x13f063421
                0x13f06342b
                0x13f06343c
                0x13f06343e
                0x13f06344a
                0x13f063450
                0x13f06345b
                0x13f063461
                0x13f06346b
                0x13f063474
                0x13f063478
                0x13f06347d
                0x13f063492
                0x13f063495
                0x13f06349e
                0x13f0634a0
                0x13f0634b3
                0x13f0634c0
                0x13f0634c9
                0x13f0634d0
                0x13f0634dd
                0x13f0634ef
                0x13f0634f3
                0x13f063501
                0x13f063505
                0x13f063509
                0x13f063513
                0x13f063526
                0x13f06352a
                0x13f06352f
                0x13f063533
                0x13f06355e

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                • String ID:
                • API String ID: 1239891234-0
                • Opcode ID: 7ef58020e378e2f6d85fc3d7abf6102e8b1291f707a80e84eda760416955bece
                • Instruction ID: d1c65eaf22aa48e10cf5b323abde0b583b12e2e42484b76550988bd18951d1f8
                • Opcode Fuzzy Hash: 7ef58020e378e2f6d85fc3d7abf6102e8b1291f707a80e84eda760416955bece
                • Instruction Fuzzy Hash: 8A314F36614B8086EB64CF29E8443DE73A5F798794F54012AFA9D43B56DF38C25ACB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 71%
                			E0000000113F064BDC(void* __eax, signed int __edx, void* __esi, void* __eflags, long long __rbx, long long __rcx, void* __rdx, long long __r8, void* __r10) {
                				void* __rsi;
                				void* __rbp;
                				char _t159;
                				char _t165;
                				char _t170;
                				int _t171;
                				int _t173;
                				intOrPtr _t179;
                				void* _t185;
                				signed char _t186;
                				intOrPtr _t194;
                				signed long long _t236;
                				signed long long _t242;
                				long long _t246;
                				void* _t247;
                				intOrPtr _t261;
                				signed long long _t269;
                				long long _t282;
                				intOrPtr _t288;
                				void* _t289;
                				void* _t293;
                				void* _t296;
                				char _t299;
                				void* _t301;
                				void* _t305;
                				void* _t307;
                				void* _t310;
                				void* _t311;
                				void* _t313;
                				signed long long _t314;
                				void* _t322;
                				intOrPtr _t323;
                				long long _t330;
                				void* _t332;
                				signed long long _t334;
                				void* _t336;
                				long long _t337;
                				intOrPtr _t338;
                				void* _t340;
                				signed long long _t341;
                				long long _t343;
                				long long _t345;
                
                				 *((long long*)(_t313 + 8)) = __rbx;
                				_t311 = _t313 - 0x27;
                				_t314 = _t313 - 0x100;
                				_t236 =  *0x3f082018; // 0xe88b9cb90319
                				 *(_t311 + 0x1f) = _t236 ^ _t314;
                				 *((long long*)(_t311 - 1)) = __rcx;
                				r13d = r9d;
                				 *((long long*)(_t311 - 0x19)) = __r8;
                				_t337 = _t336 + __r8;
                				 *((long long*)(_t311 - 9)) = __edx;
                				 *((long long*)(_t311 - 0x49)) = _t337;
                				_t341 = __edx + __edx * 8;
                				_t334 = __edx >> 6;
                				 *((long long*)(_t311 - 0x41)) =  *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + 0x28 + _t341 * 8));
                				 *((intOrPtr*)(_t311 - 0x59)) = GetConsoleCP();
                				E0000000113F05BE30( *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + 0x28 + _t341 * 8)), __edx, _t314 + 0x50, __rdx, _t305, _t343);
                				_t261 =  *((intOrPtr*)(_t314 + 0x58));
                				r15d = 0;
                				r10d = 0;
                				 *((long long*)(_t311 - 0x51)) = _t343;
                				 *((long long*)(_t311 - 0x69)) = _t343;
                				_t194 =  *((intOrPtr*)(_t261 + 0xc));
                				 *((intOrPtr*)(_t311 - 0x55)) = _t194;
                				if (__r8 - _t337 >= 0) goto 0x3f064fba;
                				_t242 = __edx >> 6;
                				 *(_t311 - 0x11) = _t242;
                				r15d = 1;
                				 *((char*)(_t314 + 0x40)) =  *((intOrPtr*)(__r8));
                				 *(_t314 + 0x44) = r10d;
                				if (_t194 != 0xfde9) goto 0x3f064e2e;
                				_t323 =  *((intOrPtr*)(0x13f050000 + 0x417a0 + _t242 * 8));
                				if ( *((intOrPtr*)(_t323 + _t341 * 8 + __r10 + 0x3e)) == r10b) goto 0x3f064cdb;
                				_t296 = __r10 + 1;
                				if (_t296 - 5 < 0) goto 0x3f064cc9;
                				if (_t296 <= 0) goto 0x3f064dd1;
                				r15d =  *((char*)(_t261 + 0x13f082170));
                				r15d = r15d + 1;
                				r13d = r15d;
                				r13d = r13d - r10d + 1;
                				if (r13d -  *((intOrPtr*)(_t311 - 0x49)) - __r8 > 0) goto 0x3f064f7f;
                				if (_t296 <= 0) goto 0x3f064d43;
                				_t330 = _t323 - _t311 + 7 + _t341 * 8;
                				 *((char*)(_t311 + 7 + __r10)) =  *((intOrPtr*)(_t311 + 7 + __r10 + _t330 + 0x3e));
                				if (__r10 + 1 - _t296 < 0) goto 0x3f064d2a;
                				r10d = 0;
                				if (r13d <= 0) goto 0x3f064d5d;
                				E0000000113F0593C0( *((intOrPtr*)(_t311 + 7 + __r10 + _t330 + 0x3e)), _t311 + 7 + _t296, __r8, r13d);
                				r10d = 0;
                				_t282 = _t330;
                				if (_t296 <= 0) goto 0x3f064d84;
                				 *((intOrPtr*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + _t282 + 0x3e + _t341 * 8)) = r10b;
                				if (_t282 + 1 - _t296 < 0) goto 0x3f064d6c;
                				_t246 = _t311 + 7;
                				 *((long long*)(_t311 - 0x39)) = _t330;
                				 *((long long*)(_t311 - 0x31)) = _t246;
                				_t159 = (r10d & 0xffffff00 | r15d == 0x00000004) + 1;
                				r8d = _t159;
                				r15d = _t159;
                				E0000000113F0688A8(_t246, __edx, _t314 + 0x44, _t311 - 0x31, 0x13f050000, _t311 - 0x39);
                				if (_t246 == 0xffffffff) goto 0x3f065092;
                				_t338 =  *((intOrPtr*)(_t311 - 0x49));
                				goto 0x3f064ea3;
                				_t299 =  *((char*)(_t246 + 0x13f082170));
                				_t185 = _t299 + 1;
                				_t247 = _t185;
                				if (_t247 - _t338 - __r8 > 0) goto 0x3f065007;
                				 *((long long*)(_t311 - 0x29)) = _t330;
                				 *((long long*)(_t311 - 0x21)) = __r8;
                				_t165 = (r10d & 0xffffff00 | _t185 == 0x00000004) + 1;
                				r8d = _t165;
                				_t269 = _t314 + 0x44;
                				E0000000113F0688A8(_t247, __edx, _t269, _t311 - 0x21, 0x13f050000, _t311 - 0x29);
                				if (_t247 == 0xffffffff) goto 0x3f065092;
                				r15d = _t165;
                				goto 0x3f064ea3;
                				_t288 =  *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8));
                				_t186 =  *(_t288 + 0x3d + _t341 * 8);
                				if ((_t186 & 0x00000004) == 0) goto 0x3f064e68;
                				 *((char*)(_t311 + 0xf)) =  *((intOrPtr*)(_t288 + 0x3e + _t341 * 8));
                				r8d = 2;
                				 *(_t288 + 0x3d + _t341 * 8) = _t186 & 0x000000fb;
                				_t289 = _t311 + 0xf;
                				 *((char*)(_t311 + 0x10)) =  *((intOrPtr*)(__r8));
                				goto 0x3f064e90;
                				E0000000113F06B090(_t186 & 0x000000fb, 0x13f050000, __edx, _t269, _t289, __r8, _t311 - 0x29);
                				if ( *((intOrPtr*)(0x13f050000 + _t269 * 2)) >= 0) goto 0x3f064e8a;
                				_t301 = _t299 + __r8 + 1;
                				if (_t301 - _t338 >= 0) goto 0x3f065058;
                				_t100 = _t289 + 2; // 0x2
                				r8d = _t100;
                				goto 0x3f064e8d;
                				_t170 = E0000000113F06646C(0, 0x13f050000, __edx, _t314 + 0x44, __r8, 0x13f050000, _t340, _t336, _t332);
                				if (_t170 == 0xffffffff) goto 0x3f065092;
                				_t322 = _t314 + 0x44;
                				 *((long long*)(_t314 + 0x38)) = __edx;
                				_t106 = _t301 + 1; // 0x2
                				_t307 = _t106;
                				 *((long long*)(_t314 + 0x30)) = __edx;
                				r9d = r15d;
                				 *((intOrPtr*)(_t314 + 0x28)) = 5;
                				 *((long long*)(_t314 + 0x20)) = _t311 + 0x17;
                				E0000000113F0683EC(_t293);
                				if (_t170 == 0) goto 0x3f0650a4;
                				r8d = _t170;
                				 *((long long*)(_t314 + 0x20)) = __edx;
                				_t171 = WriteFile(_t305, _t310, ??);
                				r10d = 0;
                				if (_t171 == 0) goto 0x3f06509b;
                				_t345 =  *((intOrPtr*)(_t311 - 0x51));
                				_t179 =  *((intOrPtr*)(_t311 - 0x41)) + _t345;
                				 *((intOrPtr*)(_t311 - 0x65)) = _t179;
                				if ( *((intOrPtr*)(_t314 + 0x48)) - _t170 < 0) goto 0x3f064fba;
                				if ( *((char*)(_t314 + 0x40)) != 0xa) goto 0x3f064f6b;
                				_t121 = _t330 + 0xd; // 0xd
                				 *((short*)(_t314 + 0x40)) = _t121;
                				_t124 = _t330 + 1; // 0x1
                				r8d = _t124;
                				 *((long long*)(_t314 + 0x20)) = _t330;
                				_t173 = WriteFile(??, ??, ??, ??, ??);
                				r10d = 0;
                				if (_t173 == 0) goto 0x3f065089;
                				if ( *((intOrPtr*)(_t314 + 0x48)) - 1 < 0) goto 0x3f064fba;
                				r15d = r15d + 1;
                				 *((long long*)(_t311 - 0x51)) = _t345;
                				 *((intOrPtr*)(_t311 - 0x65)) = _t179 + 1;
                				if (_t307 - _t338 >= 0) goto 0x3f064fba;
                				goto 0x3f064c93;
                				if (_t322 <= 0) goto 0x3f064fb4;
                				 *((char*)( *((intOrPtr*)(0x13f050000 + 0x417a0 + _t334 * 8)) + _t307 + 0x3e + _t341 * 8)) =  *((intOrPtr*)(_t307 - _t307 + _t307));
                				if (r10d + 1 - _t322 < 0) goto 0x3f064f91;
                				 *((intOrPtr*)(_t311 - 0x65)) =  *((intOrPtr*)(_t311 - 0x65)) + r8d;
                				if ( *((intOrPtr*)(_t311 - 0x71)) == r10b) goto 0x3f064fcc;
                				 *( *((intOrPtr*)(_t314 + 0x50)) + 0x3a8) =  *( *((intOrPtr*)(_t314 + 0x50)) + 0x3a8) & 0xfffffffd;
                				asm("movsd xmm0, [ebp-0x69]");
                				asm("movsd [eax], xmm0");
                				 *((intOrPtr*)( *((intOrPtr*)(_t311 - 1)) + 8)) = __esi -  *((intOrPtr*)(_t311 - 0x19));
                				return E0000000113F058680(__esi -  *((intOrPtr*)(_t311 - 0x19)),  *((intOrPtr*)(_t311 - 1)),  *(_t311 + 0x1f) ^ _t314);
                			}













































                0x13f064bdc
                0x13f064bec
                0x13f064bf1
                0x13f064bf8
                0x13f064c02
                0x13f064c0f
                0x13f064c16
                0x13f064c20
                0x13f064c24
                0x13f064c27
                0x13f064c2e
                0x13f064c32
                0x13f064c36
                0x13f064c47
                0x13f064c58
                0x13f064c5b
                0x13f064c60
                0x13f064c65
                0x13f064c68
                0x13f064c6b
                0x13f064c6f
                0x13f064c76
                0x13f064c79
                0x13f064c7f
                0x13f064c8b
                0x13f064c8f
                0x13f064c95
                0x13f064c9b
                0x13f064c9f
                0x13f064caa
                0x13f064cba
                0x13f064cce
                0x13f064cd2
                0x13f064cd9
                0x13f064cde
                0x13f064cf9
                0x13f064d02
                0x13f064d05
                0x13f064d08
                0x13f064d11
                0x13f064d1d
                0x13f064d26
                0x13f064d39
                0x13f064d3e
                0x13f064d40
                0x13f064d46
                0x13f064d55
                0x13f064d5a
                0x13f064d5d
                0x13f064d63
                0x13f064d7a
                0x13f064d82
                0x13f064d84
                0x13f064d88
                0x13f064d8c
                0x13f064da7
                0x13f064da9
                0x13f064dac
                0x13f064daf
                0x13f064db8
                0x13f064dc2
                0x13f064dcc
                0x13f064dda
                0x13f064de3
                0x13f064de6
                0x13f064dec
                0x13f064df5
                0x13f064dfc
                0x13f064e07
                0x13f064e0d
                0x13f064e10
                0x13f064e17
                0x13f064e20
                0x13f064e29
                0x13f064e2c
                0x13f064e35
                0x13f064e3d
                0x13f064e45
                0x13f064e4f
                0x13f064e52
                0x13f064e5a
                0x13f064e5f
                0x13f064e63
                0x13f064e66
                0x13f064e68
                0x13f064e76
                0x13f064e78
                0x13f064e7e
                0x13f064e84
                0x13f064e84
                0x13f064e88
                0x13f064e95
                0x13f064e9d
                0x13f064eac
                0x13f064eb1
                0x13f064eb6
                0x13f064eb6
                0x13f064eba
                0x13f064ebf
                0x13f064ec2
                0x13f064ecc
                0x13f064ed1
                0x13f064eda
                0x13f064ee9
                0x13f064eec
                0x13f064ef5
                0x13f064efb
                0x13f064f00
                0x13f064f06
                0x13f064f0f
                0x13f064f13
                0x13f064f1a
                0x13f064f25
                0x13f064f2b
                0x13f064f34
                0x13f064f39
                0x13f064f39
                0x13f064f3d
                0x13f064f47
                0x13f064f4d
                0x13f064f52
                0x13f064f5d
                0x13f064f5f
                0x13f064f64
                0x13f064f68
                0x13f064f71
                0x13f064f7a
                0x13f064f85
                0x13f064fa4
                0x13f064faf
                0x13f064fb7
                0x13f064fbe
                0x13f064fc5
                0x13f064fd0
                0x13f064fd9
                0x13f064fdd
                0x13f065006

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite$Console
                • String ID:
                • API String ID: 786612050-0
                • Opcode ID: ea2b47583d3eba2a351e053b359a93f4ef48024dbd9af04be46d39f3fa6f7787
                • Instruction ID: d2776d3848bb5310eff608a02238da49705bee4b7297f7c554ab98db6dfb0696
                • Opcode Fuzzy Hash: ea2b47583d3eba2a351e053b359a93f4ef48024dbd9af04be46d39f3fa6f7787
                • Instruction Fuzzy Hash: 28D1F376B08A809AE704CF68D5447DD7BB2F7457E8F64412AEE4E47B9ADA34C25BC300
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressProc
                • String ID: Failed to get address for PyDict_GetItemString$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyList_New$Failed to get address for PyLong_AsLong$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyRun_SimpleString$Failed to get address for PySys_AddWarnOption$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetArgvEx$Failed to get address for PySys_SetObject$Failed to get address for PySys_SetPath$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for Py_BuildValue$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_DontWriteBytecodeFlag$Failed to get address for Py_FileSystemDefaultEncoding$Failed to get address for Py_Finalize$Failed to get address for Py_FrozenFlag$Failed to get address for Py_GetPath$Failed to get address for Py_IgnoreEnvironmentFlag$Failed to get address for Py_IncRef$Failed to get address for Py_Initialize$Failed to get address for Py_NoSiteFlag$Failed to get address for Py_NoUserSiteDirectory$Failed to get address for Py_OptimizeFlag$Failed to get address for Py_SetPath$Failed to get address for Py_SetProgramName$Failed to get address for Py_SetPythonHome$Failed to get address for Py_UnbufferedStdioFlag$Failed to get address for Py_VerboseFlag$GetProcAddress$PyDict_GetItemString$PyErr_Clear$PyErr_Fetch$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyList_New$PyLong_AsLong$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyRun_SimpleString$PySys_AddWarnOption$PySys_GetObject$PySys_SetArgvEx$PySys_SetObject$PySys_SetPath$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$Py_BuildValue$Py_DecRef$Py_DecodeLocale$Py_DontWriteBytecodeFlag$Py_FileSystemDefaultEncoding$Py_Finalize$Py_FrozenFlag$Py_GetPath$Py_IgnoreEnvironmentFlag$Py_IncRef$Py_Initialize$Py_NoSiteFlag$Py_NoUserSiteDirectory$Py_OptimizeFlag$Py_SetPath$Py_SetProgramName$Py_SetPythonHome$Py_UnbufferedStdioFlag$Py_VerboseFlag
                • API String ID: 190572456-223677313
                • Opcode ID: 1564c779122922b13c17898a300d3502ae50f77c3862dfe141ea74ae0739cb47
                • Instruction ID: 05ce9d4ff266d8a45fd3259558df83f13e5f8433b6674999afc1fbbd6c4c4b22
                • Opcode Fuzzy Hash: 1564c779122922b13c17898a300d3502ae50f77c3862dfe141ea74ae0739cb47
                • Instruction Fuzzy Hash: A7323FB4A06B01D1FA6DCB2DE8983D463A3BB04780F94547DE80E06267EFB8D75AD650
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F051430(void* __rcx, void* __rdx) {
                				void* _t1;
                				void* _t2;
                				void* _t3;
                				void* _t5;
                				void* _t9;
                				void* _t10;
                
                				_t1 = E0000000113F054220(_t2, _t3, _t5, __rcx, _t9, _t10);
                				if (_t1 != 0xffffffff) goto 0x3f051452;
                				return _t1;
                			}









                0x13f05143f
                0x13f051447
                0x13f051451

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID:
                • String ID: Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                • API String ID: 0-666925554
                • Opcode ID: 6e70abfea036f0f1122467ff945af6383db8636809d0e7d669425bec9cc7b8ed
                • Instruction ID: a3c79b0c0a9a4e12df4be42617b73f935b0e8c8d71beb5db879ea7fc4806aecb
                • Opcode Fuzzy Hash: 6e70abfea036f0f1122467ff945af6383db8636809d0e7d669425bec9cc7b8ed
                • Instruction Fuzzy Hash: CD516C71B08640C1FE28DB2AE45C7EA6352AB45BD4F844539BE1D477A7EAB8C74BC700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                • String ID: D:(A;;FA;;;%s)$S-1-3-4
                • API String ID: 4998090-2855260032
                • Opcode ID: ef52ebee5af13c6f64c629bced7e0da4cd853539a5cf90f4e283fe1e0c44143e
                • Instruction ID: 230451ebd353960345ad206ed6f6b81e0dbebf7c704e41ac5564eeb445e0fbd4
                • Opcode Fuzzy Hash: ef52ebee5af13c6f64c629bced7e0da4cd853539a5cf90f4e283fe1e0c44143e
                • Instruction Fuzzy Hash: 45419231A18781C2EB548F69F8487DA6362F784794F440239BA9E476D7DF7CC64ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F0512A0(long long* __rcx, void* __rdx) {
                				long long _t8;
                				void* _t15;
                				void* _t16;
                				void* _t17;
                
                				_t8 =  *((intOrPtr*)(__rcx));
                				_t15 = __rdx;
                				if (_t8 != 0) goto 0x3f0512e8;
                				E0000000113F052E30(_t8, __rcx + 0x78, "rb");
                				 *__rcx = _t8;
                				if (_t8 != 0) goto 0x3f0512e8;
                				E0000000113F051DD0(_t8, "Failed to extract %s: failed to open archive file!\n", _t15 + 0x12, _t16, _t17);
                				return 0;
                			}







                0x13f0512a8
                0x13f0512ab
                0x13f0512b4
                0x13f0512c1
                0x13f0512c6
                0x13f0512cc
                0x13f0512d9
                0x13f0512e7

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message
                • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                • API String ID: 2030045667-3659356012
                • Opcode ID: d4d1e1949bc788161e4c16fdd5c4db70734f370c7b2e517d5a0786d8472b9bdc
                • Instruction ID: ed6bde677f45ced7978b02e87740206845ef2b0a1d7b62caaf1a0416acc6e114
                • Opcode Fuzzy Hash: d4d1e1949bc788161e4c16fdd5c4db70734f370c7b2e517d5a0786d8472b9bdc
                • Instruction Fuzzy Hash: 94417C31A09641C2EF28DB19E8587DA63A2FB44BD4F84543AAE4D07B57EAB8C647C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E0000000113F051040(long long __rax, long long __rcx, long long __rdx, void* __r8, void* __r9) {
                				void* __rbx;
                				void* __rbp;
                				void* _t13;
                				void* _t28;
                				void* _t31;
                				void* _t34;
                				void* _t36;
                				void* _t37;
                				void* _t41;
                				void* _t44;
                
                				_t40 = __r9;
                				_t39 = __r8;
                				_t18 = __rax;
                				 *((long long*)(_t36 + 0x10)) = __rdx;
                				 *((long long*)(_t36 + 8)) = __rcx;
                				_t37 = _t36 - 0x88;
                				 *((long long*)(_t37 + 0x50)) = __rax;
                				 *((long long*)(_t37 + 0x58)) = __rax;
                				 *((long long*)(_t37 + 0x60)) = __rax;
                				_t6 = _t18 + 0x58; // 0x58
                				r8d = _t6;
                				 *((intOrPtr*)(_t37 + 0x28)) = 0;
                				 *((long long*)(_t37 + 0x20)) = __rax;
                				_t13 = E0000000113F057370(__rax, __rdx, _t37 + 0x20, "1.2.11", _t34, _t44);
                				r15d = _t13;
                				if (_t13 == 0) goto 0x3f0510c3;
                				r8d = _t13;
                				E0000000113F051DD0(_t18, "Failed to extract %s: inflateInit() failed with return code %d!\n", __rdx + 0x12, _t39, _t40, _t41, _t28, _t31, _t34);
                				_t11 = _t34 - 1; // -1
                				return _t11;
                			}













                0x13f051040
                0x13f051040
                0x13f051040
                0x13f051040
                0x13f051045
                0x13f051052
                0x13f051061
                0x13f051069
                0x13f051075
                0x13f05107a
                0x13f05107a
                0x13f05107e
                0x13f051087
                0x13f051091
                0x13f051096
                0x13f05109b
                0x13f0510a1
                0x13f0510ab
                0x13f0510b0
                0x13f0510c2

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message
                • String ID: 1.2.11$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                • API String ID: 2030045667-1060636955
                • Opcode ID: e77d3802689a7dd720392b35439451f28cc6128064f7213b28f4623806c6f546
                • Instruction ID: 053c9461a73cf3771fbf3ee55c42a9c50cf8deeee0036c1de9db0a351fc27fff
                • Opcode Fuzzy Hash: e77d3802689a7dd720392b35439451f28cc6128064f7213b28f4623806c6f546
                • Instruction Fuzzy Hash: E151D432A09680C5EA689B1AE8483EA6392F785794F440139FE5D877D7EFB8C757C700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide
                • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                • API String ID: 626452242-3595433791
                • Opcode ID: b84777b8a37d06f30edf397592e5c751da7f646b8298d26863a3ce99bc9f71fa
                • Instruction ID: 37cab899d5a5a3e57032c4000d51d407dd280c11fb0f3518fd3d22cc17ff71cf
                • Opcode Fuzzy Hash: b84777b8a37d06f30edf397592e5c751da7f646b8298d26863a3ce99bc9f71fa
                • Instruction Fuzzy Hash: 5641B632609B80C2E724CF99F8443AAB7A6F785794F544139EE8D47B96DF78C256C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 45%
                			E0000000113F054B30(void* __rax, long long __rbx, void* __rcx, long long _a16, short _a24, intOrPtr _a32, long long _a40, long long _a48, long long _a56, long long _a64, intOrPtr _a72, char _a80, long long _a88, short _a96, char _a104, char _a136, long long _a144, intOrPtr _a196, short _a200, signed long long _a216, signed long long _a224, signed long long _a232, char _a248, signed int _a8440, void* _a8480) {
                				void* __rdi;
                				void* _t61;
                				signed long long _t81;
                				signed long long _t82;
                				long long _t103;
                				void* _t104;
                				void* _t105;
                				void* _t108;
                				void* _t110;
                				void* _t111;
                				void* _t112;
                				void* _t113;
                
                				_t85 = __rbx;
                				_a16 = __rbx;
                				E0000000113F058610(_t61, __rax, __rcx, _t111, _t112);
                				_t106 = _t105 - __rax;
                				_t81 =  *0x3f082018; // 0xe88b9cb90319
                				_t82 = _t81 ^ _t105 - __rax;
                				_a8440 = _t82;
                				_t99 = __rcx;
                				_a72 = 0;
                				r8d = 0x1000;
                				E0000000113F0554B0(_t82, __rbx,  &_a248, __rcx, _t104, _t108);
                				_t5 = _t103 + 0x16; // 0x16
                				E0000000113F060A2C(_t5, _t85, _t99, _t103, _t112, _t113);
                				_t6 = _t103 + 2; // 0x2
                				E0000000113F060A2C(_t6, _t85, _t99, _t103, _t112, _t113);
                				_t7 = _t103 + 0xf; // 0xf
                				E0000000113F060A2C(_t7, _t85, _t99, _t103, _t112, _t113);
                				_t8 = _t103 + 0x15; // 0x15
                				E0000000113F060A2C(_t8, _t85, _t99, _t103, _t112, _t113);
                				_a80 = 0x18;
                				_a88 = _t103;
                				_a96 = 1;
                				GetStartupInfoW(??);
                				asm("xorps xmm0, xmm0");
                				_a144 = _t103;
                				asm("movdqa [esp+0xa0], xmm0");
                				_a196 = 0x101;
                				_a200 = 1;
                				E0000000113F05B520(0, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_a216 = _t82;
                				E0000000113F05B520(1, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_t17 = _t103 + 2; // 0x2
                				_a224 = _t82;
                				E0000000113F05B520(_t17, _t82);
                				E0000000113F0605E0(E0000000113F0628A4(_t82, _t82), _t82);
                				_a232 = _t82;
                				GetCommandLineW();
                				r9d = 0;
                				_a64 =  &_a104;
                				_a56 =  &_a136;
                				_a48 = _t103;
                				_a40 = _t103;
                				_a32 = 0;
                				_a24 = 1;
                				if (CreateProcessW(??, ??, ??, ??, ??, ??, ??, ??, ??, ??) == 0) goto 0x3f054cb1;
                				WaitForSingleObject(??, ??);
                				GetExitCodeProcess(??, ??);
                				goto 0x3f054cc9;
                				E0000000113F051C80( &_a136, "CreateProcessW", "Error creating child process!\n",  &_a80, _t110);
                				return E0000000113F058680(_t50,  &_a136, _a8440 ^ _t106);
                			}















                0x13f054b30
                0x13f054b30
                0x13f054b3b
                0x13f054b40
                0x13f054b43
                0x13f054b4a
                0x13f054b4d
                0x13f054b55
                0x13f054b62
                0x13f054b66
                0x13f054b6c
                0x13f054b76
                0x13f054b7b
                0x13f054b82
                0x13f054b85
                0x13f054b8c
                0x13f054b8f
                0x13f054b96
                0x13f054b99
                0x13f054ba6
                0x13f054bae
                0x13f054bb3
                0x13f054bb7
                0x13f054bbd
                0x13f054bc0
                0x13f054bca
                0x13f054bd3
                0x13f054bde
                0x13f054be6
                0x13f054bf5
                0x13f054bfc
                0x13f054c04
                0x13f054c13
                0x13f054c18
                0x13f054c1b
                0x13f054c23
                0x13f054c32
                0x13f054c37
                0x13f054c3f
                0x13f054c45
                0x13f054c5d
                0x13f054c6a
                0x13f054c6f
                0x13f054c74
                0x13f054c79
                0x13f054c7d
                0x13f054c89
                0x13f054c95
                0x13f054ca5
                0x13f054caf
                0x13f054cbf
                0x13f054ce9

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlErrorExitHandlerInfoLastLineMultiObjectSingleStartupWaitWide
                • String ID: CreateProcessW$Error creating child process!
                • API String ID: 1742298069-3524285272
                • Opcode ID: 8dbaf096aa3f33a891b1a2d3615838a40473c6e667d6fd4a217db14c49a1aea7
                • Instruction ID: a951c0840225ba14d698cf5dbbadce38820a83afe46c718a9112228c62bc1c46
                • Opcode Fuzzy Hash: 8dbaf096aa3f33a891b1a2d3615838a40473c6e667d6fd4a217db14c49a1aea7
                • Instruction Fuzzy Hash: 71413132A0468086EB18DB68F4553DEB3A2FBD4350F50013DB68947B9BEF78D259CB40
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • WideCharToMultiByte.KERNEL32 ref: 000000013F055601
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                • WideCharToMultiByte.KERNEL32 ref: 000000013F055675
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide$ErrorLastMessage
                • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                • API String ID: 3723044601-3595433791
                • Opcode ID: 7ce4c7ee369d8250c1fd834a20437612c7fb5e86d13aad6c50473841e9872349
                • Instruction ID: 70f02d07a6cd543d730e02185c6ef7d800b1cc92780b55f43d87ed084cfabfbc
                • Opcode Fuzzy Hash: 7ce4c7ee369d8250c1fd834a20437612c7fb5e86d13aad6c50473841e9872349
                • Instruction Fuzzy Hash: FA21BF70B08B81D5EB18CF6AE8443A97762A784BD4F944139EA0D43796EF78C6468300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 51%
                			E0000000113F065528(signed long long __ecx, void* __edi, void* __ebp, signed int* __rax, unsigned int __rbx, signed short* __rdx, void* __r10, void* __r11, long long _a32) {
                				signed short _v72;
                				void* _v84;
                				unsigned int _v88;
                				intOrPtr _v96;
                				intOrPtr _v100;
                				long _v104;
                				signed int _v120;
                				void* __rdi;
                				void* __rsi;
                				void* __rbp;
                				void* _t89;
                				long _t98;
                				intOrPtr _t109;
                				signed int _t118;
                				unsigned int _t123;
                				void* _t129;
                				intOrPtr _t151;
                				intOrPtr _t163;
                				unsigned long long _t169;
                				signed int* _t171;
                				unsigned int _t172;
                				signed short* _t185;
                				signed short* _t188;
                				long _t189;
                				void* _t191;
                				void* _t198;
                				void* _t201;
                				signed long long _t202;
                				void* _t203;
                				signed long long _t205;
                				void* _t206;
                				signed short* _t207;
                				signed long long _t209;
                
                				_t201 = __r11;
                				_t185 = __rdx;
                				_t172 = __rbx;
                				_t129 = __edi;
                				_a32 = __rbx;
                				r14d = r8d;
                				_t188 = __rdx;
                				_t202 = __ecx;
                				if (r8d == 0) goto 0x3f0657e8;
                				if (__rdx != 0) goto 0x3f065576;
                				E0000000113F05DE94(__rax);
                				 *__rax =  *__rax & 0x00000000;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f0657ea;
                				_t205 = _t202 >> 6;
                				_t209 = _t202 + _t202 * 8;
                				sil =  *((intOrPtr*)(0x3f0917a0 + 0x39 + _t209 * 8));
                				if (_t189 - 1 - 1 > 0) goto 0x3f0655a7;
                				if (( !r14d & 0x00000001) == 0) goto 0x3f065556;
                				if (( *( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x38 + _t209 * 8) & 0x00000020) == 0) goto 0x3f0655bd;
                				_t17 = _t185 + 2; // 0x2
                				r8d = _t17;
                				E0000000113F06495C(__rbx, __rdx, _t189);
                				_v88 = _t172;
                				if (E0000000113F06B9B8(r12d, _t202) == 0) goto 0x3f0656d6;
                				_t163 =  *((intOrPtr*)(0x3f0917a0 + _t205 * 8));
                				if ( *(0x3f0917a0 + 0x38 + _t209 * 8) >= 0) goto 0x3f0656d6;
                				E0000000113F06699C(_t163, _t172,  *((intOrPtr*)(0x3f0917a0 + _t205 * 8)), _t185, _t189, _t198);
                				if ( *((intOrPtr*)( *((intOrPtr*)(_t163 + 0x90)) + 0x138)) != _t172) goto 0x3f065614;
                				if ( *((intOrPtr*)( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x39 + _t209 * 8)) == 0) goto 0x3f0656d6;
                				if (GetConsoleMode(??, ??) == 0) goto 0x3f0656d6;
                				if (sil == 0) goto 0x3f0656b8;
                				sil = sil - 1;
                				if (sil - 1 > 0) goto 0x3f065774;
                				_t203 = _t188 + _t206;
                				_v104 = _t189;
                				_t207 = _t188;
                				if (_t188 - _t203 >= 0) goto 0x3f0656b1;
                				_v72 =  *_t207 & 0x0000ffff;
                				_t89 = E0000000113F06BA80( *_t207 & 0xffff);
                				_t118 = _v72 & 0x0000ffff;
                				if (_t89 != _t118) goto 0x3f0656a8;
                				_t109 = _v100 + 2;
                				_v100 = _t109;
                				if (_t118 != 0xa) goto 0x3f06569d;
                				if (E0000000113F06BA80(0xd) != 0xd) goto 0x3f0656a8;
                				_v100 = _t109 + 1;
                				if ( &(_t207[1]) - _t203 >= 0) goto 0x3f0656b1;
                				goto 0x3f06565d;
                				_v104 = GetLastError();
                				goto 0x3f06576a;
                				r9d = r14d;
                				E0000000113F064BDC(_t91, r12d, 1,  &(_t207[1]) - _t203, _t172,  &_v104,  &_v72, _t188, __r10);
                				asm("movsd xmm0, [eax]");
                				goto 0x3f06576f;
                				if ( *( *((intOrPtr*)(0x3f0917a0 + _t205 * 8)) + 0x38 + _t209 * 8) -  *0x13F0917A8 >= 0) goto 0x3f065737;
                				_t151 = sil;
                				if (_t151 == 0) goto 0x3f065723;
                				if (_t151 == 0) goto 0x3f06570f;
                				if (sil - 1 != 1) goto 0x3f065774;
                				r9d = r14d;
                				E0000000113F0651B0( *0x13F0917A8, sil - 1, r12d, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r9d = r14d;
                				E0000000113F0652CC(sil - 1, r12d, _t129, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r9d = r14d;
                				E0000000113F0650AC( *0x13F0917A8, r12d, 0x3f0917a0, _t172,  &_v104, _t191, _t188, __r10, _t201);
                				goto 0x3f0656ca;
                				r8d = r14d;
                				_v120 = _v120 & 0x3f0917a0;
                				_v104 = 0x3f0917a0;
                				_v96 = 0;
                				if (WriteFile(??, ??, ??, ??, ??) != 0) goto 0x3f065767;
                				_t98 = GetLastError();
                				_v104 = _t98;
                				asm("movsd xmm0, [ebp-0x30]");
                				asm("movsd [ebp-0x20], xmm0");
                				_t169 = _v88 >> 0x20;
                				if (_t98 != 0) goto 0x3f0657e1;
                				_t123 = _v88;
                				if (_t123 == 0) goto 0x3f0657b1;
                				if (_t123 != 5) goto 0x3f0657a7;
                				E0000000113F05DEB4(_t169);
                				 *_t169 = 9;
                				E0000000113F05DE94(_t169);
                				 *_t169 = 5;
                				goto 0x3f06556e;
                				E0000000113F05DE44(_t123, _t169, _t172);
                				goto 0x3f06556e;
                				_t171 =  *((intOrPtr*)(0x3f0917a0 + _t205 * 8));
                				if (( *(0x3f0917a0 + 0x38 + _t209 * 8) & 0x00000040) == 0) goto 0x3f0657c9;
                				if ( *_t188 == 0x1a) goto 0x3f0657e8;
                				E0000000113F05DEB4(_t171);
                				 *0x3f0917a0 = 0x1c;
                				E0000000113F05DE94(_t171);
                				 *_t171 =  *_t171 & 0x00000000;
                				goto 0x3f06556e;
                				goto 0x3f0657ea;
                				return 0;
                			}




































                0x13f065528
                0x13f065528
                0x13f065528
                0x13f065528
                0x13f065528
                0x13f06553f
                0x13f065542
                0x13f065545
                0x13f06554b
                0x13f065554
                0x13f065556
                0x13f06555b
                0x13f06555e
                0x13f065563
                0x13f065569
                0x13f065571
                0x13f065586
                0x13f06558a
                0x13f065592
                0x13f06559c
                0x13f0655a5
                0x13f0655ad
                0x13f0655b4
                0x13f0655b4
                0x13f0655b8
                0x13f0655c2
                0x13f0655cd
                0x13f0655da
                0x13f0655e3
                0x13f0655e9
                0x13f0655fc
                0x13f06560e
                0x13f065630
                0x13f065639
                0x13f06563b
                0x13f065642
                0x13f06564a
                0x13f06564e
                0x13f065652
                0x13f065658
                0x13f065664
                0x13f065668
                0x13f06566d
                0x13f065674
                0x13f065676
                0x13f065679
                0x13f065680
                0x13f065694
                0x13f065698
                0x13f0656a4
                0x13f0656a6
                0x13f0656ae
                0x13f0656b3
                0x13f0656b8
                0x13f0656c5
                0x13f0656ca
                0x13f0656d1
                0x13f0656e6
                0x13f0656ec
                0x13f0656ef
                0x13f0656f4
                0x13f0656f9
                0x13f0656fb
                0x13f065708
                0x13f06570d
                0x13f06570f
                0x13f06571c
                0x13f065721
                0x13f065723
                0x13f065730
                0x13f065735
                0x13f065742
                0x13f065745
                0x13f06574d
                0x13f065751
                0x13f06575c
                0x13f06575e
                0x13f065764
                0x13f06576a
                0x13f06576f
                0x13f065778
                0x13f06577e
                0x13f065780
                0x13f065785
                0x13f06578a
                0x13f06578c
                0x13f065791
                0x13f065797
                0x13f06579c
                0x13f0657a2
                0x13f0657a7
                0x13f0657ac
                0x13f0657b8
                0x13f0657c2
                0x13f0657c7
                0x13f0657c9
                0x13f0657ce
                0x13f0657d4
                0x13f0657d9
                0x13f0657dc
                0x13f0657e6
                0x13f065801

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 2210144848-1217125225
                • Opcode ID: bc1f743b9c0a1a252fb222de23ce953d4e7556d384d1b8457ca2d1eaf71d8965
                • Instruction ID: 6d3855ced312ffaa81fd11c56e2df80a8fd8076b5ea610e8d057dfacabba5a8c
                • Opcode Fuzzy Hash: bc1f743b9c0a1a252fb222de23ce953d4e7556d384d1b8457ca2d1eaf71d8965
                • Instruction Fuzzy Hash: D981CE32F1161089FB289BA998503FD67A3F744BA8F64413AFE0A537A3DB348643C710
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide
                • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                • API String ID: 626452242-306716450
                • Opcode ID: 30fcca8b66d115fb5929c8b7c4fa6e94c7cbac511068e9fdf072a95727f51bc6
                • Instruction ID: 3748b706c174d882a0fbe4029506a8c91f31344bd034171ccc479dc72816059c
                • Opcode Fuzzy Hash: 30fcca8b66d115fb5929c8b7c4fa6e94c7cbac511068e9fdf072a95727f51bc6
                • Instruction Fuzzy Hash: ED41C232A09B84C2E624CF5DB8483AA76A6F784794F540139FE4D47BA6EF78C647C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F053FB0(void* __edx, void* __rax, long long __rbx, void* __rcx, void* __r8, char _a24, char _a8216, signed int _a16408, long long _a16448) {
                				void* __rdi;
                				long _t16;
                				void* _t31;
                				void* _t34;
                				void* _t40;
                				void* _t41;
                				signed long long _t49;
                				signed long long _t50;
                				long long _t52;
                				signed long long _t74;
                				void* _t76;
                				void* _t77;
                				void* _t85;
                				void* _t86;
                				void* _t87;
                
                				_t80 = __r8;
                				_t52 = __rbx;
                				_t34 = __edx;
                				E0000000113F058610(_t31, __rax, __rcx, _t86, _t87);
                				_t78 = _t77 - __rax;
                				_t49 =  *0x3f082018; // 0xe88b9cb90319
                				_t50 = _t49 ^ _t77 - __rax;
                				_a16408 = _t50;
                				_t69 = __rcx;
                				r8d = 0;
                				E0000000113F0554B0(_t50, __rbx, __rcx, __rcx, _t76, __r8);
                				if (_t50 != 0) goto 0x3f053ff9;
                				E0000000113F051DD0(_t50, "LOADER: Failed to convert runtime-tmpdir to a wide string.\n", _t69, _t80, _t85);
                				goto 0x3f0540e2;
                				r8d = 0x1000;
                				_a16448 = _t52;
                				_t16 = ExpandEnvironmentStringsW(??, ??, ??);
                				E0000000113F05A4F8(_t40, _t50, _t52, _t50);
                				if (_t16 != 0) goto 0x3f054039;
                				E0000000113F051DD0(_t50, "LOADER: Failed to expand environment variables in the runtime-tmpdir.\n",  &_a8216, _t80, _t85);
                				goto 0x3f0540da;
                				r8d = 0x1000;
                				E0000000113F05ED58(0, _t34, _t40, _t52, "LOADER: Failed to expand environment variables in the runtime-tmpdir.\n",  &_a8216, _t50, _t76, _t80, _t87);
                				if (_t50 != 0) goto 0x3f054066;
                				E0000000113F051DD0(_t50, "LOADER: Failed to obtain the absolute path of the runtime-tmpdir.\n",  &_a8216, _t80, _t85);
                				goto 0x3f0540da;
                				r8d = 0x2000;
                				E0000000113F0597D0(0, 0,  &_a24,  &_a8216, _t80);
                				E0000000113F059B10(0x5c, _t50, _t85);
                				_t74 = _t50;
                				if (_t50 == 0) goto 0x3f0540cc;
                				E0000000113F05F6A8(_t40, _t41,  &_a24, _t50, _t74, (_t74 - _t50 >> 1) + 1);
                				CreateDirectoryW(??, ??);
                				_t8 = _t74 + 2; // 0x2
                				E0000000113F059B10(0x5c, _t8, _t85);
                				if (_t50 != 0) goto 0x3f054090;
                				CreateDirectoryW(??, ??);
                				return E0000000113F058680(0, _t50, _a16408 ^ _t78);
                			}


















                0x13f053fb0
                0x13f053fb0
                0x13f053fb0
                0x13f053fb7
                0x13f053fbc
                0x13f053fbf
                0x13f053fc6
                0x13f053fc9
                0x13f053fd1
                0x13f053fd4
                0x13f053fd9
                0x13f053fe4
                0x13f053fed
                0x13f053ff4
                0x13f053ff9
                0x13f053fff
                0x13f054012
                0x13f05401d
                0x13f054024
                0x13f05402d
                0x13f054034
                0x13f054039
                0x13f054049
                0x13f054054
                0x13f05405d
                0x13f054064
                0x13f05406d
                0x13f054073
                0x13f054080
                0x13f054085
                0x13f05408b
                0x13f0540a4
                0x13f0540b0
                0x13f0540bb
                0x13f0540bf
                0x13f0540ca
                0x13f0540d1
                0x13f0540fa

                APIs
                  • Part of subcall function 000000013F0554B0: MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                • ExpandEnvironmentStringsW.KERNEL32(00000000,000000013F0542CF,?,00000000,?,000000013F05424D), ref: 000000013F054012
                  • Part of subcall function 000000013F051DD0: MessageBoxW.USER32 ref: 000000013F051EA1
                Strings
                • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 000000013F054026
                • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 000000013F054056
                • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 000000013F053FE6
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                • API String ID: 1662231829-3498232454
                • Opcode ID: 3126f1af46f723390cffcc75a6e4a6937d25ebea2a94b51b6166a0bf64a58513
                • Instruction ID: 79dd22881db695dce16086cb72cda4119d83e2ab3610f3bc8f83615429fc8326
                • Opcode Fuzzy Hash: 3126f1af46f723390cffcc75a6e4a6937d25ebea2a94b51b6166a0bf64a58513
                • Instruction Fuzzy Hash: FF319935B19780C1FA2C972AE9693DA5253A7987C1F94443DBA4D43797EE7CC30ACB00
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • MultiByteToWideChar.KERNEL32 ref: 000000013F0554EA
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                • MultiByteToWideChar.KERNEL32 ref: 000000013F055570
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ByteCharMultiWide$ErrorLastMessage
                • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                • API String ID: 3723044601-306716450
                • Opcode ID: 27dacbd2ac90255469c5f5b1dead4ccafc8fdfdd6c8400cc15fd5adb6ee8b042
                • Instruction ID: 7dc073584a88abe95d01d1dc07f511727cdae1dfcdaed099c05b464c91e9f5b8
                • Opcode Fuzzy Hash: 27dacbd2ac90255469c5f5b1dead4ccafc8fdfdd6c8400cc15fd5adb6ee8b042
                • Instruction Fuzzy Hash: F521A875B08A8091EB54CB2DF844399A773F7847C4F544139EB4C83BAAEB28C6568700
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                • String ID: CONOUT$
                • API String ID: 3230265001-3130406586
                • Opcode ID: 98e84c71b80d89dac0c76f5293afbbf01bb1ac2dd60d9a438c5439a735892769
                • Instruction ID: a1e942dd967cd7577984805692e69fc823b241b51ff585951ed37344da0918ad
                • Opcode Fuzzy Hash: 98e84c71b80d89dac0c76f5293afbbf01bb1ac2dd60d9a438c5439a735892769
                • Instruction Fuzzy Hash: B0119031B10A4086E7548B5AFC44359A7A2F788BE4F544238FE5E87B96DF38CA4AC740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 70%
                			E0000000113F06DC9C(void* __ecx, void* __eflags, signed int** __rax, void* __rdx, void* __r9, signed int _a8, char _a16, signed int _a24, signed int _a32) {
                				long long _v48;
                				long long _v56;
                				intOrPtr _v64;
                				long long _v72;
                				void* __rbx;
                				void* __rsi;
                				void* _t32;
                				void* _t43;
                				void* _t44;
                				void* _t45;
                				void* _t46;
                				signed int _t55;
                				signed int** _t74;
                				signed int* _t81;
                				signed int** _t82;
                				long long _t90;
                
                				_t74 = __rax;
                				E0000000113F06D510(_t32);
                				_a8 = 0;
                				_t82 = _t74;
                				_a24 = 0;
                				_a32 = 0;
                				if (E0000000113F06D578(_t74,  &_a8) != 0) goto 0x3f06de2d;
                				if (E0000000113F06D518(_t74,  &_a24) != 0) goto 0x3f06de2d;
                				if (E0000000113F06D548(_t74,  &_a32) != 0) goto 0x3f06de2d;
                				E0000000113F0636F8(_t74,  *0x3f092018);
                				 *0x3f092018 = _t90;
                				if (GetTimeZoneInformation(??) == 0xffffffff) goto 0x3f06de06;
                				_t55 =  *0x3f092030 * 0x3c;
                				_t7 = _t90 + 1; // 0x1
                				r8d =  *0x3f092084;
                				 *0x3f092020 = _t7;
                				_a8 = _t55;
                				if ( *0x3f092076 == 0) goto 0x3f06dd43;
                				_a8 = r8d * 0x3c + _t55;
                				if ( *0x3f0920ca == 0) goto 0x3f06dd5e;
                				if ( *0x3f0920d8 == 0) goto 0x3f06dd5e;
                				goto 0x3f06dd62;
                				_a24 = 0;
                				_a32 = 0;
                				_t43 = E0000000113F06AD88(0, _t74, _t82, 0x3f092030, __rdx, _t90, __r9);
                				r9d = r9d | 0xffffffff;
                				_v48 =  &_a16;
                				_v56 = _t90;
                				_v64 = 0x3f;
                				_v72 =  *_t82;
                				E0000000113F0683EC();
                				if (_t43 == 0) goto 0x3f06ddb3;
                				if (_a16 != 0) goto 0x3f06ddb3;
                				( *_t82)[0xf] = sil;
                				goto 0x3f06ddb9;
                				 *( *_t82) = sil;
                				r9d = r9d | 0xffffffff;
                				_v48 =  &_a16;
                				_v56 = _t90;
                				_v64 = 0x3f;
                				_v72 = _t82[1];
                				E0000000113F0683EC();
                				if (_t43 == 0) goto 0x3f06ddff;
                				if (_a16 != 0) goto 0x3f06ddff;
                				_t82[1][0xf] = sil;
                				goto 0x3f06de06;
                				_t81 = _t82[1];
                				 *_t81 = sil;
                				_t44 = E0000000113F06D508(_t43);
                				 *_t81 = _a8;
                				_t45 = E0000000113F06D4F8(_t44);
                				 *_t81 = _a24;
                				_t46 = E0000000113F06D500(_t45);
                				 *_t81 = _a32;
                				return _t46;
                			}



















                0x13f06dc9c
                0x13f06dca8
                0x13f06dcb3
                0x13f06dcb6
                0x13f06dcb9
                0x13f06dcbc
                0x13f06dcc6
                0x13f06dcd7
                0x13f06dce8
                0x13f06dcf5
                0x13f06dd01
                0x13f06dd11
                0x13f06dd17
                0x13f06dd1e
                0x13f06dd28
                0x13f06dd2f
                0x13f06dd35
                0x13f06dd38
                0x13f06dd40
                0x13f06dd4a
                0x13f06dd54
                0x13f06dd5c
                0x13f06dd62
                0x13f06dd65
                0x13f06dd68
                0x13f06dd79
                0x13f06dd83
                0x13f06dd88
                0x13f06dd8d
                0x13f06dd95
                0x13f06dd9c
                0x13f06dda3
                0x13f06dda8
                0x13f06ddad
                0x13f06ddb1
                0x13f06ddb6
                0x13f06ddbd
                0x13f06ddc1
                0x13f06ddd3
                0x13f06ddda
                0x13f06dde2
                0x13f06dde7
                0x13f06ddee
                0x13f06ddf3
                0x13f06ddf9
                0x13f06ddfd
                0x13f06ddff
                0x13f06de03
                0x13f06de09
                0x13f06de0e
                0x13f06de13
                0x13f06de18
                0x13f06de1d
                0x13f06de22
                0x13f06de2c

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight_invalid_parameter_noinfo$FreeHeapInformationTimeZone
                • String ID: ?
                • API String ID: 428190724-1684325040
                • Opcode ID: 4b8d8b9a9d1cb854abd132560a6a0d7be09b0046f340299ccabb5f0c195e02cc
                • Instruction ID: 47df4dce2b475279e4f81dfaea0e905422e70ffc0ac4e3fb4389b1bc47da758a
                • Opcode Fuzzy Hash: 4b8d8b9a9d1cb854abd132560a6a0d7be09b0046f340299ccabb5f0c195e02cc
                • Instruction Fuzzy Hash: 4461D532A1164086E768EF2DE8803D977A6F7847A4F64013EFA5947BA7DB38C643C740
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: 690d9ddb6f60a26e5b3e80fea60f6852178f52e6120a89603049ff95323a4551
                • Instruction ID: 8192fd9c0f3c7f7a7644cfa0882e8f56135699b84e5d9d4109f793a372ddba40
                • Opcode Fuzzy Hash: 690d9ddb6f60a26e5b3e80fea60f6852178f52e6120a89603049ff95323a4551
                • Instruction Fuzzy Hash: 91F08271B2564481FF5C8B69E8843E82362EB88790F44147DB50B45567DF2DC68ECB10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 85%
                			E0000000113F070ED0(signed int __ecx, long long __rbx, void* __rdx, long long __rsi, long long _a8, long long _a16) {
                				signed int _t27;
                				signed int _t28;
                				signed int _t29;
                				signed int _t30;
                				signed int _t31;
                				signed int _t42;
                				signed int _t43;
                				signed int _t44;
                				signed int _t46;
                				void* _t51;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t27 = __ecx & 0x0000001f;
                				if ((__ecx & 0x00000008) == 0) goto 0x3f070f02;
                				if (sil >= 0) goto 0x3f070f02;
                				E0000000113F071664(_t27, _t51);
                				_t28 = _t27 & 0xfffffff7;
                				goto 0x3f070f59;
                				_t42 = 0x00000004 & dil;
                				if (_t42 == 0) goto 0x3f070f1d;
                				asm("dec eax");
                				if (_t42 >= 0) goto 0x3f070f1d;
                				E0000000113F071664(_t28, _t51);
                				_t29 = _t28 & 0xfffffffb;
                				goto 0x3f070f59;
                				_t43 = dil & 0x00000001;
                				if (_t43 == 0) goto 0x3f070f39;
                				asm("dec eax");
                				if (_t43 >= 0) goto 0x3f070f39;
                				E0000000113F071664(_t29, _t51);
                				_t30 = _t29 & 0xfffffffe;
                				goto 0x3f070f59;
                				_t44 = dil & 0x00000002;
                				if (_t44 == 0) goto 0x3f070f59;
                				asm("dec eax");
                				if (_t44 >= 0) goto 0x3f070f59;
                				if ((dil & 0x00000010) == 0) goto 0x3f070f56;
                				E0000000113F071664(_t30, _t51);
                				_t31 = _t30 & 0xfffffffd;
                				_t46 = dil & 0x00000010;
                				if (_t46 == 0) goto 0x3f070f73;
                				asm("dec eax");
                				if (_t46 >= 0) goto 0x3f070f73;
                				E0000000113F071664(_t31, _t51);
                				return 0 | (_t31 & 0xffffffef) == 0x00000000;
                			}













                0x13f070ed0
                0x13f070ed5
                0x13f070ee4
                0x13f070eec
                0x13f070ef1
                0x13f070ef8
                0x13f070efd
                0x13f070f00
                0x13f070f07
                0x13f070f0a
                0x13f070f0c
                0x13f070f11
                0x13f070f13
                0x13f070f18
                0x13f070f1b
                0x13f070f1d
                0x13f070f21
                0x13f070f23
                0x13f070f28
                0x13f070f2f
                0x13f070f34
                0x13f070f37
                0x13f070f39
                0x13f070f3d
                0x13f070f3f
                0x13f070f44
                0x13f070f4a
                0x13f070f51
                0x13f070f56
                0x13f070f59
                0x13f070f5d
                0x13f070f5f
                0x13f070f64
                0x13f070f6b
                0x13f070f89

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _set_statfp
                • String ID:
                • API String ID: 1156100317-0
                • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                • Instruction ID: 368974cb53468e8e325ef9c88ee7940af8d885d138733dad06bb3fe7f40e0a5d
                • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                • Instruction Fuzzy Hash: 7511A572F1CB8545F65C112CEA563EA11436BA4370F4807BDBA7A06AF78B18CA4B9204
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 87%
                			E0000000113F068484(long long __rbx, signed int* __rcx, void* __rdx, long long __rdi, long long __rsi) {
                				signed int _t31;
                				signed int _t33;
                				signed int _t36;
                				signed int _t49;
                				signed int _t56;
                				void* _t61;
                				void* _t82;
                				signed int _t88;
                				void* _t89;
                				signed int _t93;
                				signed int _t108;
                				intOrPtr* _t128;
                				signed short* _t130;
                				signed short* _t131;
                				long long _t135;
                				signed int _t137;
                				signed short* _t141;
                				signed short* _t142;
                				void* _t143;
                
                				_t108 = _t137;
                				 *((long long*)(_t108 + 8)) = __rbx;
                				 *((long long*)(_t108 + 0x10)) = _t135;
                				 *((long long*)(_t108 + 0x18)) = __rsi;
                				 *((long long*)(_t108 + 0x20)) = __rdi;
                				 *__rcx = _t108;
                				__rcx[2] = 0;
                				r14d = 0x20;
                				_t31 =  *0x3f09175c; // 0x0
                				__rcx[1] = _t31;
                				goto 0x3f0684c7;
                				_t141 = __rdx + 2;
                				_t33 =  *_t141 & 0x0000ffff;
                				if (_t33 == r14w) goto 0x3f0684bf;
                				if (_t33 == 0x61) goto 0x3f0684f4;
                				if (_t33 == 0x72) goto 0x3f0684eb;
                				if (_t33 != 0x77) goto 0x3f068755;
                				 *__rcx = 0x301;
                				goto 0x3f0684fa;
                				__rcx[1] = 1;
                				goto 0x3f068501;
                				 *__rcx = 0x109;
                				__rcx[1] = 2;
                				_t142 =  &(_t141[1]);
                				r9b = bpl;
                				dil = bpl;
                				r10b = bpl;
                				r11b = bpl;
                				_t9 = _t135 + 0xa; // 0xa
                				if ( *_t142 == 0) goto 0x3f068667;
                				_t56 =  *_t142 & 0x0000ffff;
                				_t82 = _t56 - 0x53;
                				if (_t82 > 0) goto 0x3f0685d1;
                				if (_t82 == 0) goto 0x3f0685ba;
                				if (_t82 == 0) goto 0x3f068652;
                				if (_t82 == 0) goto 0x3f06858b;
                				if (_t82 == 0) goto 0x3f068583;
                				if (_t82 == 0) goto 0x3f068571;
                				_t61 = _t56 - r14d - 0xfffffffffffffff2 - _t9;
                				if (_t82 == 0) goto 0x3f068568;
                				if (_t61 != 4) goto 0x3f068755;
                				if (r10b != 0) goto 0x3f068645;
                				 *__rcx =  *__rcx | 0x00000010;
                				goto 0x3f0685c6;
                				asm("bts dword [ebx], 0x7");
                				goto 0x3f068650;
                				if (( *__rcx & 0x00000040) != 0) goto 0x3f068645;
                				goto 0x3f06864e;
                				r11b = 1;
                				goto 0x3f068645;
                				if (dil != 0) goto 0x3f068645;
                				_t36 =  *__rcx;
                				dil = 1;
                				if ((_t36 & 0x00000002) != 0) goto 0x3f068645;
                				 *__rcx = _t36 & 0xfffffffe | 0x00000002;
                				__rcx[1] = __rcx[1] & 0xfffffffc | 0x00000004;
                				goto 0x3f068650;
                				_t88 = r10b;
                				if (_t88 != 0) goto 0x3f068645;
                				 *__rcx =  *__rcx | r14d;
                				r10b = 1;
                				goto 0x3f068652;
                				if (_t88 == 0) goto 0x3f06863d;
                				if (_t88 == 0) goto 0x3f06862e;
                				if (_t88 == 0) goto 0x3f06861c;
                				if (_t88 == 0) goto 0x3f068610;
                				if (_t88 == 0) goto 0x3f068601;
                				_t89 = _t61 - 0x34 - 4;
                				if (_t89 != 0) goto 0x3f068755;
                				asm("bt eax, 0x9");
                				if (_t89 >= 0) goto 0x3f068645;
                				asm("bts eax, 0xa");
                				goto 0x3f06864e;
                				if (( *__rcx & 0x0000c000) != 0) goto 0x3f068645;
                				asm("bts eax, 0xe");
                				goto 0x3f06864e;
                				if (r9b != 0) goto 0x3f068645;
                				asm("btr dword [ebx+0x4], 0xb");
                				goto 0x3f068626;
                				if (r9b != 0) goto 0x3f068645;
                				asm("bts dword [ebx+0x4], 0xb");
                				r9b = 1;
                				goto 0x3f068652;
                				_t93 =  *__rcx & 0x0000c000;
                				if (_t93 != 0) goto 0x3f068645;
                				asm("bts eax, 0xf");
                				goto 0x3f06864e;
                				asm("bt eax, 0xc");
                				if (_t93 >= 0) goto 0x3f06864a;
                				goto 0x3f068652;
                				asm("bts eax, 0xc");
                				asm("dec eax");
                				_t143 = _t142 + __rcx;
                				if (1 != 0) goto 0x3f068518;
                				_t127 =  ==  ? _t143 : _t143 + 2;
                				goto 0x3f068678;
                				_t128 = ( ==  ? _t143 : _t143 + 2) + 2;
                				if ( *_t128 == r14w) goto 0x3f068674;
                				if (r11b != 0) goto 0x3f068695;
                				if ( *_t128 != 0) goto 0x3f068755;
                				__rcx[2] = 1;
                				goto 0x3f068765;
                				r8d = 3;
                				if (E0000000113F0633D8(_t143) != 0) goto 0x3f068755;
                				goto 0x3f0686bc;
                				_t130 = _t128 + 8;
                				_t49 =  *_t130 & 0x0000ffff;
                				if (_t49 == r14w) goto 0x3f0686b8;
                				if (_t49 != 0x3d) goto 0x3f068755;
                				_t131 =  &(_t130[1]);
                				if ( *_t131 == r14w) goto 0x3f0686cf;
                				r8d = 5;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f0686f8;
                				asm("bts dword [ebx], 0x12");
                				goto 0x3f06873a;
                				r8d = 8;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f06871a;
                				asm("bts dword [ebx], 0x11");
                				goto 0x3f06873a;
                				r8d = 7;
                				if (E0000000113F06E008(_t108, _t131) != 0) goto 0x3f068755;
                				asm("bts dword [ebx], 0x10");
                				goto 0x3f068744;
                				if (( *(_t131 + __rsi + 2) & 0x0000ffff) == r14w) goto 0x3f068740;
                				goto 0x3f068686;
                				E0000000113F05DEB4(_t108);
                				 *_t108 = 0x16;
                				return E0000000113F063618();
                			}






















                0x13f068484
                0x13f068487
                0x13f06848b
                0x13f06848f
                0x13f068493
                0x13f0684a2
                0x13f0684a8
                0x13f0684ab
                0x13f0684b1
                0x13f0684b7
                0x13f0684bd
                0x13f0684bf
                0x13f0684c3
                0x13f0684cb
                0x13f0684d1
                0x13f0684d7
                0x13f0684dd
                0x13f0684e3
                0x13f0684e9
                0x13f0684eb
                0x13f0684f2
                0x13f0684f4
                0x13f0684fa
                0x13f068501
                0x13f068509
                0x13f06850c
                0x13f06850f
                0x13f068512
                0x13f068515
                0x13f06851c
                0x13f068522
                0x13f068526
                0x13f068529
                0x13f06852f
                0x13f068538
                0x13f068541
                0x13f068546
                0x13f06854b
                0x13f06854d
                0x13f06854f
                0x13f068554
                0x13f06855d
                0x13f068563
                0x13f068566
                0x13f068568
                0x13f06856c
                0x13f068575
                0x13f06857e
                0x13f068583
                0x13f068586
                0x13f06858e
                0x13f068594
                0x13f068596
                0x13f06859b
                0x13f0685a7
                0x13f0685b2
                0x13f0685b5
                0x13f0685ba
                0x13f0685bd
                0x13f0685c3
                0x13f0685c6
                0x13f0685cc
                0x13f0685d4
                0x13f0685d9
                0x13f0685de
                0x13f0685e3
                0x13f0685e8
                0x13f0685ea
                0x13f0685ed
                0x13f0685f5
                0x13f0685f9
                0x13f0685fb
                0x13f0685ff
                0x13f068608
                0x13f06860a
                0x13f06860e
                0x13f068613
                0x13f068615
                0x13f06861a
                0x13f06861f
                0x13f068621
                0x13f068626
                0x13f06862c
                0x13f068630
                0x13f068635
                0x13f068637
                0x13f06863b
                0x13f06863f
                0x13f068643
                0x13f068648
                0x13f06864a
                0x13f068656
                0x13f06865c
                0x13f068661
                0x13f06866e
                0x13f068672
                0x13f068674
                0x13f06867c
                0x13f068681
                0x13f068686
                0x13f06868c
                0x13f068690
                0x13f068695
                0x13f0686ac
                0x13f0686b6
                0x13f0686b8
                0x13f0686bc
                0x13f0686c3
                0x13f0686c9
                0x13f0686cf
                0x13f0686d7
                0x13f0686d9
                0x13f0686f0
                0x13f0686f2
                0x13f0686f6
                0x13f0686f8
                0x13f06870f
                0x13f068711
                0x13f068718
                0x13f06871a
                0x13f068731
                0x13f068733
                0x13f06873e
                0x13f06874b
                0x13f068750
                0x13f068755
                0x13f06875a
                0x13f068782

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                • API String ID: 3215553584-1196891531
                • Opcode ID: 450d49ee475a7bad6a44c5fa310b096f0ecdf9bddeaef2acd20c06115621a3ce
                • Instruction ID: db4965f0a101a8166008a1810035752a039f2554560910d29e9d6f6be07a369a
                • Opcode Fuzzy Hash: 450d49ee475a7bad6a44c5fa310b096f0ecdf9bddeaef2acd20c06115621a3ce
                • Instruction Fuzzy Hash: 19816C76E0420085FBBD9F2D83943E826E2EB11BA8F75803DFA0557297D729CB439702
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F05C080(signed int __edi, intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, long long _a16, long long _a24) {
                				unsigned int _t79;
                				intOrPtr _t90;
                				signed int _t98;
                				signed int _t100;
                				char _t102;
                				signed int _t105;
                				unsigned int _t112;
                				void* _t132;
                				void* _t142;
                
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_t105 = __edi | 0xffffffff;
                				_t132 = __rcx;
                				if ( *((long long*)(__rcx + 0x468)) == 0) goto 0x3f05c276;
                				if ( *((long long*)(__rcx + 0x18)) != 0) goto 0x3f05c0c1;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05c266;
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) == 2) goto 0x3f05c263;
                				 *(__rcx + 0x50) =  *(__rcx + 0x50) & 0x00000000;
                				 *(__rcx + 0x2c) =  *(__rcx + 0x2c) & 0x00000000;
                				goto 0x3f05c23b;
                				 *((long long*)(__rcx + 0x18)) =  *((long long*)(__rcx + 0x18)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x28)) < 0) goto 0x3f05c250;
                				if (__rcx - 0x20 - 0x5a > 0) goto 0x3f05c114;
                				asm("lfence");
                				_t127 =  *((intOrPtr*)(__rcx + 0x41));
                				goto 0x3f05c116;
                				_t79 = ( *( *((intOrPtr*)(__rcx + 0x41)) + 0x3f077c40) & 0x000000ff) >> 4;
                				 *(__rcx + 0x2c) = _t79;
                				if (_t79 == 8) goto 0x3f05c276;
                				_t112 = _t79;
                				if (_t112 == 0) goto 0x3f05c22f;
                				if (_t112 == 0) goto 0x3f05c216;
                				if (_t112 == 0) goto 0x3f05c1e1;
                				if (_t112 == 0) goto 0x3f05c1b5;
                				if (_t112 == 0) goto 0x3f05c1ac;
                				if (_t112 == 0) goto 0x3f05c17f;
                				if (_t112 == 0) goto 0x3f05c172;
                				if (_t79 - 0xfffffffffffffffc != 1) goto 0x3f05c286;
                				E0000000113F05C930(__rcx, __rcx, _t142, 0x3f077c40);
                				goto 0x3f05c237;
                				E0000000113F05C624(_t127, _t132);
                				goto 0x3f05c237;
                				if ( *((char*)(_t132 + 0x41)) == 0x2a) goto 0x3f05c196;
                				E0000000113F05BF38(_t127, _t132, _t132, _t132 + 0x38, 0x3f077c40);
                				goto 0x3f05c237;
                				 *((long long*)(_t132 + 0x20)) =  *((long long*)(_t132 + 0x20)) + 8;
                				_t98 =  *( *((intOrPtr*)(_t132 + 0x20)) - 8);
                				_t99 =  <  ? _t105 : _t98;
                				 *(_t132 + 0x38) =  <  ? _t105 : _t98;
                				goto 0x3f05c1dd;
                				 *(_t132 + 0x38) =  *(_t132 + 0x38) & 0x00000000;
                				goto 0x3f05c23b;
                				if ( *((char*)(_t132 + 0x41)) == 0x2a) goto 0x3f05c1c1;
                				goto 0x3f05c189;
                				 *((long long*)(_t132 + 0x20)) =  *((long long*)(_t132 + 0x20)) + 8;
                				_t100 =  *( *((intOrPtr*)(_t132 + 0x20)) - 8);
                				 *(_t132 + 0x34) = _t100;
                				if (_t100 >= 0) goto 0x3f05c1dd;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000004;
                				 *(_t132 + 0x34) =  ~_t100;
                				goto 0x3f05c237;
                				_t90 =  *((intOrPtr*)(_t132 + 0x41));
                				if (_t90 == 0x20) goto 0x3f05c210;
                				if (_t90 == 0x23) goto 0x3f05c20a;
                				if (_t90 == 0x2b) goto 0x3f05c204;
                				if (_t90 == 0x2d) goto 0x3f05c1fe;
                				if (_t90 != 0x30) goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000008;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000004;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000001;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000020;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) | 0x00000002;
                				goto 0x3f05c23b;
                				 *(_t132 + 0x34) =  *(_t132 + 0x34) & 0x00000000;
                				 *(_t132 + 0x30) =  *(_t132 + 0x30) & 0x00000000;
                				 *(_t132 + 0x3c) =  *(_t132 + 0x3c) & 0x00000000;
                				 *((char*)(_t132 + 0x40)) = 0;
                				 *(_t132 + 0x38) = _t105;
                				 *((char*)(_t132 + 0x54)) = 0;
                				goto 0x3f05c23b;
                				if (E0000000113F05C508(_t132) == 0) goto 0x3f05c286;
                				_t102 =  *((intOrPtr*)( *((intOrPtr*)(_t132 + 0x18))));
                				 *((char*)(_t132 + 0x41)) = _t102;
                				if (_t102 != 0) goto 0x3f05c0e8;
                				 *((long long*)(_t132 + 0x18)) =  *((long long*)(_t132 + 0x18)) + 1;
                				 *((intOrPtr*)(_t132 + 0x470)) =  *((intOrPtr*)(_t132 + 0x470)) + 1;
                				if ( *((intOrPtr*)(_t132 + 0x470)) != 2) goto 0x3f05c0db;
                				return  *((intOrPtr*)(_t132 + 0x28));
                			}












                0x13f05c080
                0x13f05c085
                0x13f05c08f
                0x13f05c092
                0x13f05c09d
                0x13f05c0a8
                0x13f05c0aa
                0x13f05c0af
                0x13f05c0b5
                0x13f05c0bc
                0x13f05c0c1
                0x13f05c0ce
                0x13f05c0db
                0x13f05c0df
                0x13f05c0e3
                0x13f05c0e8
                0x13f05c0f0
                0x13f05c101
                0x13f05c103
                0x13f05c106
                0x13f05c112
                0x13f05c11f
                0x13f05c122
                0x13f05c128
                0x13f05c12e
                0x13f05c130
                0x13f05c139
                0x13f05c142
                0x13f05c14b
                0x13f05c150
                0x13f05c155
                0x13f05c15a
                0x13f05c15f
                0x13f05c168
                0x13f05c16d
                0x13f05c175
                0x13f05c17a
                0x13f05c183
                0x13f05c18c
                0x13f05c191
                0x13f05c196
                0x13f05c19f
                0x13f05c1a4
                0x13f05c1a7
                0x13f05c1aa
                0x13f05c1ac
                0x13f05c1b0
                0x13f05c1b9
                0x13f05c1bf
                0x13f05c1c1
                0x13f05c1ca
                0x13f05c1cd
                0x13f05c1d2
                0x13f05c1d4
                0x13f05c1da
                0x13f05c1df
                0x13f05c1e1
                0x13f05c1e6
                0x13f05c1ea
                0x13f05c1ee
                0x13f05c1f2
                0x13f05c1f6
                0x13f05c1f8
                0x13f05c1fc
                0x13f05c1fe
                0x13f05c202
                0x13f05c204
                0x13f05c208
                0x13f05c20a
                0x13f05c20e
                0x13f05c210
                0x13f05c214
                0x13f05c216
                0x13f05c21a
                0x13f05c21e
                0x13f05c222
                0x13f05c226
                0x13f05c229
                0x13f05c22d
                0x13f05c239
                0x13f05c23f
                0x13f05c241
                0x13f05c246
                0x13f05c24c
                0x13f05c250
                0x13f05c25d
                0x13f05c275

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: $*
                • API String ID: 3215553584-3982473090
                • Opcode ID: 56f6ef7d21224f0faaa81e4b2f482fd7d932899ae18ad29c750557fb832c1004
                • Instruction ID: ceddb313ab3966da24d80473c6ab09fe47bf3afab105e1ae6487fdad97bcf82b
                • Opcode Fuzzy Hash: 56f6ef7d21224f0faaa81e4b2f482fd7d932899ae18ad29c750557fb832c1004
                • Instruction Fuzzy Hash: 0961307290D640CAEB6C8F7C805C3AC3BA2F316B58F14913DE64A4639AC7A5C68BC755
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 54%
                			E0000000113F06162C(void* __ecx, intOrPtr* __rax, long long __rbx, void* __rcx, void* __r8, void* __r12, long long _a8, signed int _a16, signed int _a24, signed int _a32) {
                				long long _v56;
                				void* __rdi;
                				void* __rsi;
                				void* _t30;
                				intOrPtr _t36;
                				intOrPtr _t42;
                				intOrPtr* _t65;
                				long long _t71;
                				void* _t73;
                				long long _t87;
                				signed int _t88;
                				intOrPtr* _t89;
                
                				_t99 = __r12;
                				_t73 = __rcx;
                				_a8 = __rbx;
                				r14d = __ecx;
                				if (__ecx == 0) goto 0x3f06179b;
                				_t2 = _t73 - 1; // -1
                				if (_t2 - 1 <= 0) goto 0x3f06166a;
                				E0000000113F05DEB4(__rax);
                				_t3 = _t88 + 0x16; // 0x16
                				_t42 = _t3;
                				 *__rax = _t42;
                				E0000000113F063618();
                				goto 0x3f06179b;
                				r8d = 0x104;
                				GetModuleFileNameW(??, ??, ??);
                				_t89 =  *0x3f0914b8; // 0x302640
                				 *0x3f091490 = 0x3f091510;
                				if (_t89 == 0) goto 0x3f06169a;
                				if ( *_t89 != _t42) goto 0x3f06169d;
                				_t65 =  &_a32;
                				_a24 = _t88;
                				_v56 = _t65;
                				r8d = 0;
                				_a32 = _t88;
                				_t30 = E0000000113F061428(0x3f091510, 0x3f091510, 0x3f091510, _t88, 0x3f091510, __r8,  &_a24, __r12);
                				r8d = 2;
                				E0000000113F0615CC(_t30, _a24, _a32, __r8);
                				_t71 = _t65;
                				if (_t65 != 0) goto 0x3f0616f5;
                				E0000000113F05DEB4(_t65);
                				 *_t65 = 0xc;
                				E0000000113F0636F8(_t65, _a24);
                				goto 0x3f061663;
                				_v56 =  &_a32;
                				E0000000113F061428(_t71, 0x3f091510, _t71, _t88, 0x3f091510, _t65 + _a24 * 8,  &_a24, _t99);
                				if (r14d != 1) goto 0x3f06172d;
                				_t36 = _a24 - 1;
                				 *0x3f0914a8 = _t71;
                				 *0x3f091498 = _t36;
                				goto 0x3f061796;
                				_a16 = _t88;
                				0x3f06a13c();
                				if (_t36 == 0) goto 0x3f06175c;
                				E0000000113F0636F8( &_a32, _a16);
                				_a16 = _t88;
                				E0000000113F0636F8( &_a32, _t71);
                				goto 0x3f06179b;
                				_t87 = _a16;
                				if ( *_t87 == _t88) goto 0x3f061777;
                				if ( *((intOrPtr*)(_t87 + 8)) != _t88) goto 0x3f06176b;
                				 *0x3f091498 = 0;
                				_a16 = _t88;
                				 *0x3f0914a8 = _t87;
                				E0000000113F0636F8(_t87 + 8, _t88 + 1);
                				_a16 = _t88;
                				E0000000113F0636F8(_t87 + 8, _t71);
                				return _t36;
                			}















                0x13f06162c
                0x13f06162c
                0x13f06162c
                0x13f061641
                0x13f061646
                0x13f06164c
                0x13f061652
                0x13f061654
                0x13f061659
                0x13f061659
                0x13f06165c
                0x13f06165e
                0x13f061665
                0x13f061671
                0x13f06167c
                0x13f061682
                0x13f061689
                0x13f061693
                0x13f061698
                0x13f06169d
                0x13f0616a1
                0x13f0616a9
                0x13f0616ae
                0x13f0616b1
                0x13f0616ba
                0x13f0616c3
                0x13f0616d0
                0x13f0616d5
                0x13f0616db
                0x13f0616dd
                0x13f0616e9
                0x13f0616eb
                0x13f0616f0
                0x13f061707
                0x13f06170c
                0x13f061715
                0x13f06171a
                0x13f06171c
                0x13f061723
                0x13f06172b
                0x13f061731
                0x13f061738
                0x13f061741
                0x13f061747
                0x13f06174f
                0x13f061753
                0x13f06175a
                0x13f06175c
                0x13f061769
                0x13f061775
                0x13f061777
                0x13f06177f
                0x13f061783
                0x13f06178a
                0x13f061792
                0x13f061796
                0x13f0617ad

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FileFreeHeapModuleName_invalid_parameter_noinfo
                • String ID: @&0$C:\Users\user\Desktop\SecurityUpdate.exe
                • API String ID: 13503096-443836730
                • Opcode ID: 0cf9e27c999f8f321bd65afb72764dbf865f9f8626a701036d6e5ddd31b7731b
                • Instruction ID: b599b36cba377c1dbf4f417d328d13b4f0818505e55c55b6a1414ce9bb6296f3
                • Opcode Fuzzy Hash: 0cf9e27c999f8f321bd65afb72764dbf865f9f8626a701036d6e5ddd31b7731b
                • Instruction Fuzzy Hash: 6B416036A00B1186EB1CDF2DE4417ED27A6E745BE4F65403DFA8A47B97DE34C6868340
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F0652CC(void* __ecx, signed int __edx, void* __edi, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, signed short* __r8, void* __r10, void* __r11, signed long long _a8, signed long long _a16, long long _a24, char _a40, char _a1744, char _a1752, signed int _a5176, void* _a5192) {
                				intOrPtr _v0;
                				signed long long _v8;
                				signed int _t42;
                				signed long long _t63;
                				short* _t68;
                				signed int* _t69;
                				void* _t92;
                				void* _t103;
                				void* _t104;
                
                				_a8 = __rbx;
                				_a24 = __rbp;
                				E0000000113F058610(__ecx, __rax, __rcx, __r10, __r11);
                				_t63 =  *0x3f082018; // 0xe88b9cb90319
                				_a5176 = _t63 ^ _t92 - __rax;
                				r14d = r9d;
                				r10d = r10d & 0x0000003f;
                				_t104 = _t103 + __r8;
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x3f0917a0 + (__edx >> 6) * 8));
                				 *((intOrPtr*)(__rcx + 8)) = 0;
                				if (__r8 - _t104 >= 0) goto 0x3f06540d;
                				_t68 =  &_a40;
                				if (__r8 - _t104 >= 0) goto 0x3f065376;
                				_t42 =  *__r8 & 0x0000ffff;
                				if (_t42 != 0xa) goto 0x3f065362;
                				 *_t68 = 0xd;
                				_t69 = _t68 + 2;
                				 *_t69 = _t42;
                				if ( &(_t69[0]) -  &_a1744 < 0) goto 0x3f065344;
                				_a16 = _a16 & 0x00000000;
                				_a8 = _a8 & 0x00000000;
                				_v0 = 0xd55;
                				_v8 =  &_a1752;
                				r9d = 0;
                				E0000000113F0683EC();
                				if (0 == 0) goto 0x3f065405;
                				if (0 == 0) goto 0x3f0653f5;
                				_v8 = _v8 & 0x00000000;
                				r8d = 0;
                				r8d = r8d;
                				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x3f065405;
                				if (0 + _a24 < 0) goto 0x3f0653c2;
                				 *((intOrPtr*)(__rcx + 4)) = __edi - r15d;
                				goto 0x3f065339;
                				 *((intOrPtr*)(__rcx)) = GetLastError();
                				return E0000000113F058680(0, __rcx, _a5176 ^ _t92 - __rax);
                			}












                0x13f0652cc
                0x13f0652d1
                0x13f0652e3
                0x13f0652eb
                0x13f0652f5
                0x13f065306
                0x13f065314
                0x13f065318
                0x13f065330
                0x13f065336
                0x13f065339
                0x13f06533f
                0x13f065347
                0x13f065349
                0x13f065354
                0x13f06535b
                0x13f06535e
                0x13f065362
                0x13f065374
                0x13f065376
                0x13f065381
                0x13f06538f
                0x13f0653a2
                0x13f0653a7
                0x13f0653b1
                0x13f0653ba
                0x13f0653c0
                0x13f0653c2
                0x13f0653d7
                0x13f0653e0
                0x13f0653eb
                0x13f0653f3
                0x13f0653fa
                0x13f065400
                0x13f06540b
                0x13f06543b

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite
                • String ID: U$E4
                • API String ID: 442123175-195504223
                • Opcode ID: 51937191067bbbf43432886cbd29028088d0a406a78cbc48e1f41c19fca03b89
                • Instruction ID: 069824c9ef20e2fc6927d743dfa267118fc7347394543b4821a25438001c3753
                • Opcode Fuzzy Hash: 51937191067bbbf43432886cbd29028088d0a406a78cbc48e1f41c19fca03b89
                • Instruction Fuzzy Hash: 0141D572B24A5081DB24CF69E8443EA77A2F788B94F554039FE4D87795DB7CC642CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F051B30(void* __rax, long long __rcx, signed long long __rdx, long long __r8, long long __r9, long long _a8, signed long long _a16, char _a24, long long _a32, char _a1048, char _a2072, char _a4120, signed int _a6168, char _a6232) {
                				void* __rbx;
                				void* __rsi;
                				void* _t22;
                				void* _t26;
                				void* _t33;
                				signed long long _t42;
                				signed long long _t43;
                				void* _t62;
                				void* _t72;
                				void* _t73;
                
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t22 = E0000000113F058610(_t33, __rax, __rcx, _t72, _t73);
                				_t63 = _t62 - __rax;
                				_t42 =  *0x3f082018; // 0xe88b9cb90319
                				_t43 = _t42 ^ _t62 - __rax;
                				_a6168 = _t43;
                				_t44 = __rdx;
                				E0000000113F051B20(_t22);
                				_a16 =  &_a6232;
                				_a8 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				E0000000113F05DEB4(_t43);
                				E0000000113F05DED4( *_t43, _t43, __rdx);
                				_a16 = _t43;
                				_a8 = __rcx;
                				_t26 = E0000000113F051FF0(_t43,  &_a24,  &_a1048, "%s%s: %s",  &_a1048);
                				r8d = 0x800;
                				E0000000113F0597D0(_t26, 0,  &_a2072,  &_a1048, "%s%s: %s");
                				r8d = 0x400;
                				E0000000113F0554B0(_t43, _t44,  &_a4120,  &_a24,  &_a6232, "%s%s: %s");
                				if (_t43 == 0) goto 0x3f051c3f;
                				r8d = 0x400;
                				E0000000113F0554B0(_t43, _t44,  &_a2072, "Fatal error detected",  &_a6232, "%s%s: %s");
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051c59;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t43, _a6168 ^ _t63);
                			}













                0x13f051b30
                0x13f051b35
                0x13f051b3a
                0x13f051b47
                0x13f051b4c
                0x13f051b4f
                0x13f051b56
                0x13f051b59
                0x13f051b61
                0x13f051b6f
                0x13f051b74
                0x13f051b84
                0x13f051b8d
                0x13f051b9a
                0x13f051b9f
                0x13f051ba6
                0x13f051bab
                0x13f051bbf
                0x13f051bce
                0x13f051bdd
                0x13f051be3
                0x13f051be8
                0x13f051bfb
                0x13f051c03
                0x13f051c05
                0x13f051c1a
                0x13f051c1f
                0x13f051c37
                0x13f051c3d
                0x13f051c3f
                0x13f051c53
                0x13f051c73

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: %s%s: %s$Fatal error detected
                • API String ID: 1878133881-2410924014
                • Opcode ID: f71ee3b6517c22b91a1bb21c20bc030904f0b5496b387f5b87df66999fb5b4d9
                • Instruction ID: aa427039212fac093a54dc4f362230c0a852f3ea3a0d7bde0f04a051ac007e18
                • Opcode Fuzzy Hash: f71ee3b6517c22b91a1bb21c20bc030904f0b5496b387f5b87df66999fb5b4d9
                • Instruction Fuzzy Hash: 3D315772629684C1E634EB14F4557DA63A6F784788F80402ABA8D47A9BDF7CC307CB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F052D20(void* __rax, long long __rcx, char _a24, signed int _a8216) {
                				void* __rbx;
                				void* _t15;
                				intOrPtr _t17;
                				signed long long _t22;
                				signed long long _t23;
                				void* _t34;
                				void* _t35;
                				void* _t36;
                				void* _t39;
                				void* _t40;
                				void* _t41;
                				void* _t42;
                
                				E0000000113F058610(_t15, __rax, __rcx, _t41, _t42);
                				_t37 = _t36 - __rax;
                				_t22 =  *0x3f082018; // 0xe88b9cb90319
                				_t23 = _t22 ^ _t36 - __rax;
                				_a8216 = _t23;
                				r8d = 0x1000;
                				if (GetModuleFileNameW(??, ??, ??) != 0) goto 0x3f052d72;
                				E0000000113F051C80(_t23, "GetModuleFileNameW", "Failed to get executable path.", _t39, _t40);
                				goto 0x3f052d9f;
                				r8d = 0x1000;
                				E0000000113F0555C0(_t17, __rcx, __rcx,  &_a24, _t34, _t35, _t39);
                				if (_t23 != 0) goto 0x3f052d9a;
                				E0000000113F051DD0(_t23, "Failed to convert executable path to UTF-8.",  &_a24, _t39, _t40);
                				goto 0x3f052d9f;
                				return E0000000113F058680(0, _t23, _a8216 ^ _t37);
                			}















                0x13f052d27
                0x13f052d2c
                0x13f052d2f
                0x13f052d36
                0x13f052d39
                0x13f052d4b
                0x13f052d59
                0x13f052d69
                0x13f052d70
                0x13f052d72
                0x13f052d80
                0x13f052d88
                0x13f052d91
                0x13f052d98
                0x13f052db7

                APIs
                • GetModuleFileNameW.KERNEL32(?,000000013F052A30), ref: 000000013F052D51
                  • Part of subcall function 000000013F051C80: GetLastError.KERNEL32(00000000,00000000,00000000,000000013F0552C3,?,?,?,?,?,?,?,?,?,?,?,000000013F05101D), ref: 000000013F051CB4
                  • Part of subcall function 000000013F051C80: MessageBoxW.USER32 ref: 000000013F051D8C
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastMessageModuleName
                • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                • API String ID: 2581892565-482168174
                • Opcode ID: 0abe2ac635d1f8ae3a2db1cc997b20a5cef2fe3b4490200cae4118a17ac56cd7
                • Instruction ID: 900713ace9cfb2c8dbe79098c8d5d90af84942e230fbbef2b9a378df71ee8da5
                • Opcode Fuzzy Hash: 0abe2ac635d1f8ae3a2db1cc997b20a5cef2fe3b4490200cae4118a17ac56cd7
                • Instruction Fuzzy Hash: 6B01A230F18640D5FB289728E84D3D55393AB5C3C4F84043EB84E86697EA9CC34BCB20
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 97%
                			E0000000113F067CCC(signed int __edx, void* __edi, void* __rcx, void* __rdx, intOrPtr _a40, intOrPtr _a48, intOrPtr _a56) {
                				signed int _v80;
                				intOrPtr _v92;
                				intOrPtr _v100;
                				intOrPtr _v104;
                				signed long long _v112;
                				intOrPtr _v116;
                				char _v120;
                				char _v124;
                				char _v128;
                				char _v132;
                				unsigned int _v136;
                				void* _t54;
                				intOrPtr _t67;
                				signed long long _t86;
                				intOrPtr _t88;
                				signed long long _t110;
                				signed long long _t111;
                				signed long long _t118;
                				void* _t120;
                				signed long long _t138;
                				void* _t143;
                
                				_t110 =  *0x3f082018; // 0xe88b9cb90319
                				_t111 = _t110 ^ _t143 - 0x00000078;
                				_v80 = _t111;
                				_t67 = __rcx - 0x76c;
                				_t86 = r8d;
                				_v136 = r9d;
                				_t138 = __edx;
                				if (_t67 - 0x46 < 0) goto 0x3f067eb4;
                				if (_t67 - 0x44d > 0) goto 0x3f067eb4;
                				r15d = __edx - 1;
                				if (r15d - 0xb > 0) goto 0x3f067eb4;
                				if (r8d <= 0) goto 0x3f067eb4;
                				if (r8d -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4)) -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4 - 4)) <= 0) goto 0x3f067d6d;
                				if (E0000000113F067C6C(_t67, r8d -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4)) -  *((intOrPtr*)(0x3f07d8a8 + __edx * 4 - 4))) == 0) goto 0x3f067eb4;
                				if (__edi != 2) goto 0x3f067eb4;
                				if (_t86 - 0x1d > 0) goto 0x3f067eb4;
                				if (_v136 - 0x17 > 0) goto 0x3f067eb4;
                				if (r13d - 0x3b > 0) goto 0x3f067eb4;
                				if (r12d - 0x3b > 0) goto 0x3f067eb4;
                				_t54 = E0000000113F067C6C(_t67, r12d - 0x3b);
                				r14d = 0;
                				if (_t54 == 0) goto 0x3f067da4;
                				if (__edi - 2 <= 0) goto 0x3f067da4;
                				_t88 = _t86 +  *((intOrPtr*)(0x3f07d8a8 + _t138 * 4 - 4)) + 1;
                				E0000000113F06DF4C(_t111);
                				_v124 = r14d;
                				_v128 = r14d;
                				_v132 = r14d;
                				if (E0000000113F06D518(_t111,  &_v124) != 0) goto 0x3f067ee0;
                				if (E0000000113F06D548(_t111,  &_v128) != 0) goto 0x3f067ee0;
                				if (E0000000113F06D578(_t111,  &_v132) != 0) goto 0x3f067ee0;
                				r8d = _t120 - 1;
                				r10d = 0x51eb851f;
                				r9d = r10d * (_t120 + 0x12b) >> 0x20;
                				r9d = r9d >> 7;
                				r9d = r9d + (r9d >> 0x1f);
                				r9d = r9d - (r10d * r8d >> 0x20 >> 5) + (r10d * r8d >> 0x20 >> 5 >> 0x1f);
                				asm("cdq");
                				if (_a56 == 1) goto 0x3f067eaf;
                				_v92 = _t88;
                				_v100 = _t67;
                				_v104 = r15d;
                				_v112 = r8d;
                				_v116 = r13d;
                				_v120 = r12d;
                				if (_a56 != 0xffffffff) goto 0x3f067eaa;
                				if (_v124 == 0) goto 0x3f067eaa;
                				if (E0000000113F06DF8C( &_v120) != 0) goto 0x3f067eaf;
                				goto 0x3f067ec3;
                				_t118 = _v128 + ((_v136 + ((__rdx + _t111 >> 2) + 0xffffffef + r9d + (_t67 - 0x46) * 0x16d + _t88 + ((__rdx + _t111 >> 2) + 0xffffffef + r9d + (_t67 - 0x46) * 0x16d + _t88) * 2) * 8) * 0x3c + _a40) * 0x3c + _v132 + _a48;
                				goto 0x3f067ec3;
                				E0000000113F05DEB4(_t118);
                				 *_t118 = 0x16;
                				return E0000000113F058680((__rdx + _t111 >> 2) + 0xffffffef + r9d, _t118 | 0xffffffff, _v80 ^ _t143 - 0x00000078);
                			}
























                0x13f067ce0
                0x13f067ce7
                0x13f067cea
                0x13f067cf2
                0x13f067cfc
                0x13f067cff
                0x13f067d03
                0x13f067d09
                0x13f067d15
                0x13f067d1b
                0x13f067d23
                0x13f067d2c
                0x13f067d43
                0x13f067d4e
                0x13f067d57
                0x13f067d60
                0x13f067d71
                0x13f067d7b
                0x13f067d85
                0x13f067d91
                0x13f067d96
                0x13f067d9b
                0x13f067da0
                0x13f067da2
                0x13f067da4
                0x13f067dad
                0x13f067db1
                0x13f067db5
                0x13f067dc0
                0x13f067dd1
                0x13f067de2
                0x13f067df2
                0x13f067df6
                0x13f067e04
                0x13f067e0a
                0x13f067e1e
                0x13f067e28
                0x13f067e2b
                0x13f067e79
                0x13f067e7f
                0x13f067e82
                0x13f067e85
                0x13f067e89
                0x13f067e8d
                0x13f067e91
                0x13f067e95
                0x13f067e9b
                0x13f067ea8
                0x13f067ead
                0x13f067eaf
                0x13f067eb2
                0x13f067eb4
                0x13f067eb9
                0x13f067edf

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _get_daylight$_isindst
                • String ID:
                • API String ID: 4170891091-0
                • Opcode ID: d72cd05f9d71bc8b8cce3d7f2f67f565c79c7d641685d878663712710c1f8cc9
                • Instruction ID: f217fab75c844adfd3d635fd0a2df7caf1185f86214f3f9f0221ee03de021fe5
                • Opcode Fuzzy Hash: d72cd05f9d71bc8b8cce3d7f2f67f565c79c7d641685d878663712710c1f8cc9
                • Instruction Fuzzy Hash: DD51C772F012108AFB2CDB6C99857EC27A7E744368F70013EFD1956AD6DB389A478700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 87%
                			E0000000113F06E644(signed int __edx, void* __eflags, intOrPtr* __rax, long long __rbx, signed char* __rcx, long long __rbp, long long _a8, char _a16, long long _a24) {
                				signed int _t43;
                				signed int _t57;
                				signed int _t73;
                				void* _t96;
                				signed int _t106;
                
                				_a8 = __rbx;
                				_a24 = __rbp;
                				 *__rcx = 0;
                				r14d = r9d;
                				_t73 = __edx;
                				if (__eflags == 0) goto 0x3f06e6b9;
                				if (__eflags == 0) goto 0x3f06e695;
                				if ((__edx & 0x00000003) - 1 == 1) goto 0x3f06e68e;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e6be;
                				goto 0x3f06e6be;
                				asm("sbb ecx, ecx");
                				goto 0x3f06e6be;
                				__rcx[4] = 0x80000000;
                				_t43 = _t73 & 0x00000700;
                				if ((dil & 0x00000008) == 0) goto 0x3f06e72d;
                				if (_t43 == 0x100) goto 0x3f06e726;
                				if (_t43 == 0x200) goto 0x3f06e71f;
                				if (_t43 == 0x300) goto 0x3f06e718;
                				if (_t43 == 0x400) goto 0x3f06e72d;
                				if (_t43 == 0x500) goto 0x3f06e711;
                				if (_t43 == 0x600) goto 0x3f06e71f;
                				_t96 = _t43 - 0x700;
                				if (_t96 == 0) goto 0x3f06e711;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				goto 0x3f06e732;
                				__rcx[8] = 3;
                				if (_t96 == 0) goto 0x3f06e783;
                				if (_t96 == 0) goto 0x3f06e77c;
                				if (_t96 == 0) goto 0x3f06e775;
                				if (_t96 == 0) goto 0x3f06e76e;
                				if (r8d - 0xffffffffffffffe0 == 0x40) goto 0x3f06e760;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f06e785;
                				sil = __rcx[4] == 0x80000000;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				goto 0x3f06e785;
                				__rcx[0x14] = __rcx[0x14] & 0x00000000;
                				__rcx[0xc] = 0;
                				__rcx[0x10] = 0x80;
                				if (dil >= 0) goto 0x3f06e79b;
                				 *__rcx =  *__rcx | 0x00000010;
                				if ((0x00008000 & _t73) != 0) goto 0x3f06e7c3;
                				if ((_t73 & 0x00074000) != 0) goto 0x3f06e7c0;
                				if (E0000000113F05F100(__rax,  &_a16) != 0) goto 0x3f06e838;
                				if (_a16 == 0x8000) goto 0x3f06e7c3;
                				 *__rcx =  *__rcx | 0x00000080;
                				if ((0x00000100 & _t73) == 0) goto 0x3f06e7e2;
                				_t57 =  !( *0x3f092118) & r14d;
                				if (_t57 < 0) goto 0x3f06e7e2;
                				__rcx[0x10] = 1;
                				_t106 = dil & 0x00000040;
                				if (_t106 == 0) goto 0x3f06e7f6;
                				asm("bts dword [ebx+0x14], 0x1a");
                				asm("bts dword [ebx+0x4], 0x10");
                				__rcx[0xc] = __rcx[0xc] | 0x00000004;
                				asm("bt edi, 0xc");
                				if (_t106 >= 0) goto 0x3f06e7ff;
                				__rcx[0x10] = __rcx[0x10] | 0x00000100;
                				asm("bt edi, 0xd");
                				if (_t106 >= 0) goto 0x3f06e80a;
                				asm("bts dword [ebx+0x14], 0x19");
                				if ((dil & 0x00000020) == 0) goto 0x3f06e817;
                				asm("bts dword [ebx+0x14], 0x1b");
                				goto 0x3f06e822;
                				if ((dil & 0x00000010) == 0) goto 0x3f06e822;
                				asm("bts dword [ebx+0x14], 0x1c");
                				return _t57;
                			}








                0x13f06e644
                0x13f06e649
                0x13f06e659
                0x13f06e65e
                0x13f06e664
                0x13f06e66e
                0x13f06e673
                0x13f06e678
                0x13f06e67a
                0x13f06e67f
                0x13f06e685
                0x13f06e68c
                0x13f06e693
                0x13f06e6a9
                0x13f06e6b7
                0x13f06e6c0
                0x13f06e6c8
                0x13f06e6ca
                0x13f06e6d1
                0x13f06e6d8
                0x13f06e6df
                0x13f06e6e6
                0x13f06e6ed
                0x13f06e6f4
                0x13f06e6f6
                0x13f06e6f8
                0x13f06e6fa
                0x13f06e6ff
                0x13f06e705
                0x13f06e70f
                0x13f06e716
                0x13f06e71d
                0x13f06e724
                0x13f06e72b
                0x13f06e732
                0x13f06e738
                0x13f06e73d
                0x13f06e742
                0x13f06e747
                0x13f06e74c
                0x13f06e74e
                0x13f06e753
                0x13f06e759
                0x13f06e75e
                0x13f06e768
                0x13f06e76c
                0x13f06e773
                0x13f06e77a
                0x13f06e781
                0x13f06e785
                0x13f06e789
                0x13f06e78c
                0x13f06e796
                0x13f06e798
                0x13f06e7a2
                0x13f06e7aa
                0x13f06e7b8
                0x13f06e7be
                0x13f06e7c0
                0x13f06e7ca
                0x13f06e7d4
                0x13f06e7d9
                0x13f06e7db
                0x13f06e7e2
                0x13f06e7e6
                0x13f06e7e8
                0x13f06e7ed
                0x13f06e7f2
                0x13f06e7f6
                0x13f06e7fa
                0x13f06e7fc
                0x13f06e7ff
                0x13f06e803
                0x13f06e805
                0x13f06e80e
                0x13f06e810
                0x13f06e815
                0x13f06e81b
                0x13f06e81d
                0x13f06e837

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo$_get_daylight
                • String ID:
                • API String ID: 72036449-0
                • Opcode ID: ef77394652ea48f6e9b02221a271bf5ee5cd757e95e4ca21a70a10eec1c0cfb4
                • Instruction ID: 034fb7055e89b907d4426a7fca59f11b2902124844c7c6265c00093198928d24
                • Opcode Fuzzy Hash: ef77394652ea48f6e9b02221a271bf5ee5cd757e95e4ca21a70a10eec1c0cfb4
                • Instruction Fuzzy Hash: 20519C36E0475086F77D5B2CD4053EA6692E340734F39803DFA468B2D7D63CCB42969A
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 60%
                			E0000000113F05E288(intOrPtr __edx, long long __rbx, void* __rcx, void* __r8, intOrPtr* __r9, long long _a16) {
                				signed int _v56;
                				signed int _v76;
                				intOrPtr _v80;
                				intOrPtr _v92;
                				intOrPtr _v100;
                				intOrPtr _v108;
                				char _v112;
                				signed int _v120;
                				signed long long _v128;
                				long long _v136;
                				void* __rsi;
                				void* __rbp;
                				long _t38;
                				intOrPtr _t41;
                				signed int _t48;
                				intOrPtr _t61;
                				long _t62;
                				signed long long _t80;
                				signed long long _t81;
                				intOrPtr* _t83;
                				intOrPtr _t92;
                				signed int* _t97;
                				void* _t105;
                
                				_a16 = __rbx;
                				_t80 =  *0x3f082018; // 0xe88b9cb90319
                				_t81 = _t80 ^ _t105 - 0x00000080;
                				_v56 = _t81;
                				_t83 = __r9;
                				r14d = __edx;
                				_t38 = GetFileType(??);
                				r15d = 1;
                				asm("btr ecx, 0xf");
                				if (_t38 != r15d) goto 0x3f05e38e;
                				 *((intOrPtr*)(__r9 + 8)) = r15w;
                				if (__rcx == 0) goto 0x3f05e302;
                				_v120 = _v120 & 0x00000000;
                				_t97 =  &_v120;
                				if (E0000000113F05E600(__rcx, _t97, __r8) == 0) goto 0x3f05e3a5;
                				_t41 = _v120 - 1;
                				 *((intOrPtr*)(__r9 + 0x10)) = _t41;
                				 *__r9 = _t41;
                				_t10 = _t97 + 0x34; // 0x34
                				r8d = _t10;
                				E0000000113F0597D0(_t41, 0,  &_v112, _t97, __r8);
                				if (GetFileInformationByHandle(??, ??) == 0) goto 0x3f05e3a9;
                				_t61 = _v112;
                				_t99 = __rcx;
                				 *((short*)(_t83 + 6)) = E0000000113F05E4C4(_t61, _t83, __rcx, __r8, _t105);
                				E0000000113F05E42C(_t61, _v92, _t99);
                				 *(_t83 + 0x20) = _t81;
                				E0000000113F05E42C(_t61, _v100, _t81);
                				_t92 = _v108;
                				 *(_t83 + 0x18) = _t81;
                				E0000000113F05E42C(_t61, _t92,  *(_t83 + 0x20));
                				 *(_t83 + 0x28) = _t81;
                				 *(_t83 + 0x14) =  *(_t83 + 0x14) & 0x00000000;
                				if (_v80 != 0) goto 0x3f05e381;
                				_t48 = _v76;
                				if (_t48 - 0x7fffffff > 0) goto 0x3f05e381;
                				 *(_t83 + 0x14) = _t48;
                				goto 0x3f05e405;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 0x84;
                				goto 0x3f05e3a5;
                				_t26 = _t92 - 2; // -2
                				if (_t26 - r15d <= 0) goto 0x3f05e3b8;
                				if (_t61 != 0) goto 0x3f05e3a9;
                				E0000000113F05DEB4(_t81);
                				 *_t81 = 9;
                				goto 0x3f05e408;
                				_t62 = GetLastError();
                				E0000000113F05DE44(_t62, _t81, _t83);
                				goto 0x3f05e3a5;
                				 *((intOrPtr*)(_t83 + 8)) = r15w;
                				 *((intOrPtr*)(_t83 + 0x10)) = r14d;
                				 *_t83 = r14d;
                				_t56 =  ==  ? 0x2000 : 0x1000;
                				 *((short*)(_t83 + 6)) =  ==  ? 0x2000 : 0x1000;
                				if (_t62 == 2) goto 0x3f05e405;
                				_v128 = _v128 & 0x00000000;
                				_v136 =  &_v120;
                				r9d = 0;
                				r8d = 0;
                				if (PeekNamedPipe(??, ??, ??, ??, ??, ??) == 0) goto 0x3f05e405;
                				 *(_t83 + 0x14) = _v120;
                				return E0000000113F058680(_v120, _t81, _v56 ^ _t105 - 0x00000080);
                			}


























                0x13f05e288
                0x13f05e29e
                0x13f05e2a5
                0x13f05e2a8
                0x13f05e2af
                0x13f05e2b8
                0x13f05e2bb
                0x13f05e2c3
                0x13f05e2c9
                0x13f05e2d0
                0x13f05e2d6
                0x13f05e2de
                0x13f05e2e0
                0x13f05e2e4
                0x13f05e2f2
                0x13f05e2fb
                0x13f05e2fd
                0x13f05e300
                0x13f05e308
                0x13f05e308
                0x13f05e30c
                0x13f05e320
                0x13f05e326
                0x13f05e329
                0x13f05e337
                0x13f05e33b
                0x13f05e347
                0x13f05e34b
                0x13f05e354
                0x13f05e358
                0x13f05e35c
                0x13f05e361
                0x13f05e365
                0x13f05e36d
                0x13f05e36f
                0x13f05e377
                0x13f05e379
                0x13f05e37c
                0x13f05e381
                0x13f05e386
                0x13f05e38c
                0x13f05e38e
                0x13f05e394
                0x13f05e398
                0x13f05e39a
                0x13f05e39f
                0x13f05e3a7
                0x13f05e3af
                0x13f05e3b1
                0x13f05e3b6
                0x13f05e3bb
                0x13f05e3c5
                0x13f05e3ce
                0x13f05e3d1
                0x13f05e3d5
                0x13f05e3d9
                0x13f05e3db
                0x13f05e3e5
                0x13f05e3ea
                0x13f05e3f0
                0x13f05e3fd
                0x13f05e402
                0x13f05e42a

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                • String ID:
                • API String ID: 2780335769-0
                • Opcode ID: fc8ef600d8b44ffe79ffca64d72736d438c134a100b0f67cb29c755305dde9f2
                • Instruction ID: 5df046adaddbf8deca1743e5238b5bbd90499abfca43bf200a4fe3e874e9d2d4
                • Opcode Fuzzy Hash: fc8ef600d8b44ffe79ffca64d72736d438c134a100b0f67cb29c755305dde9f2
                • Instruction Fuzzy Hash: B2417E32A08640C6FB18DF79D5483ED33A2AB44B88F154439EE8D4768ADB78C646C754
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 57%
                			E0000000113F05C28C(signed int __edi, intOrPtr* __rax, long long __rbx, void* __rcx, void* __rdx, long long __rbp, long long _a16, long long _a24) {
                				void* __rdi;
                				void* __rsi;
                				unsigned int _t89;
                				signed int _t99;
                				signed int _t107;
                				signed int _t109;
                				signed int _t111;
                				signed int _t115;
                				unsigned int _t124;
                				intOrPtr* _t140;
                				intOrPtr _t155;
                				void* _t160;
                				signed int _t161;
                				void* _t167;
                
                				_t140 = __rax;
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_t115 = __edi | 0xffffffff;
                				if ( *((intOrPtr*)(__rcx + 0x468)) == _t161) goto 0x3f05c4f3;
                				if ( *(__rcx + 0x18) != _t161) goto 0x3f05c2d0;
                				E0000000113F05DEB4(__rax);
                				 *__rax = 0x16;
                				E0000000113F063618();
                				goto 0x3f05c4e0;
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) == 2) goto 0x3f05c4dd;
                				 *((intOrPtr*)(__rcx + 0x50)) = 0;
                				 *(__rcx + 0x2c) = 0;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x18) =  &(( *(__rcx + 0x18))[1]);
                				if ( *(__rcx + 0x28) < 0) goto 0x3f05c4ca;
                				if (( *(__rcx + 0x42) & 0xffff) - 0x20 - 0x5a > 0) goto 0x3f05c32c;
                				asm("lfence");
                				goto 0x3f05c32e;
                				_t89 = ( *(__rax + 0x3f077c40) & 0x000000ff) >> 4;
                				 *(__rcx + 0x2c) = _t89;
                				if (_t89 == 8) goto 0x3f05c4f3;
                				_t124 = _t89;
                				if (_t124 == 0) goto 0x3f05c45c;
                				if (_t124 == 0) goto 0x3f05c448;
                				if (_t124 == 0) goto 0x3f05c403;
                				if (_t124 == 0) goto 0x3f05c3d1;
                				if (_t124 == 0) goto 0x3f05c3c9;
                				if (_t124 == 0) goto 0x3f05c398;
                				if (_t124 == 0) goto 0x3f05c38b;
                				if (_t89 - 0xfffffffffffffffc != 1) goto 0x3f05c503;
                				E0000000113F05CB98(__rcx, __rcx, _t161, __rbp, _t167);
                				goto 0x3f05c4ad;
                				E0000000113F05C798(_t140, __rcx);
                				goto 0x3f05c4ad;
                				if ( *(__rcx + 0x42) == 0x2a) goto 0x3f05c3b0;
                				E0000000113F05BFDC(_t140, __rcx, __rcx, __rcx + 0x38, _t160, _t161);
                				goto 0x3f05c4ad;
                				 *((long long*)(__rcx + 0x20)) =  *((long long*)(__rcx + 0x20)) + 8;
                				_t107 =  *( *((intOrPtr*)(__rcx + 0x20)) - 8);
                				_t108 =  <  ? _t115 : _t107;
                				 *(__rcx + 0x38) =  <  ? _t115 : _t107;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x38) = 0;
                				goto 0x3f05c4b1;
                				if ( *(__rcx + 0x42) == 0x2a) goto 0x3f05c3de;
                				goto 0x3f05c3a3;
                				 *((long long*)(__rcx + 0x20)) =  *((long long*)(__rcx + 0x20)) + 8;
                				_t109 =  *( *((intOrPtr*)(__rcx + 0x20)) - 8);
                				 *(__rcx + 0x34) = _t109;
                				if (_t109 >= 0) goto 0x3f05c4ab;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000004;
                				 *(__rcx + 0x34) =  ~_t109;
                				goto 0x3f05c4ab;
                				_t99 =  *(__rcx + 0x42) & 0x0000ffff;
                				if (_t99 == 0x20) goto 0x3f05c442;
                				if (_t99 == 0x23) goto 0x3f05c43d;
                				if (_t99 == 0x2b) goto 0x3f05c437;
                				if (_t99 == 0x2d) goto 0x3f05c431;
                				if (_t99 != 0x30) goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000008;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000004;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000001;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000020;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) =  *(__rcx + 0x30) | 0x00000002;
                				goto 0x3f05c4b1;
                				 *(__rcx + 0x30) = _t161;
                				 *((intOrPtr*)(__rcx + 0x40)) = sil;
                				 *(__rcx + 0x38) = _t115;
                				 *((intOrPtr*)(__rcx + 0x3c)) = 0;
                				 *((intOrPtr*)(__rcx + 0x54)) = sil;
                				goto 0x3f05c4b1;
                				 *((char*)(__rcx + 0x54)) = 1;
                				_t155 =  *((intOrPtr*)(__rcx + 0x468));
                				if ( *((intOrPtr*)(_t155 + 0x10)) !=  *((intOrPtr*)(_t155 + 8))) goto 0x3f05c485;
                				if ( *((intOrPtr*)(_t155 + 0x18)) == sil) goto 0x3f05c480;
                				 *(__rcx + 0x28) =  *(__rcx + 0x28) + 1;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x28) = _t115;
                				goto 0x3f05c4ab;
                				 *(__rcx + 0x28) =  *(__rcx + 0x28) + 1;
                				 *((long long*)( *((intOrPtr*)(__rcx + 0x468)) + 0x10)) =  *((long long*)( *((intOrPtr*)(__rcx + 0x468)) + 0x10)) + 1;
                				 *((short*)( *((intOrPtr*)( *((intOrPtr*)(__rcx + 0x468)))))) =  *(__rcx + 0x42) & 0x0000ffff;
                				 *((long long*)( *((intOrPtr*)(__rcx + 0x468)))) =  *((long long*)( *((intOrPtr*)(__rcx + 0x468)))) + 2;
                				if (1 == 0) goto 0x3f05c503;
                				_t111 =  *( *(__rcx + 0x18)) & 0x0000ffff;
                				 *(__rcx + 0x42) = _t111;
                				if (_t111 != 0) goto 0x3f05c2fa;
                				 *(__rcx + 0x18) =  &(( *(__rcx + 0x18))[1]);
                				 *((intOrPtr*)(__rcx + 0x470)) =  *((intOrPtr*)(__rcx + 0x470)) + 1;
                				if ( *((intOrPtr*)(__rcx + 0x470)) != 2) goto 0x3f05c2ef;
                				return  *(__rcx + 0x28);
                			}

















                0x13f05c28c
                0x13f05c28c
                0x13f05c291
                0x13f05c29e
                0x13f05c2ad
                0x13f05c2b7
                0x13f05c2b9
                0x13f05c2be
                0x13f05c2c4
                0x13f05c2cb
                0x13f05c2d0
                0x13f05c2dd
                0x13f05c2ef
                0x13f05c2f2
                0x13f05c2f5
                0x13f05c2fa
                0x13f05c302
                0x13f05c319
                0x13f05c31b
                0x13f05c32a
                0x13f05c338
                0x13f05c33b
                0x13f05c341
                0x13f05c347
                0x13f05c349
                0x13f05c352
                0x13f05c35b
                0x13f05c364
                0x13f05c369
                0x13f05c36e
                0x13f05c373
                0x13f05c378
                0x13f05c381
                0x13f05c386
                0x13f05c38e
                0x13f05c393
                0x13f05c39d
                0x13f05c3a6
                0x13f05c3ab
                0x13f05c3b0
                0x13f05c3b9
                0x13f05c3be
                0x13f05c3c1
                0x13f05c3c4
                0x13f05c3c9
                0x13f05c3cc
                0x13f05c3d6
                0x13f05c3dc
                0x13f05c3de
                0x13f05c3e7
                0x13f05c3ea
                0x13f05c3ef
                0x13f05c3f5
                0x13f05c3fb
                0x13f05c3fe
                0x13f05c403
                0x13f05c40a
                0x13f05c410
                0x13f05c416
                0x13f05c41c
                0x13f05c422
                0x13f05c428
                0x13f05c42c
                0x13f05c431
                0x13f05c435
                0x13f05c437
                0x13f05c43b
                0x13f05c43d
                0x13f05c440
                0x13f05c442
                0x13f05c446
                0x13f05c448
                0x13f05c44c
                0x13f05c450
                0x13f05c453
                0x13f05c456
                0x13f05c45a
                0x13f05c460
                0x13f05c464
                0x13f05c473
                0x13f05c479
                0x13f05c47b
                0x13f05c47e
                0x13f05c480
                0x13f05c483
                0x13f05c485
                0x13f05c48f
                0x13f05c49d
                0x13f05c4a7
                0x13f05c4af
                0x13f05c4b5
                0x13f05c4b8
                0x13f05c4bf
                0x13f05c4c5
                0x13f05c4ca
                0x13f05c4d7
                0x13f05c4f2

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: *
                • API String ID: 3215553584-163128923
                • Opcode ID: 3a05c2af0537070f29d44a5f6214136916f455d348a6860d1b37f7f20aacc2e2
                • Instruction ID: 8ca0a015356790495bebd1809ac9f88f7556c3e0fce2248c09c0075059335095
                • Opcode Fuzzy Hash: 3a05c2af0537070f29d44a5f6214136916f455d348a6860d1b37f7f20aacc2e2
                • Instruction Fuzzy Hash: C9717872909610C6EB6C8F3C80487BC37A2F345B5CF54913EEA4A42296D7B4CA8BDB50
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E0000000113F0670F8(void* __ebx, long long __rbx, void* __rcx, void* __rdx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
                				void* _t11;
                				intOrPtr* _t20;
                				intOrPtr* _t34;
                
                				_t20 = _t34;
                				 *((long long*)(_t20 + 8)) = __rbx;
                				 *((long long*)(_t20 + 0x10)) = __rbp;
                				 *((long long*)(_t20 + 0x18)) = __rsi;
                				 *((long long*)(_t20 + 0x20)) = __rdi;
                				r15b = r9b;
                				_t10 =  >  ? __ebx : 0;
                				_t11 = ( >  ? __ebx : 0) + 9;
                				if (__rdx - _t20 > 0) goto 0x3f06715d;
                				E0000000113F05DEB4(_t20);
                				 *_t20 = 0x22;
                				E0000000113F063618();
                				return 0x22;
                			}






                0x13f0670f8
                0x13f0670fb
                0x13f0670ff
                0x13f067103
                0x13f067107
                0x13f067119
                0x13f067122
                0x13f067125
                0x13f06712d
                0x13f06712f
                0x13f067139
                0x13f06713b
                0x13f06715c

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: e+000$gfff
                • API String ID: 3215553584-3030954782
                • Opcode ID: 66d4498feff3d1b45d430b9fd03c668551b6bfd917565881f5e92891cdb99774
                • Instruction ID: 7c922e4687af8dc89b1a765bcc5749056d3c921b569e63bb02eb706fa7aa62e9
                • Opcode Fuzzy Hash: 66d4498feff3d1b45d430b9fd03c668551b6bfd917565881f5e92891cdb99774
                • Instruction Fuzzy Hash: 97512872B147C186E7298F3D99403896B92E381BA0F589239E7984BBD7DF28C546C700
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 70%
                			E0000000113F053B90(void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, long long _a16, long long _a24, long long _a32, signed int _a8232, void* _a8248) {
                				void* __rdi;
                				void* _t47;
                				void* _t48;
                				void* _t63;
                				void* _t68;
                				signed long long _t75;
                				intOrPtr* _t77;
                				intOrPtr* _t78;
                				intOrPtr* _t79;
                				intOrPtr* _t80;
                				intOrPtr* _t81;
                				intOrPtr* _t82;
                				intOrPtr _t83;
                				intOrPtr* _t84;
                				intOrPtr* _t85;
                				intOrPtr _t87;
                				void* _t107;
                				void* _t109;
                				void* _t113;
                				void* _t116;
                				void* _t117;
                				void* _t118;
                				void* _t119;
                
                				_a16 = __rbx;
                				_a24 = __rbp;
                				_a32 = __rsi;
                				E0000000113F058610(_t48, __rax, __rcx, _t118, _t119);
                				_t114 = _t113 - __rax;
                				_t75 =  *0x3f082018; // 0xe88b9cb90319
                				_a8232 = _t75 ^ _t113 - __rax;
                				_t77 =  *0x3f082b10; // 0x0
                				_t87 =  *((intOrPtr*)(__rcx + 0x10));
                				_t109 = __rcx;
                				 *_t77 = 1;
                				_t78 =  *0x3f082b08; // 0x0
                				 *_t78 = 1;
                				_t79 =  *0x3f082b38; // 0x0
                				 *_t79 = 1;
                				_t80 =  *0x3f082b40; // 0x0
                				 *_t80 = 1;
                				_t81 =  *0x3f082b30; // 0x0
                				 *_t81 = 1;
                				_t82 =  *0x3f082b28; // 0x0
                				 *_t82 = 0;
                				if (_t87 -  *((intOrPtr*)(__rcx + 0x18)) >= 0) goto 0x3f053d63;
                				if ( *((char*)(_t87 + 0x11)) != 0x6f) goto 0x3f053ca0;
                				r8d = 4;
                				_t68 = E0000000113F05B380(_t48, _t87 + 0x12, "pyi-", _t116);
                				if (_t68 == 0) goto 0x3f053ca0;
                				if (_t68 == 0) goto 0x3f053c93;
                				if (_t68 == 0) goto 0x3f053c68;
                				if (_t68 == 0) goto 0x3f053c61;
                				if ( *((char*)(_t87 + 0x12)) - 0x29 != 1) goto 0x3f053ca0;
                				_t83 =  *0x3f082b28; // 0x0
                				goto 0x3f053c9a;
                				goto 0x3f053ca0;
                				r8d = 0x1000;
                				mbstowcs(??, ??, ??);
                				if (_t83 == 0xffffffff) goto 0x3f053d8e;
                				 *0x3f082c20();
                				goto 0x3f053ca0;
                				_t84 =  *0x3f082b18; // 0x0
                				 *_t84 = 1;
                				_t106 = _t87;
                				E0000000113F0516E0(__rcx, _t87);
                				if (_t84 -  *((intOrPtr*)(_t109 + 0x18)) < 0) goto 0x3f053c20;
                				if (1 == 0) goto 0x3f053d63;
                				E0000000113F05B520(0, _t84);
                				E0000000113F05F170(_t47, E0000000113F0628A4(_t84, _t84), 0x8000, _t63, _t84, _t107, _t109);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05F170(_t47, E0000000113F0628A4(_t84, _t84), 0x8000, _t63, _t84, _t107, _t109);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05F640(1, _t84, _t84, _t87, _t116, _t117);
                				E0000000113F05B520(2, _t84);
                				E0000000113F05F640(2, _t84, _t84, _t87, _t116, _t117);
                				E0000000113F05B520(0, _t84);
                				E0000000113F05E914(0, 0, 1, _t84, _t87, _t116);
                				E0000000113F05B520(1, _t84);
                				E0000000113F05E914(1, 0, 1, _t84, _t106, _t116);
                				E0000000113F05B520(2, _t84);
                				E0000000113F05E914(2, 0, 1, _t84, _t106, _t116);
                				_t85 =  *0x3f082b48; // 0x0
                				 *_t85 = 1;
                				return E0000000113F058680(2, _t85, _a8232 ^ _t114);
                			}


























                0x13f053b90
                0x13f053b95
                0x13f053b9a
                0x13f053ba5
                0x13f053baa
                0x13f053bad
                0x13f053bb7
                0x13f053bbf
                0x13f053bc8
                0x13f053bcc
                0x13f053bcf
                0x13f053bd5
                0x13f053bdc
                0x13f053be2
                0x13f053be9
                0x13f053bef
                0x13f053bf6
                0x13f053bfc
                0x13f053c03
                0x13f053c09
                0x13f053c10
                0x13f053c16
                0x13f053c24
                0x13f053c26
                0x13f053c3c
                0x13f053c3e
                0x13f053c47
                0x13f053c4c
                0x13f053c51
                0x13f053c56
                0x13f053c58
                0x13f053c5f
                0x13f053c66
                0x13f053c6c
                0x13f053c77
                0x13f053c80
                0x13f053c8b
                0x13f053c91
                0x13f053c93
                0x13f053c9a
                0x13f053ca0
                0x13f053ca6
                0x13f053cb2
                0x13f053cba
                0x13f053cc2
                0x13f053cd6
                0x13f053ce0
                0x13f053cf4
                0x13f053cfe
                0x13f053d06
                0x13f053d10
                0x13f053d18
                0x13f053d1f
                0x13f053d29
                0x13f053d33
                0x13f053d3d
                0x13f053d47
                0x13f053d51
                0x13f053d56
                0x13f053d5d
                0x13f053d8d

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: mbstowcs
                • String ID: Failed to convert Wflag %s using mbstowcs (invalid multibyte string)$pyi-
                • API String ID: 103190477-3625900369
                • Opcode ID: e508572e6829ee6ecbdd717d445326794eee15d16bb3e373bb817a5bff238df4
                • Instruction ID: b17e7dfd3d9277c35039fb7a6bf9c22e737abadca67abf15ed9dbb328fbeb86f
                • Opcode Fuzzy Hash: e508572e6829ee6ecbdd717d445326794eee15d16bb3e373bb817a5bff238df4
                • Instruction Fuzzy Hash: 98513B75A09604C1FB1CAF7DE8593E927A3A784B90F844139FA4D473E7DEB8C6428750
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 46%
                			E0000000113F0651B0(void* __ebx, void* __ecx, signed int __edx, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, signed short* __r8, void* __r10, void* __r11, signed long long _a8, long long _a24, char _a40, char _a5158, signed int _a5160, void* _a5176) {
                				signed int _t31;
                				intOrPtr _t33;
                				void* _t36;
                				void* _t37;
                				signed long long _t51;
                				short* _t60;
                				signed int* _t61;
                				void* _t77;
                				void* _t79;
                
                				_t36 = __ebx;
                				_a8 = __rbx;
                				_a24 = __rbp;
                				E0000000113F058610(__ecx, __rax, __rcx, __r10, __r11);
                				_t51 =  *0x3f082018; // 0xe88b9cb90319
                				_a5160 = _t51 ^ _t79 - __rax;
                				r10d = r10d & 0x0000003f;
                				_t77 = __rbp + __r8;
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x3f0917a0 + (__edx >> 6) * 8));
                				 *((intOrPtr*)(__rcx + 8)) = 0;
                				if (__r8 - _t77 >= 0) goto 0x3f06529e;
                				_t60 =  &_a40;
                				if (__r8 - _t77 >= 0) goto 0x3f065257;
                				_t31 =  *__r8 & 0x0000ffff;
                				if (_t31 != 0xa) goto 0x3f065243;
                				 *((intOrPtr*)(__rcx + 8)) =  *((intOrPtr*)(__rcx + 8)) + 2;
                				 *_t60 = 0xd;
                				_t61 = _t60 + 2;
                				 *_t61 = _t31;
                				if ( &(_t61[0]) -  &_a5158 < 0) goto 0x3f065221;
                				_a8 = _a8 & 0x00000000;
                				_t37 = _t36 + _t36;
                				r8d = _t37;
                				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x3f065296;
                				_t33 = _a24;
                				 *((intOrPtr*)(__rcx + 4)) =  *((intOrPtr*)(__rcx + 4)) + _t33;
                				if (_t33 - _t37 < 0) goto 0x3f06529e;
                				if ( &(__r8[1]) - _t77 < 0) goto 0x3f06521c;
                				goto 0x3f06529e;
                				 *((intOrPtr*)(__rcx)) = GetLastError();
                				return E0000000113F058680(0xd, __rcx, _a5160 ^ _t79 - __rax);
                			}












                0x13f0651b0
                0x13f0651b0
                0x13f0651b5
                0x13f0651c3
                0x13f0651cb
                0x13f0651d5
                0x13f0651f4
                0x13f0651f8
                0x13f06520d
                0x13f065210
                0x13f065216
                0x13f06521c
                0x13f065224
                0x13f065226
                0x13f065231
                0x13f065233
                0x13f06523c
                0x13f06523f
                0x13f065243
                0x13f065255
                0x13f065257
                0x13f065272
                0x13f065277
                0x13f065282
                0x13f065284
                0x13f065288
                0x13f06528d
                0x13f065292
                0x13f065294
                0x13f06529c
                0x13f0652c8

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite
                • String ID: E4
                • API String ID: 442123175-1217125225
                • Opcode ID: c7bf16c3d19f5cfdb33fe035f8fc268f91dae7c87def32cf5facf29ee174c09e
                • Instruction ID: 5c0c2206ba5578072becd6f9fc6d360e7263a38d80a70699cf52ad7e31389a52
                • Opcode Fuzzy Hash: c7bf16c3d19f5cfdb33fe035f8fc268f91dae7c87def32cf5facf29ee174c09e
                • Instruction Fuzzy Hash: 1831E172B10A8197DB249F69E8843D973A2F749794F54803AFF4D83766EB38C652CB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 46%
                			E0000000113F0650AC(void* __ebx, signed int __edx, void* __rax, signed long long __rbx, intOrPtr* __rcx, long long __rbp, intOrPtr* __r8, void* __r10, void* __r11, signed long long _a8, long long _a24, char _a40, char _a5159, signed int _a5160, void* _a5176) {
                				char _t31;
                				intOrPtr _t33;
                				void* _t36;
                				void* _t37;
                				void* _t38;
                				signed long long _t50;
                				char* _t59;
                				char* _t60;
                				void* _t74;
                				void* _t76;
                
                				_t36 = __ebx;
                				_a8 = __rbx;
                				_a24 = __rbp;
                				E0000000113F058610(_t38, __rax, __rcx, __r10, __r11);
                				_t50 =  *0x3f082018; // 0xe88b9cb90319
                				_a5160 = _t50 ^ _t76 - __rax;
                				r10d = r10d & 0x0000003f;
                				_t74 = __rbp + __r8;
                				 *((long long*)(__rcx)) =  *((intOrPtr*)(0x3f0917a0 + (__edx >> 6) * 8));
                				 *((intOrPtr*)(__rcx + 8)) = 0;
                				if (__r8 - _t74 >= 0) goto 0x3f065183;
                				_t59 =  &_a40;
                				if (__r8 - _t74 >= 0) goto 0x3f065142;
                				_t31 =  *((intOrPtr*)(__r8));
                				if (_t31 != 0xa) goto 0x3f065130;
                				 *((intOrPtr*)(__rcx + 8)) =  *((intOrPtr*)(__rcx + 8)) + 1;
                				 *_t59 = 0xd;
                				_t60 = _t59 + 1;
                				 *_t60 = _t31;
                				if (_t60 + 1 -  &_a5159 < 0) goto 0x3f065119;
                				_a8 = _a8 & 0x00000000;
                				_t37 = _t36;
                				r8d = _t37;
                				if (WriteFile(??, ??, ??, ??, ??) == 0) goto 0x3f06517b;
                				_t33 = _a24;
                				 *((intOrPtr*)(__rcx + 4)) =  *((intOrPtr*)(__rcx + 4)) + _t33;
                				if (_t33 - _t37 < 0) goto 0x3f065183;
                				if (__r8 + 1 - _t74 < 0) goto 0x3f065114;
                				goto 0x3f065183;
                				 *((intOrPtr*)(__rcx)) = GetLastError();
                				return E0000000113F058680(_t38, __rcx, _a5160 ^ _t76 - __rax);
                			}













                0x13f0650ac
                0x13f0650ac
                0x13f0650b1
                0x13f0650bf
                0x13f0650c7
                0x13f0650d1
                0x13f0650f0
                0x13f0650f4
                0x13f065109
                0x13f06510c
                0x13f065112
                0x13f065114
                0x13f06511c
                0x13f06511e
                0x13f065125
                0x13f065127
                0x13f06512a
                0x13f06512d
                0x13f065130
                0x13f065140
                0x13f065142
                0x13f06514d
                0x13f065154
                0x13f065167
                0x13f065169
                0x13f06516d
                0x13f065172
                0x13f065177
                0x13f065179
                0x13f065181
                0x13f0651ad

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: ErrorFileLastWrite
                • String ID: E4
                • API String ID: 442123175-1217125225
                • Opcode ID: 7c718f8cc5adbed9f7524580f9f565702a4e01702c157fc6293f7b3d2868214f
                • Instruction ID: c838a98e8b262c7ceb1f8b8e04391f3fe8f5fd1c40ebdd9a00376febc73fd2a6
                • Opcode Fuzzy Hash: 7c718f8cc5adbed9f7524580f9f565702a4e01702c157fc6293f7b3d2868214f
                • Instruction Fuzzy Hash: 3C31E632A14B809ADB249F59E8843D977A2F358790F54403AFF4D8771ADB38C657CB00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E0000000113F064A54(void* __ecx, long long __rbx, long long __rdi, long long __rsi, long long __rbp, void* _a8, void* _a16, void* _a24, void* _a32) {
                				void* _t74;
                				long long _t78;
                				intOrPtr _t79;
                				void* _t96;
                				long _t99;
                
                				_t74 = _t96;
                				 *((long long*)(_t74 + 8)) = __rbx;
                				 *((long long*)(_t74 + 0x10)) = __rbp;
                				 *((long long*)(_t74 + 0x18)) = __rsi;
                				 *((long long*)(_t74 + 0x20)) = __rdi;
                				r14d = 0;
                				_t78 =  *((intOrPtr*)(0x13f0917c8)) + 2;
                				if (_t78 - 1 <= 0) goto 0x3f064aa7;
                				 *0x13F0917D8 =  *0x13F0917D8 | 0x00000080;
                				goto 0x3f064b36;
                				 *0x13F0917D8 = 0x81;
                				if (0 == 0) goto 0x3f064ac8;
                				if (0 == 0) goto 0x3f064ac1;
                				goto 0x3f064acd;
                				goto 0x3f064acd;
                				GetStdHandle(_t99);
                				_t21 = _t78 + 1; // 0x1
                				if (_t21 - 1 <= 0) goto 0x3f064aeb;
                				GetFileType(??);
                				goto 0x3f064aed;
                				if (0 == 0) goto 0x3f064b11;
                				 *((long long*)(0x13f0917c8)) = _t78;
                				if (0 != 2) goto 0x3f064b05;
                				 *0x13F0917D8 =  *0x13F0917D8 | 0x00000040;
                				goto 0x3f064b36;
                				if (0 != 3) goto 0x3f064b36;
                				 *0x13F0917D8 =  *0x13F0917D8 | 0x00000008;
                				goto 0x3f064b36;
                				 *0x13F0917D8 =  *0x13F0917D8 | 0x00000040;
                				 *((long long*)( *0x144DFF508 + 0x28)) = 0xfffffffe;
                				_t79 =  *0x3f0914c8; // 0x0
                				if (_t79 == 0) goto 0x3f064b36;
                				 *((intOrPtr*)( *((intOrPtr*)(_t99 + _t79)) + 0x18)) = 0xfffffffe;
                				if (1 != 3) goto 0x3f064a72;
                				return 0;
                			}








                0x13f064a54
                0x13f064a57
                0x13f064a5b
                0x13f064a5f
                0x13f064a63
                0x13f064a6f
                0x13f064a93
                0x13f064a9b
                0x13f064a9d
                0x13f064aa2
                0x13f064aa7
                0x13f064ab0
                0x13f064ab5
                0x13f064abf
                0x13f064ac6
                0x13f064acd
                0x13f064ad6
                0x13f064ade
                0x13f064ae3
                0x13f064ae9
                0x13f064aef
                0x13f064af4
                0x13f064afc
                0x13f064afe
                0x13f064b03
                0x13f064b08
                0x13f064b0a
                0x13f064b0f
                0x13f064b11
                0x13f064b16
                0x13f064b1f
                0x13f064b29
                0x13f064b2f
                0x13f064b3f
                0x13f064b5f

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FileHandleType
                • String ID: E4
                • API String ID: 3000768030-1217125225
                • Opcode ID: ad9fcac7978eb53840aa87289b8c1ac2731911bc91e844e49df012bebff34b29
                • Instruction ID: ec73cf8ad248592b42b42d9d0d471050409ba21365b25e5ddec63a251df9423e
                • Opcode Fuzzy Hash: ad9fcac7978eb53840aa87289b8c1ac2731911bc91e844e49df012bebff34b29
                • Instruction Fuzzy Hash: 8F31B336A10B4091E7788B1DC5907A96A52F349BB0F78132DFB6A073E1CB34D6A2D304
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 72%
                			E0000000113F067934(long long __rbx, void* __rdx, long long __rsi, void* __r8, long long _a8, long long _a16) {
                				void* _v8;
                				signed int _v24;
                				short _v550;
                				signed int _v552;
                				void* _t19;
                				void* _t28;
                				void* _t40;
                				signed long long _t56;
                				signed long long _t57;
                				signed short* _t59;
                				signed short* _t61;
                				void* _t70;
                
                				_a8 = __rbx;
                				_a16 = __rsi;
                				_t56 =  *0x3f082018; // 0xe88b9cb90319
                				_t57 = _t56 ^ _t70 - 0x00000240;
                				_v24 = _t57;
                				_t61 =  &_v552;
                				r8d = 0x20a;
                				E0000000113F0597D0(_t19, 0, _t61, __rdx, __r8);
                				if (GetCurrentDirectoryW(??, ??) - 0x104 > 0) goto 0x3f0679a8;
                				if (_v552 == 0) goto 0x3f067a03;
                				if (_v550 != 0x3a) goto 0x3f067a03;
                				_t39 =  >  ? _v552 & 0x0000ffff : _t61 - 0x20;
                				_t40 = ( >  ? _v552 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				goto 0x3f067a03;
                				E0000000113F063680(_t61 - 0x61, _t61,  &_v552);
                				_t59 = _t57;
                				if (_t57 == 0) goto 0x3f0679d0;
                				if (GetCurrentDirectoryW(??, ??) != 0) goto 0x3f0679dd;
                				E0000000113F05DEB4(_t57);
                				 *_t57 = 0xc;
                				goto 0x3f0679fb;
                				if ( *_t59 == 0) goto 0x3f0679fb;
                				if (_t59[1] != 0x3a) goto 0x3f0679fb;
                				_t43 =  >  ?  *_t59 & 0x0000ffff : _t61 - 0x20;
                				_t44 = ( >  ?  *_t59 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				E0000000113F0636F8(_t57, _t59);
                				_t28 = ( >  ?  *_t59 & 0x0000ffff : _t61 - 0x20) - 0x40;
                				return E0000000113F058680( *_t59 & 0x0000ffff, _t57, _v24 ^ _t70 - 0x00000240);
                			}















                0x13f067934
                0x13f067939
                0x13f067946
                0x13f06794d
                0x13f067950
                0x13f06795a
                0x13f06795f
                0x13f067965
                0x13f06797f
                0x13f067988
                0x13f067990
                0x13f0679a0
                0x13f0679a3
                0x13f0679a6
                0x13f0679b2
                0x13f0679b9
                0x13f0679bf
                0x13f0679ce
                0x13f0679d0
                0x13f0679d5
                0x13f0679db
                0x13f0679e0
                0x13f0679e7
                0x13f0679f5
                0x13f0679f8
                0x13f0679fe
                0x13f067a03
                0x13f067a29

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CurrentDirectory
                • String ID: :
                • API String ID: 1611563598-336475711
                • Opcode ID: ce8714c08821330621a6f95d4e7e6da2d30a7c6c2d266de7fd2d7376580f2994
                • Instruction ID: 96541995085515d4a9bf1ffaccf30a561190d61ae6c74918c0230fd9c61208f1
                • Opcode Fuzzy Hash: ce8714c08821330621a6f95d4e7e6da2d30a7c6c2d266de7fd2d7376580f2994
                • Instruction Fuzzy Hash: 4A215172A0468081EB289B29D44439D63F3E784B94F55413EEA8943686DFB8CA468A91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 50%
                			E0000000113F064964(long long __rbx, long long __rdi, long long __rsi) {
                				char _t31;
                				void* _t48;
                				void* _t49;
                				intOrPtr* _t54;
                				intOrPtr _t61;
                				signed long long _t62;
                				long long _t63;
                				signed char* _t67;
                				signed long long _t70;
                				void* _t73;
                				void* _t74;
                				struct _STARTUPINFOW* _t78;
                
                				_t63 = __rdi;
                				_t48 = _t73;
                				 *((long long*)(_t48 + 8)) = __rbx;
                				 *(_t48 + 0x10) = _t70;
                				 *((long long*)(_t48 + 0x18)) = __rsi;
                				 *((long long*)(_t48 + 0x20)) = __rdi;
                				_t74 = _t73 - 0x90;
                				GetStartupInfoW(_t78);
                				r14d = 0;
                				if ( *((intOrPtr*)(_t74 + 0x62)) == r14w) goto 0x3f064a33;
                				_t49 =  *((intOrPtr*)(_t74 + 0x68));
                				if (_t49 == 0) goto 0x3f064a33;
                				_t67 = _t49 + 4;
                				_t54 =  *_t49 + _t67;
                				_t34 =  <  ?  *_t49 : 0x2000;
                				E0000000113F06022C(0x2000, _t49, _t54, __rdi, _t67);
                				_t35 =  >  ?  *0x3f091ba0 :  <  ?  *_t49 : 0x2000;
                				_t41 =  >  ?  *0x3f091ba0 :  <  ?  *_t49 : 0x2000;
                				if (( >  ?  *0x3f091ba0 :  <  ?  *_t49 : 0x2000) == 0) goto 0x3f064a33;
                				if ( *_t54 == 0xffffffff) goto 0x3f064a23;
                				if ( *_t54 == 0xfffffffe) goto 0x3f064a23;
                				if (( *_t67 & 0x00000001) == 0) goto 0x3f064a23;
                				if (( *_t67 & 0x00000008) != 0) goto 0x3f0649f9;
                				if (GetFileType(??) == 0) goto 0x3f064a23;
                				_t61 =  *((intOrPtr*)(0x3f0917a0 + (_t70 >> 6) * 8));
                				_t62 = _t70 + _t70 * 8;
                				 *((long long*)(_t61 + 0x28 + _t62 * 8)) =  *_t54;
                				_t31 =  *_t67;
                				 *((char*)(_t61 + 0x38 + _t62 * 8)) = _t31;
                				if (_t63 - 1 != 0) goto 0x3f0649d6;
                				return _t31;
                			}















                0x13f064964
                0x13f064964
                0x13f064967
                0x13f06496b
                0x13f06496f
                0x13f064973
                0x13f064979
                0x13f064984
                0x13f06498a
                0x13f064993
                0x13f064999
                0x13f0649a1
                0x13f0649aa
                0x13f0649b3
                0x13f0649b8
                0x13f0649bd
                0x13f0649c8
                0x13f0649cf
                0x13f0649d1
                0x13f0649da
                0x13f0649e0
                0x13f0649e5
                0x13f0649ea
                0x13f0649f7
                0x13f064a0d
                0x13f064a11
                0x13f064a18
                0x13f064a1d
                0x13f064a1f
                0x13f064a31
                0x13f064a50

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: FileInfoStartupType_invalid_parameter_noinfo
                • String ID: E4
                • API String ID: 3015670849-1217125225
                • Opcode ID: e7ad9c800b090a66e909ada1ebbf392525d5a7d8b2eb929fb9417f83a139a9cc
                • Instruction ID: 4aaa3524d5c3da23fce4b2975c68044bc6a724add0f4ebbb168957eb1cc340db
                • Opcode Fuzzy Hash: e7ad9c800b090a66e909ada1ebbf392525d5a7d8b2eb929fb9417f83a139a9cc
                • Instruction Fuzzy Hash: 43218036F00B4485EB548F29D44079977A2F784FB4F694229DAAD437E6DB38DA47C340
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E0000000113F051EE0(void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, long long _a8, long long _a16, long long _a24, char _a32, char _a1056, char _a3104, signed int _a5152, char _a5208) {
                				void* __rbx;
                				void* _t19;
                				void* _t20;
                				void* _t27;
                				signed long long _t34;
                				signed long long _t35;
                				void* _t52;
                				void* _t53;
                				void* _t61;
                				void* _t62;
                
                				_t56 = __r8;
                				_a8 = __rcx;
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t19 = E0000000113F058610(_t27, __rax, __rcx, _t61, _t62);
                				_t54 = _t53 - __rax;
                				_t34 =  *0x3f082018; // 0xe88b9cb90319
                				_t35 = _t34 ^ _t53 - __rax;
                				_a5152 = _t35;
                				_t36 = __rcx;
                				_t20 = E0000000113F051B20(_t19);
                				_a24 =  &_a5208;
                				_a16 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				r8d = 0x800;
                				E0000000113F0597D0(_t20, 0,  &_a1056,  &_a32, __r8);
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, __rcx,  &_a3104,  &_a32, _t52, __r8);
                				if (_t35 == 0) goto 0x3f051fb9;
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, _t36,  &_a1056, "Error detected", _t52, _t56);
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051fd3;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t35, _a5152 ^ _t54);
                			}













                0x13f051ee0
                0x13f051ee0
                0x13f051ee5
                0x13f051eea
                0x13f051eef
                0x13f051efb
                0x13f051f00
                0x13f051f03
                0x13f051f0a
                0x13f051f0d
                0x13f051f15
                0x13f051f20
                0x13f051f25
                0x13f051f32
                0x13f051f3b
                0x13f051f48
                0x13f051f57
                0x13f051f5d
                0x13f051f62
                0x13f051f75
                0x13f051f7d
                0x13f051f7f
                0x13f051f94
                0x13f051f99
                0x13f051fb1
                0x13f051fb7
                0x13f051fb9
                0x13f051fcd
                0x13f051fec

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: Error detected
                • API String ID: 1878133881-3513342764
                • Opcode ID: bb397e3570bded85acc4c3d56a73b19ee45e6fec8bd3e0b3078de3b06422ac8b
                • Instruction ID: 73abf9b3e06ad768e7d5ea402fca8955cbf9cbf5c3d805d6c224861a4b34b63b
                • Opcode Fuzzy Hash: bb397e3570bded85acc4c3d56a73b19ee45e6fec8bd3e0b3078de3b06422ac8b
                • Instruction Fuzzy Hash: 4221717272968481EB24DB18F4557DA63A5F784788F80512ABA8D47A9ADF7CC30ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E0000000113F051DD0(void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, long long _a8, long long _a16, long long _a24, char _a32, char _a1056, char _a3104, signed int _a5152, char _a5208) {
                				void* __rbx;
                				void* _t19;
                				void* _t20;
                				void* _t27;
                				signed long long _t34;
                				signed long long _t35;
                				void* _t52;
                				void* _t53;
                				void* _t61;
                				void* _t62;
                
                				_t56 = __r8;
                				_a8 = __rcx;
                				_a16 = __rdx;
                				_a24 = __r8;
                				_a32 = __r9;
                				_t19 = E0000000113F058610(_t27, __rax, __rcx, _t61, _t62);
                				_t54 = _t53 - __rax;
                				_t34 =  *0x3f082018; // 0xe88b9cb90319
                				_t35 = _t34 ^ _t53 - __rax;
                				_a5152 = _t35;
                				_t36 = __rcx;
                				_t20 = E0000000113F051B20(_t19);
                				_a24 =  &_a5208;
                				_a16 = 0;
                				r8d = 0x400;
                				0x3f05ddec();
                				r8d = 0x800;
                				E0000000113F0597D0(_t20, 0,  &_a1056,  &_a32, __r8);
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, __rcx,  &_a3104,  &_a32, _t52, __r8);
                				if (_t35 == 0) goto 0x3f051ea9;
                				r8d = 0x400;
                				E0000000113F0554B0(_t35, _t36,  &_a1056, "Fatal error detected", _t52, _t56);
                				r9d = 0x30;
                				MessageBoxW(??, ??, ??, ??);
                				goto 0x3f051ec3;
                				r9d = 0x30;
                				MessageBoxA(??, ??, ??, ??);
                				return E0000000113F058680(0, _t35, _a5152 ^ _t54);
                			}













                0x13f051dd0
                0x13f051dd0
                0x13f051dd5
                0x13f051dda
                0x13f051ddf
                0x13f051deb
                0x13f051df0
                0x13f051df3
                0x13f051dfa
                0x13f051dfd
                0x13f051e05
                0x13f051e10
                0x13f051e15
                0x13f051e22
                0x13f051e2b
                0x13f051e38
                0x13f051e47
                0x13f051e4d
                0x13f051e52
                0x13f051e65
                0x13f051e6d
                0x13f051e6f
                0x13f051e84
                0x13f051e89
                0x13f051ea1
                0x13f051ea7
                0x13f051ea9
                0x13f051ebd
                0x13f051edc

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Message$ByteCharMultiWide
                • String ID: Fatal error detected
                • API String ID: 1878133881-4025702859
                • Opcode ID: 2c3a763c668417d4cfdb2ffe35055d171e815e9b941d9dedd0c637aab3a95fdb
                • Instruction ID: b5b7de5813de4a5a98dc1c2aecc6e558df2393103c8d44e99a2f257e88d90cd9
                • Opcode Fuzzy Hash: 2c3a763c668417d4cfdb2ffe35055d171e815e9b941d9dedd0c637aab3a95fdb
                • Instruction Fuzzy Hash: D6218672629784C1FB349B14F4557DA63A5F784788F805129BA8D47A96DF7CC30ACB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 20%
                			E0000000113F065DC0(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long __rbp, void* __r8, long long _a8, long long _a16, long long _a24, long long _a40, intOrPtr _a48, long long _a56, long long _a64, long long _a72) {
                				long long _v24;
                				long long _v32;
                				long long _v40;
                				intOrPtr _v48;
                				long long _v56;
                				void* _t26;
                				void* _t38;
                				void* _t53;
                
                				_t40 = __rbx;
                				_t38 = __rax;
                				_a8 = __rbx;
                				_a16 = __rbp;
                				_a24 = __rsi;
                				_t26 = r9d;
                				_t53 = __rcx;
                				E0000000113F065B5C(1, __rbx, "CompareStringEx", __rsi, 0x3f078600, "CompareStringEx");
                				if (_t38 == 0) goto 0x3f065e55;
                				r9d = _t26;
                				_v24 = _a72;
                				_v32 = _a64;
                				_v40 = _a56;
                				_v48 = _a48;
                				_v56 = _a40;
                				 *0x3f072350();
                				goto 0x3f065e87;
                				E0000000113F066108(0, 0, _t38, _t40, _t53);
                				r9d = _t26;
                				_v48 = _a48;
                				_v56 = _a40;
                				return CompareStringW(??, ??, ??, ??, ??, ??);
                			}











                0x13f065dc0
                0x13f065dc0
                0x13f065dc0
                0x13f065dc5
                0x13f065dca
                0x13f065dd4
                0x13f065de3
                0x13f065df9
                0x13f065e01
                0x13f065e0b
                0x13f065e18
                0x13f065e20
                0x13f065e2d
                0x13f065e39
                0x13f065e45
                0x13f065e4d
                0x13f065e53
                0x13f065e5a
                0x13f065e61
                0x13f065e6e
                0x13f065e7c
                0x13f065e9b

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CompareStringtry_get_function
                • String ID: CompareStringEx
                • API String ID: 3328479835-2590796910
                • Opcode ID: 2051346f2dff1739ac3aa9ce91246bca6dac596dfde56006ceca8fa98f81a75a
                • Instruction ID: e4bdddcd98857513acbbb157497b3406b7a865e22c4c4f2303f31e2edfcad815
                • Opcode Fuzzy Hash: 2051346f2dff1739ac3aa9ce91246bca6dac596dfde56006ceca8fa98f81a75a
                • Instruction Fuzzy Hash: A0115E32608B8086D764CF5AF48039AB7A6F7C9B90F54412AFECD43B1ADF38C5458B00
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 75%
                			E0000000113F068AD8(void* __edx, long long __rbx, intOrPtr* __rdx, intOrPtr* __r8, long long __r9, long long _a8, long long _a32) {
                				intOrPtr* _t31;
                				signed long long _t36;
                
                				_a8 = __rbx;
                				_a32 = __r9;
                				E0000000113F0602D4();
                				_t36 =  *((intOrPtr*)( *__r8));
                				_t31 =  *((intOrPtr*)(0x3f0917a0 + (_t36 >> 6) * 8));
                				if (( *(_t31 + 0x38 + (_t36 + _t36 * 8) * 8) & 0x00000001) == 0) goto 0x3f068b42;
                				E0000000113F0605E0( *__rdx, _t31);
                				if (FlushFileBuffers(??) != 0) goto 0x3f068b50;
                				E0000000113F05DE94(_t31);
                				 *_t31 = GetLastError();
                				E0000000113F05DEB4(_t31);
                				 *_t31 = 9;
                				E0000000113F0603BC();
                				return 0xffffffff;
                			}





                0x13f068ad8
                0x13f068add
                0x13f068aef
                0x13f068af8
                0x13f068b13
                0x13f068b1c
                0x13f068b1e
                0x13f068b30
                0x13f068b32
                0x13f068b40
                0x13f068b42
                0x13f068b47
                0x13f068b52
                0x13f068b63

                APIs
                • FlushFileBuffers.KERNEL32 ref: 000000013F068B26
                • GetLastError.KERNEL32(?,?,?,000000013F068BDB,?,?,?,?,?,?,000000013F05F626,?,?,?,000000013F05F4F9), ref: 000000013F068B3A
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: BuffersErrorFileFlushLast
                • String ID: E4
                • API String ID: 1917127615-1217125225
                • Opcode ID: eae1d70288b00f8063eecefba3bdb12751559362f9d65e8c74e385164e8d9af5
                • Instruction ID: 6c0eea54b54c0cde1f492bba5b29b6a29fc1b0144ad900aacd8f93bdf09e34b9
                • Opcode Fuzzy Hash: eae1d70288b00f8063eecefba3bdb12751559362f9d65e8c74e385164e8d9af5
                • Instruction Fuzzy Hash: F201F171B00B8482EB08AF69E5843CC33A2EB48B94F504139FA09473A7DB38C696C300
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 79%
                			E0000000113F068344(void* __ecx) {
                				signed int _v16;
                				short _v18;
                				intOrPtr _v22;
                				short _v24;
                				void* _t20;
                				signed long long _t26;
                				signed long long _t27;
                				signed long long _t32;
                
                				_t20 = __ecx;
                				_t26 =  *0x3f082018; // 0xe88b9cb90319
                				_t27 = _t26 ^ _t32;
                				_v16 = _t27;
                				if (__ecx - 0x1a <= 0) goto 0x3f06837d;
                				E0000000113F05DE94(_t27);
                				 *_t27 = 0xf;
                				E0000000113F05DEB4(_t27);
                				 *_t27 = 0xd;
                				E0000000113F063618();
                				goto 0x3f0683b1;
                				if (_t20 != 0) goto 0x3f068388;
                				goto 0x3f0683b1;
                				_v22 = 0x5c003a;
                				_v24 = _t20 + 0x40;
                				_v18 = 0;
                				GetDriveTypeW(??);
                				return E0000000113F058680(_t20 + 0x40, _t27, _v16 ^ _t32);
                			}











                0x13f068344
                0x13f06834a
                0x13f068351
                0x13f068354
                0x13f06835c
                0x13f06835e
                0x13f068363
                0x13f068369
                0x13f06836e
                0x13f068374
                0x13f06837b
                0x13f068381
                0x13f068386
                0x13f06838c
                0x13f068394
                0x13f06839e
                0x13f0683a3
                0x13f0683c3

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: _invalid_parameter_noinfo
                • String ID: :
                • API String ID: 3215553584-336475711
                • Opcode ID: 67ad9f7b692f4407f001fef7da25d2cae8c087c07c9502c1b1a769e3ef848532
                • Instruction ID: 569660bef6bebfce9c0bf42320fc39362dee036f27d66813591241dca6be0ffd
                • Opcode Fuzzy Hash: 67ad9f7b692f4407f001fef7da25d2cae8c087c07c9502c1b1a769e3ef848532
                • Instruction Fuzzy Hash: EA01D172918250C2F738AF6895953DE73A2EB58354F94043EF94E42797D73CC7068A14
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F065FC8(void* __edx, void* __eflags, void* __rax, long long __rbx, void* __rcx, long long __rsi, long long _a8, long long _a16) {
                				void* _t15;
                
                				_t15 = __rax;
                				_a8 = __rbx;
                				_a16 = __rsi;
                				E0000000113F065B5C(0x12, __rbx, "InitializeCriticalSectionEx", __rsi, 0x3f078638, 0x3f078640);
                				if (_t15 == 0) goto 0x3f066013;
                				 *0x3f072350();
                				goto 0x3f066019;
                				return InitializeCriticalSectionAndSpinCount(??, ??);
                			}




                0x13f065fc8
                0x13f065fc8
                0x13f065fcd
                0x13f065ff9
                0x13f066006
                0x13f06600b
                0x13f066011
                0x13f066028

                APIs
                • try_get_function.LIBVCRUNTIME ref: 000000013F065FF9
                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,-00000018,000000013F063A9A,?,?,?,000000013F063992,?,?,?,000000013F05EE82,?,?,?,000000013F052E89), ref: 000000013F066013
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: CountCriticalInitializeSectionSpintry_get_function
                • String ID: InitializeCriticalSectionEx
                • API String ID: 539475747-3084827643
                • Opcode ID: a4b8079536662c4a47836a92d4af9fc3a0f3d512cb0c2c90dc2c1a3b8a1f2104
                • Instruction ID: d82f0a6ca4d6af4324d0f14adc3cb5e736c3872bb94c03f7e1290e44a2ff2469
                • Opcode Fuzzy Hash: a4b8079536662c4a47836a92d4af9fc3a0f3d512cb0c2c90dc2c1a3b8a1f2104
                • Instruction Fuzzy Hash: 1BF05E31A0469091FB1C9B99E5403DA6362E748BA0F58507DBA5907B56CE38CA9A8740
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 27%
                			E0000000113F065F74(void* __ecx, void* __eflags, void* __rax, long long __rbx, void* __rdx, long long _a8) {
                				void* _t12;
                				void* _t19;
                
                				_t12 = __rax;
                				_a8 = __rbx;
                				E0000000113F065B5C(6, __rdx, "FlsSetValue", _t19, 0x3f078630, 0x3f078638);
                				if (_t12 == 0) goto 0x3f065fb4;
                				 *0x3f072350();
                				goto 0x3f065fba;
                				return TlsSetValue(??, ??);
                			}





                0x13f065f74
                0x13f065f74
                0x13f065f9d
                0x13f065faa
                0x13f065fac
                0x13f065fb2
                0x13f065fc4

                APIs
                • try_get_function.LIBVCRUNTIME ref: 000000013F065F9D
                • TlsSetValue.KERNEL32(?,?,00000000,000000013F066B62,?,?,00000000,000000013F05DEBD,?,?,?,?,000000013F06371D), ref: 000000013F065FB4
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1001090179.000000013F051000.00000020.00000001.01000000.00000003.sdmp, Offset: 000000013F050000, based on PE: true
                • Associated: 00000002.00000002.1001083529.000000013F050000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001110411.000000013F072000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F082000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F08F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001123974.000000013F091000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F093000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000002.00000002.1001143875.000000013F096000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_13f050000_SecurityUpdate.jbxd
                Similarity
                • API ID: Valuetry_get_function
                • String ID: FlsSetValue
                • API String ID: 738293619-3750699315
                • Opcode ID: c14831855c825cdc936e457e28e4dd95bd183854e956f779fec1469deb181833
                • Instruction ID: 4b5c75a8f37e851405fb8e9bc627fe7a014352243dae79f7d0dabb0e3436bcf7
                • Opcode Fuzzy Hash: c14831855c825cdc936e457e28e4dd95bd183854e956f779fec1469deb181833
                • Instruction Fuzzy Hash: 29E06D71A01640D1EA0C5B99E9447E96363FB48B90F68407EB9590A296CE38CA5AC600
                Uniqueness

                Uniqueness Score: -1.00%